2023
DOI: 10.1007/s11276-023-03587-z
|View full text |Cite
|
Sign up to set email alerts
|

Smart contract: a survey towards extortionate vulnerability detection and security enhancement

S. Porkodi,
D. Kesavaraja
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 65 publications
0
7
0
Order By: Relevance
“…2: How is blockchain used to improve cyber security? 3: What methods are available for blockchain solutions to manage securi [13] 1: What are the static analysis tools available for Ethereum blockchain SC Electronics 2024, 13, x FOR PEER REVIEW [34] Technical aspect, future directions survey 2021 n [4] Difficulties and future trends review 2022 n [13] Analysis tools SLR 2022 se [35] Vulnerability detection and machine learning survey 2022 n [36] Vulnerability detection tools within Web 3.0 survey 2023 n [14] Security threats, collaborative defense review 2023 n [37] Vulnerability detection survey 2023 n [38] Platforms, applications, and challenges review 2023…”
Section: Referencementioning
confidence: 99%
See 4 more Smart Citations
“…2: How is blockchain used to improve cyber security? 3: What methods are available for blockchain solutions to manage securi [13] 1: What are the static analysis tools available for Ethereum blockchain SC Electronics 2024, 13, x FOR PEER REVIEW [34] Technical aspect, future directions survey 2021 n [4] Difficulties and future trends review 2022 n [13] Analysis tools SLR 2022 se [35] Vulnerability detection and machine learning survey 2022 n [36] Vulnerability detection tools within Web 3.0 survey 2023 n [14] Security threats, collaborative defense review 2023 n [37] Vulnerability detection survey 2023 n [38] Platforms, applications, and challenges review 2023…”
Section: Referencementioning
confidence: 99%
“…4 Keywords are not mentioned in the methodology. Security threats, collaborative defense review 2023 not clear 3 2018-2023 [37] Vulnerability detection survey 2023 not clear 3 Until 2023 [38] Platforms, applications, and challenges review 2023 clear 1  2015-May 2020 1 The identification, exclusion, eligibility, and inclusion methodology are clear. 2 The number of selected papers is not clear.…”
Section: Referencementioning
confidence: 99%
See 3 more Smart Citations