Posts in Publication

Exploiting Bytecode Analysis

Exploiting Bytecode Analysis for Reentrancy Vulnerability Detection in Ethereum Smart Contracts. [2023] Reentrancy is a type of attack that can occur in smart contracts, enabling untrusted external code execution within… Read More

Innovative Computing Review (ICR)

Security, immutability, and nature present numerous difficulties. Big data in monetization is still among the biggest concerns for large of data set management. Large organizations easily convert unstructured data sets… Read More

Data De-Duplication

Resolving Data De-Duplication issues on Cloud (IEEE) [2020] Data de-duplication refers to providing the cloud providers a way to manage the uncontrollable data and the challenges of cloud storage. The… Read More

IoHT

Study of block chain and its impact on Internet of Health Things (IoHT): challenges and opportunities. [2020] Blockchain has been making some vital progress in these days because of its… Read More

Health Care Mobile Applications.

Usability evaluation of pandemic health care mobile applications. IOP Conference Series: Earth and Environmental Science. [2021] This study was conducted to evaluate the usability of healthcare apps and its significance… Read More