We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 21-40 of 10,000 results
  1. Trust factor-based analysis of user behavior using sequential pattern mining for detecting intrusive transactions in databases

    Organizations today are employing databases on a large scale to store data essential for their functioning. Malicious access and modifications of the...

    Indu Singh, Rajni **dal in The Journal of Supercomputing
    Article 21 February 2023
  2. Configuration and Implementation of Novel and Safe Methodology for Processing Real Estate Transactions by Utilizing Hyperledger Fabric

    Beyond trust issues, blockchain has other benefits for businesses, like cost savings from increased productivity, speed, and automation. Blockchain...

    Vishalkumar Langaliya, Jaypalsinh A. Gohil in SN Computer Science
    Article 23 August 2023
  3. LDAP Transactions

    In this chapter, you will learn
    Balaji Varanasi, Andres Sacco in Practical Spring LDAP
    Chapter 2023
  4. Deep Neural Networks Based Security Solution for ATM Transactions

    This paper provides you with a description of this new approach for the security of ATM transactions for its subscribers. Looking towards the banking...
    Neeraj Joshi, Sheshikala Martha, ... Sushil Kumar Singh in Recent Trends in Image Processing and Pattern Recognition
    Conference paper 2024
  5. CT-GCN: a phishing identification model for blockchain cryptocurrency transactions

    With the widespread application of blockchain technology, the cyberspace security issue of phishing has also appeared in the emerging blockchain...

    Bingxue Fu, **ng Yu, Tao Feng in International Journal of Information Security
    Article 11 August 2022
  6. Detecting malicious transactions in database using hybrid metaheuristic clustering and frequent sequential pattern mining

    Database systems have become imperative for organisations around the world to store and analyse information. However, as one of the ramifications of...

    Rajni **dal, Indu Singh in Cluster Computing
    Article 01 June 2022
  7. Lelantus Spark: Secure and Flexible Private Transactions

    We propose a modification to the Lelantus private transaction protocol to provide recipient privacy, improved security, and additional usability...
    Conference paper 2023
  8. Long-Term Blockchain Transactions Spanning Multiplicity of Smart Contract Methods

    Research on blockchains addresses multiple issues, with one being writing smart contracts. In develo** smart contracts, blockchains have complex...
    Chris G. Liu, Peter Bodorik, Dawn Jutla in Blockchain and Trustworthy Systems
    Conference paper 2024
  9. A Formal Model for Startups Financial Transactions

    This paper proposes a formal model for a subset of the startup finance transaction space. The initial version of the provided domain is the result of...
    Rodrigo Stevaux, Ana C. V. de Melo in Formal Methods: Foundations and Applications
    Conference paper 2024
  10. Memory Forensics for Artefacts Recovery from Ether Transactions

    Use of cryptocurrencies in crimes like money laundering, ransomware, narcotics trade and terror funding has been on increase. There is a disturbing...
    Borase Bhushan Gulabrao, Digvijaysinh Rathod, Aishwarya Tiwari in Information Security, Privacy and Digital Forensics
    Conference paper 2024
  11. Ordering Transactions with Bounded Unfairness: Definitions, Complexity and Constructions

    An important consideration in the context of distributed ledger protocols is fairness in terms of transaction ordering. Recent work [Crypto 2020]...
    Aggelos Kiayias, Nikos Leonardos, Yu Shen in Advances in Cryptology – EUROCRYPT 2024
    Conference paper 2024
  12. Intel PMDK Transactions: Specification, Validation and Concurrency

    Software Transactional Memory (STM) is an extensively studied paradigm that provides an easy-to-use mechanism for thread safety and concurrency...
    Azalea Raad, Ori Lahav, ... Brijesh Dongol in Programming Languages and Systems
    Conference paper Open access 2024
  13. Upload the Transactions File

    Design the dashboard of our application. We start that by creating the Upload File section where we can upload our transactions CSV file and once the...
    Video segment 2022
  14. HoME: Homogeneity-Mining-Based Embedding Towards Detecting Illicit Transactions on Bitcoin

    Cryptocurrencies have brought booming economic innovations in recent years, but they have also given rise to many intractable problems related to...
    Zitian Chen, Guang Li, ... Jieying Zhou in Web and Big Data
    Conference paper 2024
  15. Efficient Execution of Blockchain Transactions Through Deterministic Concurrency Control

    Concurrently executing Blockchain transactions can make good use of modern hardware and improve system performance. Recent works mainly utilize a...
    Huahui **a, **chuan Chen, ... **aoyong Du in Database Systems for Advanced Applications
    Conference paper 2023
  16. GPChain: Optimizing Cross-Shard Transactions and Load Imbalance in Sharded Blockchain Networks

    Sharded blockchain provides a better linear scalability and scalability compared to traditional blockchain by dividing the blockchain into several...
    Hongmu Han, Sheng Chen, ... Wenlong Tian in Internet of Things – ICIOT 2023
    Conference paper 2024
  17. BAnDIT: Business Process Anomaly Detection in Transactions

    Business process anomaly detection enables the prevention of misuse and failures. Existing approaches focus on detecting anomalies in control,...
    Nico Rudolf, Kristof Böhmer, Maria Leitner in Cooperative Information Systems
    Conference paper 2024
  18. Leveraging Blockchain and NFTs for Collaborative Real Estate Transactions

    This paper delves into the transformative potential of block- chain technology and Non-Fungible Tokens (NFTs) in the real estate sector, a critical...
    Vinh T. Nguyen, Triet M. Nguyen, ... Ngan N. T. Kim in Cloud Computing – CLOUD 2023
    Conference paper 2024
  19. Integration of Blockchain for securing the transactions in Supply Chain Management

    Blockchain is a progressive technology in many applications, such as supply chain management. Blockchain technology is gaining attention due to its...

    R. Dhivya, J. Senthil Kumar, ... Rengarajan Amirtharajan in Multimedia Tools and Applications
    Article 10 June 2024
Did you find what you were looking for? Share feedback.