Conference Paper
BibTex RIS Cite
Year 2023, Volume: 23, 202 - 208, 30.09.2023
https://doi.org/10.55549/epstem.1365786

Abstract

References

  • Aljumaie, G. S., & Alhakami, W. J. S. (2022). A secure LEACH-PRO protocol based on blockchain. Sensors, 22(21), 8431.
  • Bar-Zur, R., Abu-Hanna, A., Eyal, I., & Tamar, A. (2022). WeRLman: to tackle whale (transactions), go deep (RL). Proceedings of the 15th ACM International Conference on Systems and Storage, 148-148.
  • Huang, Y. (2022). The role of artificial intelligence technology in promoting the development of my country's sports industry. The 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022).
  • Li, P., Xie, Y., Xu, X., Zhou, J., & Xuan, Q. (2022). Phishing fraud detection on ethereum using graph neural network. Proceedings International Conference on Blockchain and Trustworthy System, 362-375, Singapore: Springer Nature Singapore.

Blockchain Security-Efficiency Analysis based on DEA-SBM Model

Year 2023, Volume: 23, 202 - 208, 30.09.2023
https://doi.org/10.55549/epstem.1365786

Abstract

It is estimated that by 2023 the security market will reach a value of $1.4 billion. This growth is primarily driven by the increasing use of technology in sectors like finance, healthcare and logistics. As more companies adopt technology there is a growing need to protect their data from hacking and other malicious activities. The security of the network plays a role in ensuring the implementation and adoption of technology. Given the rise in cyberattacks and data breaches it is expected that the importance of security will continue to grow in the coming years. In this study we will explore some companies that specialize in providing security solutions. Our analysis will be based on three factors and two desired outcomes. The selected companies include Hacken, Quantstamp, OpenZeppelin, Trail of Bits, ConsenSys, Certik, LeastAuthority, PWC Switzerland, Slowmist and Runtime Verification. The purpose of this research paper is to assess the effectiveness of the security industry for decision makers, experts and government entities. By gaining insights into this sector and enhancing network security measures for implementations, across industries.

References

  • Aljumaie, G. S., & Alhakami, W. J. S. (2022). A secure LEACH-PRO protocol based on blockchain. Sensors, 22(21), 8431.
  • Bar-Zur, R., Abu-Hanna, A., Eyal, I., & Tamar, A. (2022). WeRLman: to tackle whale (transactions), go deep (RL). Proceedings of the 15th ACM International Conference on Systems and Storage, 148-148.
  • Huang, Y. (2022). The role of artificial intelligence technology in promoting the development of my country's sports industry. The 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022).
  • Li, P., Xie, Y., Xu, X., Zhou, J., & Xuan, Q. (2022). Phishing fraud detection on ethereum using graph neural network. Proceedings International Conference on Blockchain and Trustworthy System, 362-375, Singapore: Springer Nature Singapore.
There are 4 citations in total.

Details

Primary Language English
Subjects Software Engineering (Other)
Journal Section Articles
Authors

Thi Minh Nhut Vo

Chia-nan Wang

Fu-chiang Yang

Van Thanh Tien Nguyen

Early Pub Date September 25, 2023
Publication Date September 30, 2023
Published in Issue Year 2023Volume: 23

Cite

APA Vo, T. M. N., Wang, C.-n., Yang, F.-c., Nguyen, V. T. T. (2023). Blockchain Security-Efficiency Analysis based on DEA-SBM Model. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 23, 202-208. https://doi.org/10.55549/epstem.1365786