Blog

Exploiting Bytecode Analysis

Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. [2023] Reentrancy is a type of attack that can occur in smart contracts, enabling untrusted external code execution within… Read More

Innovative Computing Review (ICR)

Security, immutability, and nature present numerous difficulties. Big data in monetization is still among the biggest concerns for large of data set management. Large organizations easily convert unstructured data sets… Read More

Data De-Duplication

Resolving Data De-Duplication issues on Cloud (IEEE) [2020] Data de-duplication refers to providing the cloud providers a way to manage the uncontrollable data and the challenges of cloud storage. The… Read More

History of Machine Learning

A brief history of Machine learning A crucial instrument for achieving the objective of utilizing artificial intelligence-related innovations is machine learning (ML). Machine learning is sometimes confused with artificial intelligence… Read More