2024
DOI: 10.1016/j.jksuci.2024.102031
|View full text |Cite
|
Sign up to set email alerts
|

Blockchain user digital identity big data and information security process protection based on network trust

Feng Wang,
Yongjie Gai,
Haitao Zhang
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Year Published

2024
2024
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 29 publications
0
0
0
Order By: Relevance
“…(Wang et al, 2024) Malware Malware, an abbreviation for malicious software, encompasses any invasive program created by cybercriminals (often known as hackers) with the intention of pilfering data and causing harm or destruction to computers and computer systems. Common types of malware encompass viruses, worms, Trojan viruses, spyware, adware, and ransomware (Alaeiyan et al, 2023).…”
mentioning
confidence: 99%
“…(Wang et al, 2024) Malware Malware, an abbreviation for malicious software, encompasses any invasive program created by cybercriminals (often known as hackers) with the intention of pilfering data and causing harm or destruction to computers and computer systems. Common types of malware encompass viruses, worms, Trojan viruses, spyware, adware, and ransomware (Alaeiyan et al, 2023).…”
mentioning
confidence: 99%