Identifying malicious activities through anomaly detection in ethereum network
The growth in blockchain technology has also brought about the rise in number of decentralized applications (dApps). dApps are open-sourced applications that operates on a blockchain network and has numerous benefits over conventional applications that we know. A key feature of dApps is the smart co...
Saved in:
Main Author: | Neo, Remus Keng Long |
---|---|
Other Authors: | Li Yi |
Format: | Final Year Project |
Language: | English |
Published: |
Nanyang Technological University
2023
|
Subjects: | |
Online Access: | https://hdl.handle.net/10356/166150 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Similar Items
-
Get into the pool
by: Jeya, Sam
Published: (2020) -
Demonstration (web-based) of cryptographic hashing
by: Lim, Zi Yang
Published: (2018) -
Demonstration (web-based) of cryptographic hashing
by: Au, Yun Sheng
Published: (2018) -
Black-box cryptography is dangerous III
by: Lee, Esther Yu Ling.
Published: (2013) -
Elliptic curve cryptography on smart card
by: Zhang, Xing
Published: (2010)