From post

A Conceptual Model to Identify Illegal Activities on the Bitcoin System.

, , , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 18-34. Springer, (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A framework for integrated risk management process using survival analysis approach in information security., , и . IAS, стр. 185-190. IEEE, (2010)Fuzzy Based Threat Analysis in Total Hospital Information System., , , , и . AST/UCMA/ISA/ACN, том 6059 из Lecture Notes in Computer Science, стр. 1-14. Springer, (2010)A Systematic Literature Review of Authentication in Internet of Things for Heterogeneous Devices., , , , , и . J. Comput. Networks Commun., (2019)Assessing Cloud Computing Security Threats in Malaysian Organization Using Fuzzy Delphi Method., , и . SCDM, том 457 из Lecture Notes in Networks and Systems, стр. 252-263. Springer, (2022)Fractional Active Contour Model for Edge Detector on Medical Image Segmentation., , и . IVSP, стр. 39-44. ACM, (2020)Security threats categories in healthcare information systems., , и . Health Informatics J., 16 (3): 201-209 (2010)Current State of Cloud Computing Risk Assessment in Malaysian Private Sector., , и . ICCTA, стр. 26-30. ACM, (2020)Security risk assessment framework for cloud computing environments., , , , и . Secur. Commun. Networks, 7 (11): 2114-2124 (2014)A Conceptual Model to Identify Illegal Activities on the Bitcoin System., , , , и . ACeS, том 1487 из Communications in Computer and Information Science, стр. 18-34. Springer, (2021)Detecting False Messages in the Smartphone Fault Reporting System., , , , , , и . IRICT, том 1073 из Advances in Intelligent Systems and Computing, стр. 759-768. Springer, (2019)