Vulnerability Evaluation Method for E-Commerce Transaction Systems With Unobservable Transitions.
Mimi WangZhijun DingPeihai ZhaoPublished in: IEEE Access (2020)
Keyphrases
- evaluation method
- transaction systems
- concurrency control and recovery
- evaluation methods
- electronic commerce
- nested transactions
- credit risk
- evaluation model
- concurrency control
- database systems
- analytic hierarchy process
- fuzzy comprehensive evaluation method
- database
- ahp method
- fuzzy comprehensive evaluation
- transaction processing
- databases
- risk assessment
- artificial intelligence