Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Jennifer J. Xu
Are Blockchains Immune to All Malicious Attacks?
Financial Innovation
Management of Technology
Finance
Innovation
Related publications
Response to Immune Checkpoint Antibodies: Not All Responses Are Created Equal
Clinical Cancer Research
Cancer Research
Oncology
Malicious Code on Java Card Smartcards: Attacks and Countermeasures
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Information Systems Security Measures and Countermeasures: Protecting Organizational Assets From Malicious Attacks
Communications of the IBIMA
Sparse Malicious False Data Injection Attacks and Defense Mechanisms in Smart Grids
IEEE Transactions on Industrial Informatics
Control
Systems Engineering
Information Systems
Electronic Engineering
Computer Science Applications
Electrical
Routing Algorithm Based on Nash Equilibrium Against Malicious Attacks for DTN Congestion Control
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Are We Queer? Are We Medieval? The Need to Be All Things to All People
Medieval Feminist Forum
Blockchains and Bitcoin: Regulatory Responses to Cryptocurrencies
First Monday
Computer Networks
Law
Human-Computer Interaction
Communications
Learning to Detect Malicious URLs
ACM Transactions on Intelligent Systems and Technology
Artificial Intelligence
Theoretical Computer Science
Secured Routing Protocol for Mobile Ad Hoc Networks to Defend Collaborative Black-Hole and Gray-Hole Attacks by Malicious Nodes
International Journal of Intelligent Engineering and Systems
Engineering
Computer Science