Abstract
No abstract available.
Cited By
- Jain V and Tripathi M (2024). An integrated deep learning model for Ethereum smart contract vulnerability detection, International Journal of Information Security, 23:1, (557-575), Online publication date: 1-Feb-2024.
-
Imai H and Kanaoka A (2019). Chronological Analysis of Source Code Reuse Impact on Android Application Security, Journal of Information Processing, 10.2197/ipsjjip.27.603, 27:0, (603-612),
- Proceedings of the 34th Annual Computer Security Applications Conference