Author of the publication

Detect Abnormal Behaviours in Ethereum Smart Contracts Using Attack Vectors.

, , , , and . FDSE, volume 11814 of Lecture Notes in Computer Science, page 485-505. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

OS Circular: Internet Client for Reference., , , and . LISA, page 105-116. USENIX, (2007)Centralized Security Policy Support for Virtual Machine., , and . LISA, page 79-87. USENIX, (2006)Xenprobus, a Lightweight User-Space Probing Framework for Xen Virtual Machine., and . USENIX Annual Technical Conference, page 15-28. USENIX, (2007)Towards a tamper-resistant kernel rootkit detector., and . SAC, page 276-283. ACM, (2007)A novel approach for a file-system integrity monitor tool of Xen virtual machine., and . AsiaCCS, page 194-202. ACM, (2007)Moving from Logical Sharing of Guest OS to Physical Sharing of Deduplication on Virtual Machine., , , , , and . HotSec, USENIX Association, (2010)Towards an Invisible Honeypot Monitoring System., and . ACISP, volume 4058 of Lecture Notes in Computer Science, page 111-122. Springer, (2006)A Central and Secured Logging Data Solution for Xen Virtual Machine., and . Parallel and Distributed Computing and Networks, page 218-224. IASTED/ACTA Press, (2006)A Real-time Integrity Monitor for Xen Virtual Machine., and . ICNS, page 90. IEEE Computer Society, (2006)BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices., , , , , , and . ASE, page 1161-1165. IEEE, (2021)