2020
DOI: 10.1109/access.2020.2998132
|View full text |Cite
|
Sign up to set email alerts
|

Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions

Abstract: E-commerce transaction systems have become an important factor in trading activities. However, e-commerce systems are still undergoing development. Unobservable actions and attacks on systems are frequent problems that increase the vulnerability of e-commerce systems. Most existing approaches to addressing these issues cannot describe or analyze the overall structure of a local specification and unobservable actions well. The vulnerable e-commerce transaction net (VET-net) is a useful model for describing the … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 61 publications
0
3
0
Order By: Relevance
“…Tough peer-to-peer communication can be done through data replication methods, there are scalability issues in this work. Wang et al [16] work on the evaluation method for ecommerce transaction systems with unobservable transactions. Tis work can be used in the analysis and design of the system for online transaction processes.…”
Section: Related Workmentioning
confidence: 99%
“…Tough peer-to-peer communication can be done through data replication methods, there are scalability issues in this work. Wang et al [16] work on the evaluation method for ecommerce transaction systems with unobservable transactions. Tis work can be used in the analysis and design of the system for online transaction processes.…”
Section: Related Workmentioning
confidence: 99%
“…Even though, there is various research conducted to detect malicious behavior in the e-commerce systems, still open issues exist to detect vulnerabilities. To this end, to identify the malicious behavior in an e-commerce system employing Petri nets are presented in [39,40]. Wang et al proposed a method using hidden Markov models to detect unobservable transitions in e-commerce transactions [39].…”
Section: Figure 3: 3d Secure Methods Diagrammentioning
confidence: 99%
“…To this end, to identify the malicious behavior in an e-commerce system employing Petri nets are presented in [39,40]. Wang et al proposed a method using hidden Markov models to detect unobservable transitions in e-commerce transactions [39]. The method simply constructs a vulnerable e-commerce transaction net which implements labeled Petri nets, detects vulnerabilities and possible attacks, evaluates these vulnerabilities and attacks in the e-commerce system and prevents them before their occurrence.…”
Section: Figure 3: 3d Secure Methods Diagrammentioning
confidence: 99%