최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기반도체디스플레이기술학회지 = Journal of the semiconductor & display technology, v.22 no.3, 2023년, pp.73 - 77
박다은 (단국대학교 컴퓨터학과) , 박용범 (단국대학교 소프트웨어학과)
As the DeFi market continues to expand, fraudulent activities using smart contracts have also increased. HoneyPot and Ponzi schemes are well-known frauds that exploit smart contracts. While several studies have demonstrated the potential to detect smart contracts implementing these scams, there has ...
Dong-Bin Choi, In-su Jo and Young B. Park. (2021)?Comparison of Code Similarity Analysis Performance?of funcGNN and Siamese Network, Journal of the?Semiconductor & Display Technology, 20(3), 113-116.
F. Zhong, Z. Chen, M. Xu, G. Zhang, D. Yu and X.?Cheng, "Malware-on-the-Brain: Illuminating Malware?Byte Codes With Images for Malware Classification,"?in IEEE Transactions on Computers, vol. 72, no. 2, pp.?438-451, 1 Feb. 2023, doi: 10.1109/TC.2022.3160357.
Marastoni, Niccolo, Roberto Giacobazzi, and Mila?Dalla Preda. "Data augmentation and transfer learning?to classify malware images in a deep learning context."?Journal of Computer Virology and Hacking Techniques?17 (2021): 279-297.
Daoudi, Nadia, et al. "Dexray: a simple, yet effective?deep learning approach to android malware detection?based on image representation of bytecode." Deployable?Machine Learning for Security Defense: Second International Workshop, MLHat 2021, Virtual Event, August?15, 2021, Proceedings 2. Springer International Publishing, 2021.
Nataraj, Lakshmanan, et al. "Malware images: visualization and automatic classification." Proceedings of the?8th international symposium on visualization for cyber?security. 2011.
Pinhero, Anson, et al. "Malware detection employed by?visualization and deep neural network." Computers &?Security 105 (2021): 102247.
"Verified Contracts", Etherscan, accessed Aug 07, 2023,?https://etherscan.io/contractsVerified
C. F. Torres, M. Steichen, and R. State, "The art of the?SCAM: Demystifying honeypots in ethereum smart?contracts," in Proc. 28 USENIX Security Symp., 2019,?pp. 1591-1607.
M. Bartoletti et al., "Dissecting ponzi schemes on ethereum: identification, analysis, and impact," arXiv?preprint arXiv:1703.03779, 2017.
Simonyan, Karen, and Andrew Zisserman. "Very deep?convolutional networks for large-scale image recognition." arXiv preprint arXiv:1409.1556, 2014.
He, Kaiming, et al. "Identity mappings in deep residual?networks." Computer Vision-ECCV 2016: 14th European Conference, Amsterdam, The Netherlands, October 11-14, 2016, Proceedings, Part IV 14. Springer International Publishing, 2016.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.