Cited By
View all- Sharma TZhou ZMiller AWang YCalandrino JTroncoso C(2023)A mixed-methods study of security practices of smart contract developersProceedings of the 32nd USENIX Conference on Security Symposium10.5555/3620237.3620380(2545-2562)Online publication date: 9-Aug-2023
- Anand VBolton NCalyam PChadha RRaj RMishra SChoppella VPhatak DLuxton-Reilly ACraig M(2023)Enhancing Computing Curricular Outcomes and Student Accomplishments Through Collegiate CompetitionsProceedings of the ACM Conference on Global Computing Education Vol 110.1145/3576882.3617924(22-28)Online publication date: 5-Dec-2023
- Xu EXu AFerreira DDeng LDoyle MStephenson BDorn BSoh LBattestilli L(2023)A Hands-on Digital Forensic Lab to Investigate Morris Worm AttackProceedings of the 54th ACM Technical Symposium on Computer Science Education V. 210.1145/3545947.3576229(1283-1283)Online publication date: 1-Mar-2023
- Show More Cited By