Ethereum smart contract analysis tools: A systematic review

SS Kushwaha, S Joshi, D Singh, M Kaur, HN Lee - Ieee Access, 2022 - ieeexplore.ieee.org
Blockchain technology and its applications are gaining popularity day by day. It is a ground-
breaking technology that allows users to communicate without the need of a trusted …

[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis

R Prakash, VS Anoop, S Asharaf - International Journal of Information …, 2022 - Elsevier
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …

Financial crimes in web3-empowered metaverse: Taxonomy, countermeasures, and opportunities

J Wu, K Lin, D Lin, Z Zheng, H Huang… - IEEE Open Journal of …, 2023 - ieeexplore.ieee.org
At present, the concept of metaverse has sparked widespread attention from the public to
major industries. With the rapid development of blockchain and Web3 technologies, the …

Rethinking smart contract fuzzing: Fuzzing with invocation ordering and important branch revisiting

Z Liu, P Qian, J Yang, L Liu, X Xu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Blockchain smart contracts have given rise to a variety of interesting and compelling
applications and emerged as a revolutionary force for the Internet. Smart contracts from …

The state of ethereum smart contracts security: Vulnerabilities, countermeasures, and tool support

H Zhou, A Milani Fard, A Makanju - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
Smart contracts are self-executing programs that run on the blockchain and make it possible
for peers to enforce agreements without a third-party guarantee. The smart contract on …

Analysis of network slicing for management of 5G networks using machine learning techniques

R Singh, A Mehbodniya, JL Webber… - Wireless …, 2022 - Wiley Online Library
Consumer expectations and demands for quality of service (QoS) from network service
providers have risen as a result of the proliferation of devices, applications, and services. An …

A survey on smart contract vulnerabilities: Data sources, detection and repair

H Chu, P Zhang, H Dong, Y Xiao, S Ji, W Li - Information and Software …, 2023 - Elsevier
Smart contracts contain many built-in security features, such as non-immutability once being
deployed and non-involvement of third parties for contract execution. These features reduce …

Blockchain-based vehicular ad-hoc networks: A comprehensive survey

SK Dwivedi, R Amin, AK Das, MT Leung, KKR Choo… - Ad Hoc Networks, 2022 - Elsevier
Vehicular ad-hoc networks (VANETs) are increasingly commonplace, partly due to the
popularity of electric vehicles and the digitalization of cities. Data collected and shared in …

[HTML][HTML] Models used to characterise blockchain features. A systematic literature review and bibliometric analysis

JJ Rico-Pena, R Arguedas-Sanz, C Lopez-Martin - Technovation, 2023 - Elsevier
Blockchain has emerged as an innovative technology with potential to transform business
management, through operational efficiency improvements. Nevertheless, several …

A fully privacy-preserving solution for anomaly detection in iot using federated learning and homomorphic encryption

M Arazzi, S Nicolazzo, A Nocera - Information Systems Frontiers, 2023 - Springer
Anomaly detection for the Internet of Things (IoT) is a very important topic in the context of
cyber-security. Indeed, as the pervasiveness of this technology is increasing, so is the …