Author:
Shrivas Mahendra Kumar,Dean Thomas Yeboah,Brunda S. Selva
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A taxonomy of endpoint vulnerabilities and affected blockchain architecture layers;Concurrency and Computation: Practice and Experience;2024-05-29
2. Application of Graph Theory for Blockchain Technologies;Mathematics;2024-04-10
3. The Convergence of Quantum Computing and Blockchain;Advances in Computer and Electrical Engineering;2024-01-31
4. AI-Enabled Abnormal Behavior Detection and Visualization Technology on Blockchain Network;2024 International Conference on Electronics, Information, and Communication (ICEIC);2024-01-28
5. A Tree-Mapped Taxonomy of Blockchain Attacks;2023 7th Cyber Security in Networking Conference (CSNet);2023-10-16