{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T18:11:01Z","timestamp":1760033461093,"version":"build-2065373602"},"reference-count":6,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,2]],"date-time":"2025-06-02T00:00:00Z","timestamp":1748822400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,6,2]]},"DOI":"10.1109\/icbc64466.2025.11185070","type":"proceedings-article","created":{"date-parts":[[2025,10,7]],"date-time":"2025-10-07T17:33:44Z","timestamp":1759858424000},"page":"1-3","source":"Crossref","is-referenced-by-count":0,"title":["Analysing Vulnerabilities in Smart Contracts Using Source Code and Transaction Level Features"],"prefix":"10.1109","author":[{"given":"F.R.J. Michael","family":"Vinushan","sequence":"first","affiliation":[{"name":"University of Peradeniya,Department of Statistics and Computer Science,Peradeniya,Sri Lanka"}]},{"given":"Saluka R.","family":"Kodituwakku","sequence":"additional","affiliation":[{"name":"University of Peradeniya,Department of Statistics and Computer Science,Peradeniya,Sri Lanka"}]}],"member":"263","reference":[{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"Nakamoto","key":"ref1"},{"issue":"37","key":"ref2","first-page":"2","article-title":"A next-generation smart contract and decentralized application platform","volume":"3","author":"Buterin","year":"2014","journal-title":"white paper"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942301"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/DAPPS49028.2020.00001"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2970495"},{"article-title":"Supervised machine learning for smart contract vulnerability prediction","year":"2020","author":"Ajienka","key":"ref6"}],"event":{"name":"2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)","start":{"date-parts":[[2025,6,2]]},"location":"Pisa, Italy","end":{"date-parts":[[2025,6,6]]}},"container-title":["2025 IEEE International Conference on Blockchain and Cryptocurrency (ICBC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11114381\/11114414\/11185070.pdf?arnumber=11185070","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T17:50:01Z","timestamp":1760032201000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11185070\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,2]]},"references-count":6,"URL":"https:\/\/doi.org\/10.1109\/icbc64466.2025.11185070","relation":{},"subject":[],"published":{"date-parts":[[2025,6,2]]}}}