Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Smart contracts security application and challenges: A review
FA Alaba, HA Sulaimon, MI Marisa… - Cloud Computing and …, 2024 - ojs.wiserpub.com
There has been a rise in the demand for blockchain-based smart contract development
platforms and language implementations. On the other hand, smart contracts and blockchain …
platforms and language implementations. On the other hand, smart contracts and blockchain …
A study on blockchain architecture design decisions and their security attacks and threats
Blockchain is a disruptive technology intended to implement secure decentralised
distributed systems, in which transactional data can be shared, stored, and verified by …
distributed systems, in which transactional data can be shared, stored, and verified by …
An empirical study of attack-related events in DeFi projects development
Abstract Decentralized Finance (DeFi) offers users decentralized financial services that are
associated with the security of their assets. If DeFi is attacked, it could lead to considerable …
associated with the security of their assets. If DeFi is attacked, it could lead to considerable …
Self-admitted technical debt in ethereum smart contracts: a large-scale exploratory study
Programmable blockchain platforms such as Ethereum offer unique benefits to application
development, including a decentralized infrastructure, tamper-proof transactions, and …
development, including a decentralized infrastructure, tamper-proof transactions, and …
IT managers' perspective on Technical Debt Management
Abstract Context: Technical Debt (TD) is a term for software solutions that are beneficial in
the short-term but impede future change. Goal: Previous research on TD indicates various …
the short-term but impede future change. Goal: Previous research on TD indicates various …
Investigation on self-admitted technical debt in open-source blockchain projects
Technical debt refers to decisions made during the design and development of software that
postpone the resolution of technical problems or the enhancement of the software's features …
postpone the resolution of technical problems or the enhancement of the software's features …
A systematic literature review of undiscovered vulnerabilities and tools in smart contract technology
In recent years, smart contract technology has garnered significant attention due to its ability
to address trust issues that traditional technologies have long struggled with. However, like …
to address trust issues that traditional technologies have long struggled with. However, like …
Decision Support Model for Selecting the Optimal Blockchain Oracle Platform: An Evaluation of Key Factors
Smart contract-based applications are executed in a blockchain environment, and they
cannot directly access data from external systems, which is required for the service provision …
cannot directly access data from external systems, which is required for the service provision …
Unveiling the landscape of smart contract vulnerabilities: A detailed examination and codification of vulnerabilities in prominent blockchains
O Zaazaa, HE Bakkali - arxiv preprint arxiv:2312.00499, 2023 - arxiv.org
With the rise in using immature smart contract programming languages to build a
decentralized application, more vulnerabilities have been introduced to the Blockchain and …
decentralized application, more vulnerabilities have been introduced to the Blockchain and …
[PDF][PDF] Analyzing the security of C# source code using a hierarchical quality model
PR Harrison - 2022 - scholarworks.montana.edu
I would like to acknowledge my advisor, Dr. Clemente Izurieta, for the mentorship and
support throughout the entirety of this thesis. I would also like to acknowledge my committee …
support throughout the entirety of this thesis. I would also like to acknowledge my committee …