A Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 Applications

datacite.relatedItem.firstPage3
datacite.relatedItem.issue1
datacite.relatedItem.relatedIdentifierTypeISSN
datacite.relatedItem.relatedItemIdentifier2813-5288
datacite.relatedItem.relationTypeIsPublishedIn
datacite.relatedItem.titleBlockchains
datacite.relatedItem.volume1
dc.contributor.authorHui Li
dc.contributor.authorRanran Dang
dc.contributor.authorYao Yao
dc.contributor.authorHan Wang
dc.date.accessioned2024-06-12T19:06:18Z
dc.date.available2024-06-12T19:06:18Z
dc.date.issued2023
dc.identifier.doihttps://doi.org/10.3390/blockchains1010002
dc.identifier.otherjz000065-0005
dc.identifier.urihttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2080
dc.publisherMDPI AG
dc.rights.urihttps://creativecommons.org/licenses/by/4.0/
dc.titleA Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 Applications
dcat.distribution.pdfhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2081
dcat.distribution.supplierxmlhttps://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2082
dspace.entity.typeDataset
relation.isDistributionOfDataset89e67d13-3690-4bed-bc15-059123d87ae9
relation.isDistributionOfDatasete6a52924-da9f-4dd2-9929-7b5deb1f46cf
relation.isDistributionOfDataset28a546a5-feb1-4d1e-9934-66b90104ad68
relation.isDistributionOfDataset.latestForDiscovery89e67d13-3690-4bed-bc15-059123d87ae9
wdm.archivematicadipuuid.originalaffc102d-a54d-4a4a-aaff-26f1b1863259

Files

Collections