35 research outputs found

    Review of the Main Security Problems with Multi-Agent Systems used in E-commerce Applications

    No full text
    The ability to connect to the Internet from a wide variety of devices such as smart phones, IoT devices and desktops at anytime and anywhere, produces a large number of e-commerce transactions, such as purchases of clothes, ticket entrances for performances, or banking operations. The increasing number of these transactions has also created an increase in the number of threats and attacks by third parties to access user data banks. It is important to control the access procedure to user data so that the number of threats does not continue to grow. To do so, it is necessary to prevent unauthorized access, theft and fraud in electronic commerce, which is required to ensure the safety of these transactions. Many e-commerce platforms are developed through multi-agent-systems because they include certain advantages to control the product, resource management, task distribution, etc. However, there are a number of threats that can jeopardize the safety of the agents that make up the system. These issues must be taken into account in the development of these multi-agent systems. However, existing methods of development do not cover in depth the issue of security. It is necessary to present and classify the potential security flaws of multi-agent systems. Therefore, the present research presents a review of the main vulnerabilities that occur in multi-agent systems responsible for managing e-commerce applications, as well as the proposed solutions to the major security problems on these platform systems. The main conclusions provided by this research is the need to optimize security measures and enhance the different security solutions applied in e-commerce applications in order to prevent identity theft, access to private data, access control, etc. It is therefore essential to continue to develop the security methods employed in applications such as e-commerce as different types of attacks and threats continue to evolve

    The Impact of E-commerce in Vietnamese SMEs

    No full text

    Challenges and Issues in Test Process Management

    No full text

    Intelligent Trust-Based Utility and Reusability Model: Enhanced Security Using Unmanned Aerial Vehicles on Sensor Nodes

    No full text
    Due to its importance in prolonging the lifetime of battery-restricted wireless sensor networks, network longevity has garnered considerable research attention, with the rechargeable wireless sensor network emerging as a viable solution. In this research, the novel methodology of a trust-based mechanism for enhanced security integrated with an energy utility and re-usability model is proposed with software-defined networking (SDN) to maximize energy utilization. We proposed a novel framework with SDN for the service station in a wireless sensor network (WSN). The results showed that the life capacity of the network increases to a maximum of 290% when compared with no charging, with the charge increasing by 30% intervals. We also present how the network survives through this choice of sink. As there is variation in the network size while it increases, the proposed approach with the static method works well until the network size reaches 200. Furthermore, the proposed approach also uses the heuristic method to achieve the best performance

    Intelligent Trust-Based Utility and Reusability Model: Enhanced Security Using Unmanned Aerial Vehicles on Sensor Nodes

    No full text
    Due to its importance in prolonging the lifetime of battery-restricted wireless sensor networks, network longevity has garnered considerable research attention, with the rechargeable wireless sensor network emerging as a viable solution. In this research, the novel methodology of a trust-based mechanism for enhanced security integrated with an energy utility and re-usability model is proposed with software-defined networking (SDN) to maximize energy utilization. We proposed a novel framework with SDN for the service station in a wireless sensor network (WSN). The results showed that the life capacity of the network increases to a maximum of 290% when compared with no charging, with the charge increasing by 30% intervals. We also present how the network survives through this choice of sink. As there is variation in the network size while it increases, the proposed approach with the static method works well until the network size reaches 200. Furthermore, the proposed approach also uses the heuristic method to achieve the best performance
    corecore