CN107104850A - A kind of Quantum Chain method of testing - Google Patents
A kind of Quantum Chain method of testing Download PDFInfo
- Publication number
- CN107104850A CN107104850A CN201710182050.XA CN201710182050A CN107104850A CN 107104850 A CN107104850 A CN 107104850A CN 201710182050 A CN201710182050 A CN 201710182050A CN 107104850 A CN107104850 A CN 107104850A
- Authority
- CN
- China
- Prior art keywords
- test
- network
- quantum
- testing
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/50—Testing arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/70—Software maintenance or management
- G06F8/71—Version control; Configuration management
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/12—Discovery or management of network topologies
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/14—Network analysis or design
- H04L41/145—Network analysis or design involving simulating, designing, planning or modelling of a network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0805—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
- H04L43/0817—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0852—Delays
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
- H04L43/0876—Network utilisation, e.g. volume of load or congestion level
- H04L43/0888—Throughput
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
Abstract
The present invention relates to a kind of Quantum Chain method of testing, the platform for Quantum Chain will be before being disposed, and test must keep stringency;Method of testing includes the functional test of software, network P 2 P test, aggressive test, reliability testing etc., method of testing covering is complete, need to consider various aspects when will use Quantum Chain system, and it will issue and update in test network, enter the examination of line code before issue, effectively ensure security, the availability of system by test.
Description
Technical field
It is a kind of Quantum Chain method of testing the present invention relates to quantum catenary system on internet.
Background technology
In quantum catenary system, primary is directed to one compatible UTXO model towards the High Availabitity of different industries of offer
POS intelligent contract platform.UTXO models are a parts for bit coin network very core, and code therein possesses ratio
Higher maturity, in compatibility UTXO models among these, can not only receive other developers of the bit coin ecosystem and show
There is developing instrument, there can also be relatively good security.In addition, the virtual machine part on intelligent contract, the survey of Quantum Chain
Virtual machine must be also supported in examination network.Therefore, quantum catenary system will pass through a series of strict tests before distribution, pass through
Sophisticated software testing process, carrys out control software quality.
The content of the invention
In view of this, the present invention provides a kind of Quantum Chain method of testing for solving or partly solving the above problems.
To reach the effect of above-mentioned technical proposal, the technical scheme is that:A kind of Quantum Chain method of testing, comprising with
Lower content:
Functional test, each method for the application programming interface of Quantum Chain core is tested, it is necessary in generation
Reached on code 85% coverage rate, for each methods described describe in detail specification in additional test logic, to cover complexity
Case;
Scrnario testing, defines the high level scene set with complicated test logic, comprising:
1. the new assets of distribution;
2. create new transaction;
3. create specific order, and the need for being recorded in assets to meet quantum coin;
4. do a set of transaction;
Final result is tracked, the scrnario testing must include interacting for subsystem and patrolling for complexity
Volume;
Network test, wherein network delay and throughput problem emphatically, test of the operation with different topology structure
Network, and simulate different situations:The first situation is, the degeneration of network key connection delay;Second of situation be, network
The degeneration of the handling capacity of middle key node;
Network P 2 P is tested, and builds network and analog case set to obtain peer-to-peer network:
1. core name node will be eliminated by third party;
2. network will be decomposed into separate sub-network;
3. note the speed of transaction and block in heterogeneous networks topological broadcast;
4. the problem of avoiding circulating propagation;
Performance test, can allow for verifying the calculating performance of a local node, without considering network delay effect;In order to
Such test, we have to carry out network virtualization model and go to exclude network effect, and test is necessary for each application program and compiled
Journey interface performs progress large-scale application Program Interfaces and called;
A scalable network is tested, and high load capacity degraded test and the high load capacity test of different topology structure are carried out wherein,
In high load capacity degraded test, operation Quantum Chain system interior joint set and the transaction of generation maximum quantity per second will
Both propagate in a network, collection of statistical data and reduction and the other problemses for observing performance;In the different topology knot
In the high load capacity test of structure, the node set operated in different topological structures, and produce transaction flow;
The storage test of scalability, produces the local entity of maximum quantity, and verify key parameter and all look into
The degeneration of inquiry;
Finance test, in the finance test, carries out decimal accuracy test, the complex transaction with final balance checking
Generation scheme, system time F.F. experiment;
Financial crisis is tested, in the case of different financial crises, carries out benchmark test, can be false in the benchmark test
If condition for the huge rate of recovery, license gateway it is default, encryption gateway default, tested on this condition;
Aggressiveness test, for the complicated threat modeling that system design is enough, and analyze all possible threat and
Attempt to avoid its generation, be that they create sharp alleviation plan;And, it is necessary to which testing standard is attacked, the standard is attacked
Hit and spread unchecked comprising dual cost attack, common recognition attack, the transaction of distributed denial of service;
Reliability testing, the relevant specific test of system is carried out on special virtual machine and observe they how along with
Time performs their activity, all key parameters is being noted among these, and attempt to find out the degenerate case of key parameter;
Active block is tested, and what only operation was seldom has different topology structure, disables/enable node, with network key
The network of parameter degradation, just for active block, is noting the situation when full node will be unable to use among these;
The completely available property of file can be realized on network with storage test, dispose complete network, and upload network text
Part and node is destroyed one by one, to observe whether network can provide required availability level;
Security test, analyzes useful safety problem, and all overlay areas are carried out with complicated analysis;
Version is tested, and test network is disposed during this, and is disposed over the network after the node of new different editions,
Attempt to pass through every other test.
The present invention useful achievement be:The invention provides a kind of Quantum Chain method of testing, the platform of Quantum Chain will be in quilt
Pass through strict test before deployment;This includes the functional test of software, network P 2 P test, aggressive test, reliability testing
Deng, and renewal will be issued in test network, the examination of line code is entered before issue, test effectively ensures the safety of system
Property, availability.
Embodiment
In order that technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only to explain
The present invention, is not intended to limit the present invention, and can realize that the product of said function belongs to equivalent substitution and improvement, be all contained in this hair
Within bright protection domain.Specific method is as follows:
Embodiment 1:It must all complete and be announced in Internet community in all tests of setting up every time weekly.Test Strategy
It is as follows:
1. functional test
For quantum core api each method.We must reach 85% coverage rate on code.For each side
We will be explained in additional test logic in specification to method, can so cover the case of complexity.Therefore, we will determine
Our logic function is intact defined in specification and make good progress.
2. scrnario testing
We define the high level scene set with complicated test logic, comprising:
1. the new assets of distribution
2. create new transaction
3. create specific order, and the need for being recorded in assets to meet quantum coin.
4. do a set of transaction
Final result is tracked, such scrnario testing must include interacting for subsystem and patrolling for complexity
Volume.
3. network test
We must focus on network delay and throughput problem in this test.
We must run the test network with different topology structure, and must simulate different situations.The first
Situation is, the degeneration of network key connection delay, and second of situation be, the degeneration of the handling capacity of key node in network.We
It must pay close attention to how network shows and adapt to such case.
4. network P 2 P is tested
We must build network and analog case set to obtain peer-to-peer network.
1. core name node will be eliminated by third party.
2. network will be decomposed into separate sub-network.
3. note the speed of transaction and block in heterogeneous networks topological broadcast.
4. the problem of avoiding circulating propagation.
5. performance test
Performance test can allow for us and verify the calculating performance of a local node, without considering network delay effect.
For such test, we have to carry out network virtualization model and go to exclude network effect.Test is necessary for each API and performed
Carry out extensive API Calls.For example, the millions of transaction of establishment per second and the degeneration of observation core capabilities parameter.
6. a scalable network is tested
Some topologys that we less must be realized on network:
1. core network node
2. proxy network node
High load capacity Degrading experiment
We must run the transaction of node set and generation maximum quantity per second and propagate in a network.Collect statistics
Data and reduction and the other problemses for observing performance.
The high load capacity of different topology structure
We must run node set, and produce transaction flow, but all these nodes will be included in different open up
Flutter in structure.
7. the storage test of scalability
We must produce the local entity of maximum quantity, and verify key parameter and the degeneration of all inquiries.
8. finance test
We must carry out the finance test of many standards.
1. decimal accuracy test
2. the complex transaction generation scheme with final balance checking
The time F.F. experiment of lifetime of system in 3.10
9. financial crisis is tested
System must be reliable in the case of different financial crises.We need to carry out benchmark test to them:
1. the huge rate of recovery
2. permit the default of gateway
3. encryption gateway is default
10. aggressiveness test
We must be for the enough complicated threat modelings of system design.We must analyze all possible threat simultaneously
And attempt to avoid its generation, it is that they create sharp alleviation plan.
For example, we there is a situation where to cover, the situation is that intelligent contract logic can be passed by hacker attacks and value
Bad user will be distributed to by passing.
Also, we must test the testing standard in these networks and attack, such as:
1. dual cost attack
2. common recognition attack
3. the transaction of distributed denial of service is spread unchecked
11. reliability testing
System must be reliable.We must carry out the relevant specific test of system on special virtual machine and observe them
How their activity is performed along with the time.It must be noted that all key parameters, and attempt to find out the degeneration of key parameter
Situation.
12. active block is tested
We, which must run, seldom have different topology structure, disables/enable node, with network key parameter degradation
Network.Particularly, the situation that we must be noted that is, when full node will be unable to use.
13. storage test can be used
We must realize the completely available property of file on network.It would therefore be desirable to dispose complete network, upload
Network file and node is destroyed one by one, to observe whether network can provide required availability level.
14. security test
The problem of we must analyze useful safety problem such as buffer overflow.We are carried out to all overlay areas
Complexity analysis.
15. version is tested
We must dispose test network, and be disposed on network after the node of new different editions, attempt by all
Other tests.
Embodiment 2:The formalization logic of test
The establishment of transaction:
Wherein,
The establishment of block:
Wherein,Proved for test, the test proves to be used for by selecting evidence scheme to create block.
Evidence scheme has Proof-of-Work | Proof-of-Stake | tri- kinds of Proof-of-Time.
The establishment of intelligent contract:
Create address, private key and public key:
The test transaction propagation time:
Test block is set up and the propagation time:
Test protection to network attack is directed to following aspect:Unwarranted expenditure, double expenditures, competition attack, history
Modification, excavation privately, Sybil attack, 51% attack.
The preferred embodiments of the invention is the foregoing is only, the claims of the present invention are not limited to.
Simultaneously it is described above, for those skilled in the technology concerned it would be appreciated that and implement, therefore other be based on institute of the present invention
The equivalent change that disclosure is completed, should be included in the covering scope of the claims.
The present invention useful achievement be:The invention provides a kind of Quantum Chain method of testing, the platform of Quantum Chain will be in quilt
Pass through strict test before deployment;This includes the functional test of software, network P 2 P test, aggressive test, reliability testing
Deng, and renewal will be issued in test network, the examination of line code is entered before issue, test effectively ensures the safety of system
Property, availability.
Claims (1)
1. a kind of Quantum Chain method of testing, applied to quantum catenary system, it is characterised in that include functional test, scrnario testing, net
Network test, network P 2 P test, performance test, a scalable network test, the storage of scalability test, finance test, finance danger
Machine test, aggressive test, reliability testing, active block are tested, can tested with storage test, security test, version:
The functional test, testing needle is to each method of the application programming interface of the quantum catenary system center heart, coverage rate
On reach 85%, the additional test logic in specification is described in detail, to cover the case of complexity;
The scrnario testing, is tested the high level scene set in quantum catenary system, and the high level scene set is comprising more
Individual test scene, the test scene is included:1. the new assets of distribution;2. create new transaction;3. specific order is created, and
The need for being recorded in assets to meet quantum coin;4. carry on a deal;
The final result of the scrnario testing is tracked, the scrnario testing must interacting comprising subsystem;
The network test, the test network of the network test operation with different topology structure, and simulate wherein different
Situation:The first situation is, the degeneration of crucial connection delay in network;Second of situation is that key node gulps down in network
The degeneration for the amount of telling;
The network P 2 P test, builds the situation set of network and simulation to obtain peer-to-peer network, the situation set is as follows:
1. the core name node in network will be eliminated by the third party merchandised;
2. network is broken down into separate sub-network;
3. block is propagated in heterogeneous networks topological structure, wherein the speed of transaction is brought into as key value;
4. the possibility of circulating propagation is removed;
The performance test, the calculating performance of a local node is verified in the case where not considering the carryover effects of network;The performance
Test execution network virtualization model is to exclude the unfavorable effect of network, and the execution of each application programming interface can be advised greatly
Call other applications DLL mould;
The a scalable network test, the high load capacity test comprising high load capacity degraded test and different topology structure, described
In high load capacity degraded test, the operation Quantum Chain system interior joint set and transaction of generation maximum quantity per second, make both
Propagated in network, statistics and the problem of observe the reduction and related generation of performance;In the different topology structure
In high load capacity test, the node set operated in different topological structures, and produce transaction flow;
The storage test of the scalability, is extended, extension produces the local entity pair of maximum quantity to quantum catenary system
As, and verify all key parameters and the degeneration of inquiry during generation;
The finance test, in the finance test, carries out decimal accuracy test, the complex transaction verified with resulting balance
Generation scheme, system time F.F. experiment, the decimal accuracy test are carried out in precision to the numeral after the decimal point of fund
Test, the complex transaction generation scheme verified with resulting balance is in the final result to large-scale, complicated transaction
Remaining sum verified, verify the accuracy of the number of remaining sum, system time F.F. experiment for prediction future transaction money
Gold change;
The financial crisis test, in the case of different financial crises, carries out benchmark test, assumes in the benchmark test
Condition be the huge rate of recovery, license gateway it is default, encryption gateway default, assuming that under conditions of tested;
The aggressive test, for the complicated threat modeling that Quantum Chain system design is enough, and analyzes all possible prestige
Coerce and attempt to avoid its generation, be that described threaten creates sharp alleviation plan;And, it is necessary to testing standard is attacked,
The standard attacks include dual cost attack, common recognition attack, the spilling of the transaction of distributed denial of service;
The reliability testing, carries out the specific test and observation specific survey related to quantum catenary system on special virtual machine
The change that is shown along with the change of time is tried, moving back for the specific test and the key parameter in the change is found out
Change;
The active block test, is tested, the active block is tool in the active block test for active block
Have less different topology structure, disable and enable node, the network of network key parameter degradation, for that can not make when full node
The situation of used time carries out stress test;
It is described that the completely available property of file is realized on network with storage test, complete network is disposed, and upper transmitting file is simultaneously
Node sequentially in destruction network, to observe whether network can provide required availability level;
All safety problems in the security test, analysis Quantum Chain system, and to all coverings of the safety problem
Region carries out complicated analysis;
Version test, disposes test network during this, and disposes on this test network the section of new different editions
After point, attempt by all other tests tested except the version.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710182050.XA CN107104850A (en) | 2017-03-24 | 2017-03-24 | A kind of Quantum Chain method of testing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710182050.XA CN107104850A (en) | 2017-03-24 | 2017-03-24 | A kind of Quantum Chain method of testing |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107104850A true CN107104850A (en) | 2017-08-29 |
Family
ID=59674751
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710182050.XA Pending CN107104850A (en) | 2017-03-24 | 2017-03-24 | A kind of Quantum Chain method of testing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107104850A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107844704A (en) * | 2017-11-01 | 2018-03-27 | 济南浪潮高新科技投资发展有限公司 | One kind is based on block chain believable intelligent contract reinforcement means |
CN109471744A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The more subchain system architectures of main chain adduction row based on block chain |
CN109508981A (en) * | 2017-09-15 | 2019-03-22 | 富士通株式会社 | Method and apparatus for testing intelligent contract |
CN110162470A (en) * | 2019-04-28 | 2019-08-23 | 阿里巴巴集团控股有限公司 | A kind of test method and device of block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6804709B2 (en) * | 2001-02-20 | 2004-10-12 | Microsoft Corporation | System uses test controller to match different combination configuration capabilities of servers and clients and assign test cases for implementing distributed testing |
CN101820346A (en) * | 2010-05-04 | 2010-09-01 | 北京飞天诚信科技有限公司 | Secure digital signature method |
CN102184353A (en) * | 2011-04-02 | 2011-09-14 | 方园 | Method for preventing online payment data from being intercepted |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
CN106503098A (en) * | 2016-10-14 | 2017-03-15 | 中金云金融(北京)大数据科技股份有限公司 | It is built in the block chain cloud service frame system of Paas service layers |
-
2017
- 2017-03-24 CN CN201710182050.XA patent/CN107104850A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6804709B2 (en) * | 2001-02-20 | 2004-10-12 | Microsoft Corporation | System uses test controller to match different combination configuration capabilities of servers and clients and assign test cases for implementing distributed testing |
CN101820346A (en) * | 2010-05-04 | 2010-09-01 | 北京飞天诚信科技有限公司 | Secure digital signature method |
CN102184353A (en) * | 2011-04-02 | 2011-09-14 | 方园 | Method for preventing online payment data from being intercepted |
CN106101242A (en) * | 2016-06-24 | 2016-11-09 | 深圳前海微众银行股份有限公司 | The construction method of block chain cloud service platform and device |
CN106503098A (en) * | 2016-10-14 | 2017-03-15 | 中金云金融(北京)大数据科技股份有限公司 | It is built in the block chain cloud service frame system of Paas service layers |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109508981A (en) * | 2017-09-15 | 2019-03-22 | 富士通株式会社 | Method and apparatus for testing intelligent contract |
CN107844704A (en) * | 2017-11-01 | 2018-03-27 | 济南浪潮高新科技投资发展有限公司 | One kind is based on block chain believable intelligent contract reinforcement means |
CN107844704B (en) * | 2017-11-01 | 2019-12-31 | 浪潮集团有限公司 | Credible intelligent contract reinforcing method based on block chain |
CN109471744A (en) * | 2018-11-21 | 2019-03-15 | 北京蓝石环球区块链科技有限公司 | The more subchain system architectures of main chain adduction row based on block chain |
CN109471744B (en) * | 2018-11-21 | 2021-08-17 | 北京蓝石环球区块链科技有限公司 | Main chain and parallel multi-sub-chain system architecture based on block chain |
CN110162470A (en) * | 2019-04-28 | 2019-08-23 | 阿里巴巴集团控股有限公司 | A kind of test method and device of block chain |
CN110162470B (en) * | 2019-04-28 | 2023-08-18 | 创新先进技术有限公司 | Block chain testing method and device |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107104850A (en) | A kind of Quantum Chain method of testing | |
Meinicke et al. | On essential configuration complexity: Measuring interactions in highly-configurable systems | |
Lohachab et al. | Towards interconnected blockchains: A comprehensive review of the role of interoperability among disparate blockchains | |
Garrido-Pelaz et al. | Shall we collaborate? A model to analyse the benefits of information sharing | |
CN109615524B (en) | Money laundering crime group partner identification method, money laundering crime group partner identification device, computer equipment and storage medium | |
EP3629551B1 (en) | An apparatus, computer program and method for real time tracing of transactions through a distributed network | |
Li et al. | A survey of DeFi security: Challenges and opportunities | |
WO2012012861A1 (en) | System and method for efficiently deploying massively diverse program instances to resist differential attacks | |
EP3629273B1 (en) | An apparatus, computer program and method | |
CN108460689A (en) | A kind of declaration form analysis method, device, terminal device and storage medium | |
CN111489166A (en) | Risk prevention and control method, device, processing equipment and system | |
Hughes et al. | From playing games to committing crimes: A multi-technique approach to predicting key actors on an online gaming forum | |
Bodeau et al. | System-of-systems threat model | |
CN113723954A (en) | Method for detecting and supervising abnormal transaction nodes in block chain | |
CN115455435A (en) | Intelligent contract fuzzy test method and device, storage medium and electronic equipment | |
Siewruk et al. | Context-aware software vulnerability classification using machine learning | |
Baca | Developing secure software: In an agile process | |
Trad | Business Architecture and Transformation Projects: Enterprise Holistic Security Risk Management (ESRM) | |
Gupta et al. | The experimental analysis of information security management issues for online financial services | |
Almashaqbeh et al. | ABC: a cryptocurrency-focused threat modeling framework | |
Bouquet et al. | Model-based testing for functional and security test generation | |
Liu et al. | Complexity measures for secure service-oriented software architectures | |
Hamdi et al. | Vulnerabilities and attacks assessments in blockchain 1.0, 2.0 and 3.0: tools, analysis and countermeasures | |
Trad | Enterprise Transformation Projects-Cloud Transformation Concept–Holistic Security Integration (CTC-HSI) | |
Trozze et al. | Detecting DeFi securities violations from token smart contract code |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170829 |