BLOCKEYE: Hunting For DeFi Attacks on Blockchain.
Bin WangHan LiuChao LiuZhiqiang YangQian RenHuixuan ZhengHong LeiPublished in: CoRR (2021)
Keyphrases
- countermeasures
- malicious attacks
- traffic analysis
- security threats
- digital image watermarking
- watermarking scheme
- security mechanisms
- databases
- detect malicious
- terrorist attacks
- security protocols
- computer security
- security risks
- watermarking algorithm
- case study
- information retrieval
- detecting malicious
- data sets
- differential power analysis