A Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 Applications
datacite.relatedItem.firstPage | 3 | |
datacite.relatedItem.issue | 1 | |
datacite.relatedItem.relatedIdentifierType | ISSN | |
datacite.relatedItem.relatedItemIdentifier | 2813-5288 | |
datacite.relatedItem.relationType | IsPublishedIn | |
datacite.relatedItem.title | Blockchains | |
datacite.relatedItem.volume | 1 | |
dc.contributor.author | Hui Li | |
dc.contributor.author | Ranran Dang | |
dc.contributor.author | Yao Yao | |
dc.contributor.author | Han Wang | |
dc.date.accessioned | 2024-06-12T19:06:18Z | |
dc.date.available | 2024-06-12T19:06:18Z | |
dc.date.issued | 2023 | |
dc.identifier.doi | https://doi.org/10.3390/blockchains1010002 | |
dc.identifier.other | jz000065-0005 | |
dc.identifier.uri | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2080 | |
dc.publisher | MDPI AG | |
dc.rights.uri | https://creativecommons.org/licenses/by/4.0/ | |
dc.title | A Review of Approaches for Detecting Vulnerabilities in Smart Contracts within Web 3.0 Applications | |
dcat.distribution.pdf | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2081 | |
dcat.distribution.supplierxml | https://tustorage.ulb.tu-darmstadt.de/handle/tustorage/2082 | |
dspace.entity.type | Dataset | |
relation.isDistributionOfDataset | 89e67d13-3690-4bed-bc15-059123d87ae9 | |
relation.isDistributionOfDataset | e6a52924-da9f-4dd2-9929-7b5deb1f46cf | |
relation.isDistributionOfDataset | 28a546a5-feb1-4d1e-9934-66b90104ad68 | |
relation.isDistributionOfDataset.latestForDiscovery | 89e67d13-3690-4bed-bc15-059123d87ae9 | |
wdm.archivematicaaipuuid.original | affc102d-a54d-4a4a-aaff-26f1b1863259 |