Author of the publication

Empirical vulnerability analysis of automated smart contracts security testing on blockchains.

, , , and . CASCON, page 103-113. ACM, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards data centric mobile security., , and . IAS, page 62-67. IEEE, (2011)A Mitigation Approach to the Privacy and Malware Threats of Social Network Services., and . ICDIPC (2), volume 189 of Communications in Computer and Information Science, page 448-459. Springer, (2011)Artificial Intelligence and Security of Industrial Control Systems., , , and . Handbook of Big Data Privacy, Springer, (2020)An Empirical Evaluation of AI Deep Explainable Tools., , , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)Making Sense of Blockchain for AI Deepfakes Technology., , , and . GLOBECOM (Workshops), page 1-6. IEEE, (2020)An Ensemble Deep Learning-Based Cyber-Attack Detection in Industrial Control System., , , and . IEEE Access, (2020)Cryptocurrency malware hunting: A deep Recurrent Neural Network approach., , , , , and . Appl. Soft Comput., (2020)Introduction to the Minitrack on Cyber Threat Intelligence and Analytics., and . HICSS, page 1-3. ScholarSpace / AIS Electronic Library (AISeL), (2018)A Hybrid RSA Algorithm in Support of IoT Greenhouse Applications., , , and . ICII, page 233-240. IEEE, (2019)An approach for forensic investigation in Firefox OS., , , and . CyberSec, page 22-26. IEEE, (2014)