標(biāo)題: Titlebook: Blockchain and Trustworthy Systems; 5th International Co Jiachi Chen,Bin Wen,Ting Chen Conference proceedings 2024 The Editor(s) (if applic [打印本頁(yè)] 作者: damped 時(shí)間: 2025-3-21 16:24
書(shū)目名稱Blockchain and Trustworthy Systems影響因子(影響力)
書(shū)目名稱Blockchain and Trustworthy Systems影響因子(影響力)學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開(kāi)度
書(shū)目名稱Blockchain and Trustworthy Systems網(wǎng)絡(luò)公開(kāi)度學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems被引頻次
書(shū)目名稱Blockchain and Trustworthy Systems被引頻次學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems年度引用
書(shū)目名稱Blockchain and Trustworthy Systems年度引用學(xué)科排名
書(shū)目名稱Blockchain and Trustworthy Systems讀者反饋
書(shū)目名稱Blockchain and Trustworthy Systems讀者反饋學(xué)科排名
作者: DUCE 時(shí)間: 2025-3-21 22:39 作者: aptitude 時(shí)間: 2025-3-22 02:33 作者: Integrate 時(shí)間: 2025-3-22 06:47 作者: 障礙物 時(shí)間: 2025-3-22 11:50 作者: Mri485 時(shí)間: 2025-3-22 16:34 作者: Graduated 時(shí)間: 2025-3-22 19:28 作者: labyrinth 時(shí)間: 2025-3-22 21:39
Willy Schneider,Alexander Hennigion mechanism to ensure the authenticity of data captured from blockchain and improve the efficiency and the scalability. The security, scalability, and efficiency of the method was analyzed, and the results showed that the method has lower overhead and good scalability while maintaining security.作者: 改進(jìn) 時(shí)間: 2025-3-23 02:13
Smart Contract Code Clone Detection Based on?Pre-training Techniquese reuse and vulnerabilities. Finally, we analyze the characteristics of these existential code cloning contracts. The results show that the performance of our experimental method is 1%–4% better than the current best detection method.作者: Affirm 時(shí)間: 2025-3-23 08:29
Research on?Regulation Oriented Decentralized Oracle Machineion mechanism to ensure the authenticity of data captured from blockchain and improve the efficiency and the scalability. The security, scalability, and efficiency of the method was analyzed, and the results showed that the method has lower overhead and good scalability while maintaining security.作者: ORBIT 時(shí)間: 2025-3-23 12:12 作者: 鉆孔 時(shí)間: 2025-3-23 17:28 作者: CLOUT 時(shí)間: 2025-3-23 20:16
A General Smart Contract Vulnerability Detection Framework with?Self-attention Graph Poolingmutability, smart contracts still exhibit various vulnerabilities that hackers can exploit, resulting in significant losses. Numerous smart contracts on various blockchains, including Ethereum, have been attacked due to various vulnerabilities. The inefficiency of detecting these vulnerabilities has作者: 厚臉皮 時(shí)間: 2025-3-24 01:15
The Best of?Both?Worlds: Integrating Semantic Features with?Expert Features for?Smart Contract Vulne due to the immutable and irreversible features, vulnerable smart contracts which have been deployed in the the blockchain can only be detected rather than fixed. Conventional approaches heavily rely on hand-crafted vulnerability rules, which is time-consuming and difficult to cover all the cases. R作者: PATHY 時(shí)間: 2025-3-24 02:32 作者: 瑣事 時(shí)間: 2025-3-24 09:20 作者: 起草 時(shí)間: 2025-3-24 13:23 作者: expeditious 時(shí)間: 2025-3-24 18:48 作者: EXALT 時(shí)間: 2025-3-24 22:41 作者: 炸壞 時(shí)間: 2025-3-25 00:52 作者: 拒絕 時(shí)間: 2025-3-25 05:51
Long-Term Blockchain Transactions Spanning Multiplicity of Smart Contract Methodsstraints that complicate the design and development of smart contracts, software that controls the blockchain transactions. Blockchain applications that involve collaborations of multiplicity of actors, such as in trade of goods and services, give rise to additional complexity in that transaction ac作者: 發(fā)炎 時(shí)間: 2025-3-25 09:49 作者: 新星 時(shí)間: 2025-3-25 15:30 作者: Scintigraphy 時(shí)間: 2025-3-25 16:29
Obric: Oblivious Keyword Search in?Hyperledger Fabric Platformsers’ search intentions, behavior, and interests from access patterns, which can be used for targeted attacks, phishing, or identity theft. Access pattern disclosure may also jeopardize the confidentiality of the searched data, as it may reveal sensitive information related to the queried data..Trad作者: 闖入 時(shí)間: 2025-3-25 21:50
A Distributed, Penetrative and?All-Dimensional Supervision Architecture for?Consortium Blockchainfor consortium blockchain faces serious challenges: Firstly, due to the sealied feature of consortium blockchain, it should build up the effective and robust computation mechanism for distributed supervision between various platforms; Secondly, due to the sensitivity of supervision data, data transm作者: NOVA 時(shí)間: 2025-3-26 02:04 作者: chastise 時(shí)間: 2025-3-26 05:48 作者: Gesture 時(shí)間: 2025-3-26 11:39 作者: 舞蹈編排 時(shí)間: 2025-3-26 13:20
Communications in Computer and Information Sciencehttp://image.papertrans.cn/b/image/189232.jpg作者: Substance 時(shí)間: 2025-3-26 20:33
Blockchain and Trustworthy Systems978-981-99-8104-5Series ISSN 1865-0929 Series E-ISSN 1865-0937 作者: 辭職 時(shí)間: 2025-3-26 21:50
Lexikon Informatik und Kommunikationstechnikmutability, smart contracts still exhibit various vulnerabilities that hackers can exploit, resulting in significant losses. Numerous smart contracts on various blockchains, including Ethereum, have been attacked due to various vulnerabilities. The inefficiency of detecting these vulnerabilities has作者: Exclude 時(shí)間: 2025-3-27 02:24 作者: 多嘴 時(shí)間: 2025-3-27 08:56 作者: 溺愛(ài) 時(shí)間: 2025-3-27 11:05 作者: Texture 時(shí)間: 2025-3-27 17:10 作者: Encoding 時(shí)間: 2025-3-27 21:43 作者: 生命 時(shí)間: 2025-3-27 23:41
https://doi.org/10.1007/978-3-540-79862-0 data transmission in this process. In this research, we initially use a communication control gateway on the edge server to distinguish malicious and non-malicious message requests from machines and forward them to the onion routing (OR) network to overcome the aforementioned security vulnerabiliti作者: 衍生 時(shí)間: 2025-3-28 04:23
https://doi.org/10.1007/978-3-540-79862-0 state-of-the-art covert channels due to their decentralization property. Most existing blockchain-based covert channels require the sender to create transactions. Creating transactions requires a fee, and transactions with covert information are permanently stored on the blockchain. Implementing su作者: Cloudburst 時(shí)間: 2025-3-28 08:10
Willy Schneider,Alexander Hennigstraints that complicate the design and development of smart contracts, software that controls the blockchain transactions. Blockchain applications that involve collaborations of multiplicity of actors, such as in trade of goods and services, give rise to additional complexity in that transaction ac作者: 減震 時(shí)間: 2025-3-28 11:01
https://doi.org/10.1007/978-3-540-79862-0ats of blackmail attacks. Currently, the use of the “Paofen” platform for money laundering is an emerging form of cryptocurrency laundering, providing payment and settlement assistance for fraud, gambling and other illegal crimes, contributing to the spread of cybercrime and greatly undermining the 作者: Spartan 時(shí)間: 2025-3-28 15:00 作者: Occlusion 時(shí)間: 2025-3-28 19:02
https://doi.org/10.1007/978-3-540-79862-0sers’ search intentions, behavior, and interests from access patterns, which can be used for targeted attacks, phishing, or identity theft. Access pattern disclosure may also jeopardize the confidentiality of the searched data, as it may reveal sensitive information related to the queried data..Trad作者: tangle 時(shí)間: 2025-3-28 23:56
Willy Schneider,Alexander Hennigfor consortium blockchain faces serious challenges: Firstly, due to the sealied feature of consortium blockchain, it should build up the effective and robust computation mechanism for distributed supervision between various platforms; Secondly, due to the sensitivity of supervision data, data transm作者: 誰(shuí)在削木頭 時(shí)間: 2025-3-29 06:35
Willy Schneider,Alexander Hennign security management. Because of this, the application of a blockchain-based collaborative healthcare system has been born, and blockchain has become the main driving force for the development of collaborative healthcare. However, the existing blockchain HIS (Hospital Management Information System)作者: Encumber 時(shí)間: 2025-3-29 09:47
A General Smart Contract Vulnerability Detection Framework with?Self-attention Graph Poolingous common vulnerabilities via a uniform framework. We leveraged the Abstract Syntax Trees (AST) and self-attention-based graph pooling models to generate topological graphs from smart contract code analysis. We adopted Graph Neural Networks for vulnerability detection. Experimental results demonstr作者: 胰臟 時(shí)間: 2025-3-29 14:03 作者: 后退 時(shí)間: 2025-3-29 15:51
MF-Net: Encrypted Malicious Traffic Detection Based on?Multi-flow Temporal Features, we use a public dataset provided by Qi An Xin for experimental evaluation. Experimental results show that MF-Net outperforms Graph Neural Network based multi-flow method. MF-Net can achieve 98.13% accuracy and 98.10% F1 score using 5 flows, which enables effective encrypted malicious traffic detec作者: forebear 時(shí)間: 2025-3-29 21:40
ePoW Energy-Efficient Blockchain Consensus Algorithm for?Decentralize Federated Learning System in?Rment metrics to facilitate the selection of participating nodes in the ePoW competition. Following a successful BFL global generation event, the dynamic difficulty adjustment mechanism collaborates with the engagement metrics to identify the most reliable node and mitigate resource consumption durin作者: Obvious 時(shí)間: 2025-3-30 01:36 作者: Magnitude 時(shí)間: 2025-3-30 04:56 作者: Transfusion 時(shí)間: 2025-3-30 11:50
Market Derivative Risks and Regulation of Cryptocurrency Trading Using “PaoFen” Platformsitutions to strengthen monitoring and analysis of “Paofen” money laundering, and block the spread of the Internet. For the governance of network blackmail, we should achieve a chain-wide crackdown on related crimes, construct a modeled abnormal data monitoring model, and strengthen the publicity of