Login / Signup
Revealing Hidden Threats: An Empirical Study of Library Misuse in Smart Contracts.
Mingyuan Huang
Jiachi Chen
Zigui Jiang
Zibin Zheng
Published in:
ICSE (2024)
Keyphrases
</>
countermeasures
smart grid
cyber security
information security
supply chain
anomaly detection
cyber attacks
security issues
smart environments
intrusion detection
intrusion detection system
computer security
security policies
critical infrastructure
data sets
email
case study
neural network