Aljumaie, G. S., & Alhakami, W. J. S. (2022). A secure LEACH-PRO protocol based on blockchain. Sensors, 22(21), 8431.
Bar-Zur, R., Abu-Hanna, A., Eyal, I., & Tamar, A. (2022). WeRLman: to tackle whale (transactions), go deep (RL). Proceedings of the 15th ACM International Conference on Systems and Storage, 148-148.
Huang, Y. (2022). The role of artificial intelligence technology in promoting the development of my country's sports industry. The 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022).
Li, P., Xie, Y., Xu, X., Zhou, J., & Xuan, Q. (2022). Phishing fraud detection on ethereum using graph neural network. Proceedings International Conference on Blockchain and Trustworthy System, 362-375, Singapore: Springer Nature Singapore.
Blockchain Security-Efficiency Analysis based on DEA-SBM Model
It is estimated that by 2023 the security market will reach a value of $1.4 billion. This growth is primarily driven by the increasing use of technology in sectors like finance, healthcare and logistics. As more companies adopt technology there is a growing need to protect their data from hacking and other malicious activities. The security of the network plays a role in ensuring the implementation and adoption of technology. Given the rise in cyberattacks and data breaches it is expected that the importance of security will continue to grow in the coming years. In this study we will explore some companies that specialize in providing security solutions. Our analysis will be based on three factors and two desired outcomes. The selected companies include Hacken, Quantstamp, OpenZeppelin, Trail of Bits, ConsenSys, Certik, LeastAuthority, PWC Switzerland, Slowmist and Runtime Verification. The purpose of this research paper is to assess the effectiveness of the security industry for decision makers, experts and government entities. By gaining insights into this sector and enhancing network security measures for implementations, across industries.
Aljumaie, G. S., & Alhakami, W. J. S. (2022). A secure LEACH-PRO protocol based on blockchain. Sensors, 22(21), 8431.
Bar-Zur, R., Abu-Hanna, A., Eyal, I., & Tamar, A. (2022). WeRLman: to tackle whale (transactions), go deep (RL). Proceedings of the 15th ACM International Conference on Systems and Storage, 148-148.
Huang, Y. (2022). The role of artificial intelligence technology in promoting the development of my country's sports industry. The 2nd International Conference on Artificial Intelligence, Automation, and High-Performance Computing (AIAHPC 2022).
Li, P., Xie, Y., Xu, X., Zhou, J., & Xuan, Q. (2022). Phishing fraud detection on ethereum using graph neural network. Proceedings International Conference on Blockchain and Trustworthy System, 362-375, Singapore: Springer Nature Singapore.
There are 4 citations in total.
Details
Primary Language
English
Subjects
Software Engineering (Other)
Journal Section
Articles
Authors
Thi Minh Nhut Vo
Vietnam
Chia-nan Wang
National Kaohsiung University of Science and TechnologyVietnam
Fu-chiang Yang
National Kaohsiung University of Science and TechnologyVietnam
Van Thanh Tien Nguyen
Industrial University of Ho Chi Minh CityVietnam
Vo, T. M. N., Wang, C.-n., Yang, F.-c., Nguyen, V. T. T. (2023). Blockchain Security-Efficiency Analysis based on DEA-SBM Model. The Eurasia Proceedings of Science Technology Engineering and Mathematics, 23, 202-208. https://doi.org/10.55549/epstem.1365786