Login / Signup
Xscope: Hunting for Cross-Chain Bridge Attacks.
Jiashuo Zhang
Jianbo Gao
Yue Li
Ziming Chen
Zhi Guan
Zhong Chen
Published in:
ASE (2022)
Keyphrases
</>
countermeasures
malicious users
watermarking scheme
malicious attacks
chosen plaintext
neural network
attack detection
denial of service attacks
security risks
security protocols
computer security
traffic analysis
data publishing
java card
ddos attacks
terrorist attacks
search engine
database