Ethereum smart contract analysis tools: A systematic review
Blockchain technology and its applications are gaining popularity day by day. It is a ground-
breaking technology that allows users to communicate without the need of a trusted …
breaking technology that allows users to communicate without the need of a trusted …
[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …
away the notion of trust from centralized organizations to a decentralized platform that is …
Financial crimes in web3-empowered metaverse: Taxonomy, countermeasures, and opportunities
At present, the concept of metaverse has sparked widespread attention from the public to
major industries. With the rapid development of blockchain and Web3 technologies, the …
major industries. With the rapid development of blockchain and Web3 technologies, the …
Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting
Blockchain smart contracts have given rise to a variety of interesting and compelling
applications and emerged as a revolutionary force for the Internet. Smart contracts from …
applications and emerged as a revolutionary force for the Internet. Smart contracts from …
The state of ethereum smart contracts security: Vulnerabilities, countermeasures, and tool support
H Zhou, A Milani Fard, A Makanju - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Smart contracts are self-executing programs that run on the blockchain and make it possible
for peers to enforce agreements without a third-party guarantee. The smart contract on …
for peers to enforce agreements without a third-party guarantee. The smart contract on …
Analysis of network slicing for management of 5G networks using machine learning techniques
R Singh, A Mehbodniya, JL Webber… - Wireless …, 2022 - Wiley Online Library
Consumer expectations and demands for quality of service (QoS) from network service
providers have risen as a result of the proliferation of devices, applications, and services. An …
providers have risen as a result of the proliferation of devices, applications, and services. An …
A survey on smart contract vulnerabilities: Data sources, detection and repair
Smart contracts contain many built-in security features, such as non-immutability once being
deployed and non-involvement of third parties for contract execution. These features reduce …
deployed and non-involvement of third parties for contract execution. These features reduce …
Blockchain-based vehicular ad-hoc networks: A comprehensive survey
Vehicular ad-hoc networks (VANETs) are increasingly commonplace, partly due to the
popularity of electric vehicles and the digitalization of cities. Data collected and shared in …
popularity of electric vehicles and the digitalization of cities. Data collected and shared in …
[HTML][HTML] Models used to characterise blockchain features. A systematic literature review and bibliometric analysis
JJ Rico-Pena, R Arguedas-Sanz, C Lopez-Martin - Technovation, 2023 - Elsevier
Blockchain has emerged as an innovative technology with potential to transform business
management, through operational efficiency improvements. Nevertheless, several …
management, through operational efficiency improvements. Nevertheless, several …
A fully privacy-preserving solution for anomaly detection in iot using federated learning and homomorphic encryption
Anomaly detection for the Internet of Things (IoT) is a very important topic in the context of
cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the …
cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the …