咨询与建议

限定检索结果

文献类型

  • 2 篇 期刊文献

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 2 篇 工学
    • 2 篇 计算机科学与技术...
    • 1 篇 网络空间安全

主题

  • 1 篇 smart contracts
  • 1 篇 distributed ledg...
  • 1 篇 iot
  • 1 篇 differential pri...
  • 1 篇 blockchain
  • 1 篇 privacy
  • 1 篇 cyber security
  • 1 篇 risk of disclosu...
  • 1 篇 bitcoin
  • 1 篇 cryptocurrency
  • 1 篇 utility

机构

  • 1 篇 university of sa...
  • 1 篇 school of comput...
  • 1 篇 industrial techn...
  • 1 篇 cyber science la...
  • 1 篇 department of so...
  • 1 篇 department of in...
  • 1 篇 national chiao t...

作者

  • 2 篇 tooska dargahi
  • 1 篇 reza m.parizi
  • 1 篇 paul j.taylor
  • 1 篇 kim-kwang raymon...
  • 1 篇 ali dehghantanha
  • 1 篇 chia-mu yu
  • 1 篇 kang-cheng chen

语言

  • 2 篇 英文
检索条件"作者=Tooska Dargahi"
2 条 记 录,以下是1-10 订阅
排序:
Evaluating the Risk of Disclosure and Utility in a Synthetic Dataset
收藏 引用
Computers, Materials & Continua 2021年 第7期68卷 761-787页
作者: Kang-Cheng Chen Chia-Mu Yu tooska dargahi Industrial Technology Research Institute Hsinchu310Taiwan National Chiao Tung University Hsinchu320Taiwan University of Salford ManchesterM54WTUnited Kingdom
The advancement of information technology has improved the delivery of nancial services by the introduction of Financial Technology(FinTech).To enhance their customer satisfaction,Fintech companies leverage articial i... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论
A systematic literature review of blockchain cyber security
收藏 引用
Digital Communications and Networks 2020年 第2期6卷 147-156页
作者: Paul J.Taylor tooska dargahi Ali Dehghantanha Reza M.Parizi Kim-Kwang Raymond Choo School of Computing Science&EngineeringUniversity of SalfordManchesterUK Cyber Science Lab School of Computer ScienceUniversity of GuelphOntarioCanada Department of Software Engineering and Game Development Kennesaw State UniversityMariettaGA30060USA Department of Information Systems and Cyber Security University of Texas at San AntonioSan AntonioTX78249USA
Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008,blockchain has(slowly)become one of the most frequently discussed methods for securing data storage and transfer through decentralized,trustle... 详细信息
来源: 维普期刊数据库 维普期刊数据库 评论