Zobrazeno 1 - 10
of 20
pro vyhledávání: '"Qisi Liu"'
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 8, Iss 4, Pp 547-559 (2023)
Bitcoin is an electronic cryptocurrency developed based on Blockchain technology. With its decentralized feature, it has become incredibly popular since its invention. However, the Bitcoin network suffers from 51% attacks, where if malicious attacker
Externí odkaz:
https://doaj.org/article/4162c36ae3824ae7a8283bc8910217e0
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 7, Iss 1, Pp 16-27 (2022)
Blockchain technology has gained prominence over the last decade. Numerous achievements have been made regarding how this technology can be utilized in different aspects of the industry, market, and governmental departments. Due to the safety-critica
Externí odkaz:
https://doaj.org/article/174f8156b84942f29b070a32795b9a76
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 2, Pp 480-492 (2021)
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of
Externí odkaz:
https://doaj.org/article/8030697661804c33a027037f410b83c9
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 2, Pp 469-479 (2021)
The immense potential of the blockchain technology in diverse and critical applications (e.g., financial services, cryptocurrencies, supply chains, smart contracts, and automotive industry) has led to a new challenge: the dependability modeling and a
Externí odkaz:
https://doaj.org/article/abddfb2f94ea4e448121ec38457cd9ed
Autor:
Qisi Liu, Liudong Xing
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 1, Pp 15-29 (2021)
In this paper we model and analyze survivability and vulnerability of a cloud RAID (Redundant Array of Independent Disks) storage system subject to disk faults and cyber-attacks. The cloud RAID survivability is concerned with the system’s ability t
Externí odkaz:
https://doaj.org/article/34fd6b770854421a809b9ad97c6d8de3
Publikováno v:
Applied Sciences, Vol 13, Iss 1, p 422 (2022)
Selfish mining is a typical malicious attack targeting the blockchain-based bitcoin system, an emerging crypto asset. Because of the non-incentive compatibility of the bitcoin mining protocol, the attackers are able to collect unfair mining rewards b
Externí odkaz:
https://doaj.org/article/d78b828ce67b40309c8d052ab5f592a5
Publikováno v:
Engineering Reports, Vol 1, Iss 4, Pp n/a-n/a (2019)
Security is one of the major challenges for promoting the computer industry. Existing models for assessing security have mostly assumed that different hazards causing the security breach are independent of each other. Dependencies however can exist a
Externí odkaz:
https://doaj.org/article/7409b23c4c824a8496b7e519660b5f79
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 2, Pp 480-492 (2021)
The block chain technology has immense potential in many different applications, including but not limited to cryptocurrencies, financial services, smart contracts, supply chains, healthcare services, and energy trading. Due to the critical nature of
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 2, Pp 469-479 (2021)
The immense potential of the blockchain technology in diverse and critical applications (e.g., financial services, cryptocurrencies, supply chains, smart contracts, and automotive industry) has led to a new challenge: the dependability modeling and a
Autor:
Liudong Xing, Qisi Liu
Publikováno v:
International Journal of Mathematical, Engineering and Management Sciences, Vol 6, Iss 1, Pp 15-29 (2021)
In this paper we model and analyze survivability and vulnerability of a cloud RAID (Redundant Array of Independent Disks) storage system subject to disk faults and cyber-attacks. The cloud RAID survivability is concerned with the system’s ability t