[1] NAKAMOTO S.Bitcoin:a peer-to-peer electronic cash system[EB/OL].[2021-11-05].https://bitcoin.org/bitcoin.pdf. [2] 刘汉卿, 阮娜.区块链中攻击方式的研究[J].计算机学报, 2021, 44(4):786-805. LIU H Q, RUAN N.A survey on attacking strategies in blockchain[J].Chinese Journal of Computers, 2021, 44(4):786-805.(in Chinese) [3] 冯登国, 张阳, 张玉清.信息安全风险评估综述[J].通信学报, 2004, 25(7):10-18. FENG D G, ZHANG Y, ZHANG Y Q.Survey of information security risk assessment[J].Journal of Communications, 2004, 25(7):10-18.(in Chinese) [4] 叶聪聪, 李国强, 蔡鸿明, 等.区块链的安全检测模型[J].软件学报, 2018, 29(5):1348-1359. YE C C, LI G Q, CAI H M, et al.Security detection model of blockchain[J].Journal of Software, 2018, 29(5):1348-1359.(in Chinese) [5] 秦超霞, 郭兵, 沈艳, 等.区块链的安全风险评估模型[J].电子学报, 2021, 49(1):117-124. QIN C X, GUO B, SHEN Y, et al.Security risk assessment model of blockchain[J].Acta Electronica Sinica, 2021, 49(1):117-124.(in Chinese) [6] 田国华, 胡云瀚, 陈晓峰.区块链系统攻击与防御技术研究进展[J].软件学报, 2021, 32(5):1495-1525. TIAN G H, HU Y H, CHEN X F.Research progress on attack and defense techniques in block-chain system[J].Journal of Software, 2021, 32(5):1495-1525.(in Chinese) [7] WANG H Q, KUN H, XU D M.A maturity model for blockchain adoption[EB/OL].[2021-11-05].https://www.researchgate.net/publication/310537864_A_maturity_model_for_blockchain_adoption. [8] MORGANTI G, SCHIAVONE E, BONDAVALLI A.Risk assessment of blockchain technology[C]//Proceedings of the 8th Latin-American Symposium on Dependable Computing.Washington D.C., USA:IEEE Press, 2018:87-96. [9] ROSS R.Guide for conducting risk assessments[EB/OL].[2021-11-05].https://www.nist.gov/publications/guide-conducting-risk-assessments. [10] ZAMANI E, HE Y, PHILLIPS M.On the security risks of the blockchain[J].Journal of Computer Information Systems, 2020, 60(6):495-506. [11] DUMAS J G, JIMENEZ-GARCES S, SOIMAN F.Blockchain technology and crypto-assets market analysis:vulnerabilities and risk assessment[C]//Proceedings of the 12th International Multi-Conference on Complexity, Informatics and Cybernetics.Washington D.C., USA:IEEE Press, 2021:1-28. [12] 邵奇峰, 金澈清, 张召, 等.区块链技术:架构及进展[J].计算机学报, 2018, 41(5):969-988. SHAO Q F, JIN C Q, ZHANG Z, et al.Blockchain:architecture and research progress[J].Chinese Journal of Computers, 2018, 41(5):969-988.(in Chinese) [13] 孟小峰, 刘立新.基于区块链的数据透明化:问题与挑战[J].计算机研究与发展, 2021, 58(2):237-252. MENG X F, LIU L X.Blockchain-based data transparency:issues and challenges[J].Journal of Computer Research and Development, 2021, 58(2):237-252.(in Chinese) [14] 谢识予.经济博弈论[M].上海:复旦大学出版社, 2002. XIE S Y.Economic game theory[M].Shanghai:Fudan University Press, 2002.(in Chinese) [15] COX L A.Game theory and risk analysis[J].Risk Analysis, 2009, 29(8):1062-1068. [16] ZHAO Y F, HUANG L N, SMIDTS C, et al.Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants[J].Reliability Engineering & System Safety, 2020, 201:106878. [17] ALZAHRANI N, BULUSU N.Towards true decentra-lization:a blockchain consensus protocol based on game theory and randomness[EB/OL].[2021-11-05].https://www.researchgate.net/publication/327876786_Towards_True_Decentralization_A_Blockchain_Consensus_Protocol_Based_on_Game_Theory_and_Randomness_9th_International_Conference_GameSec_2018_Seattle_WA_USA_October_29-31_2018_Proceedings. [18] ZHANG T, ZHAO K, YANG M, et al.Research on privacy security risk assessment method of mobile commerce based on information entropy and Markov[J].Wireless Communi-cations and Mobile Computing, 2020, 15:1-11. [19] HAN X, HUANG H L, WANG L Y.F-PAD:private attribute disclosure risk estimation in online social networks[J].IEEE Transactions on Dependable and Secure Computing, 2019, 16(6):1054-1069. [20] KANG H Y, XIAO Y H, YIN J.An intelligent detection method of personal privacy disclosure for social networks[J].Security and Communication Networks, 2021, 20:1-11. [21] RANA R M, ZAEEM R N, BARBER K S.An assessment of blockchain identity solutions:minimizing risk and liability of authentication[C]//Proceedings of IEEE/WIC/ACM International Conference on Web Intelligence.Washington D.C., USA:IEEE Press, 2019:26-33. [22] 邝青青.基于个人隐私泄露的风险评估[D].贵阳:贵州大学, 2016. KUANG Q Q.Risk assessment based on personal privacy disclosure[D].Guiyang:Guizhou University, 2016.(in Chinese) [23] RACHANA HARISH A, LIU X L, ZHONG R Y, et al.Log-flock:a blockchain-enabled platform for digital asset valuation and risk assessment in E-commerce logistics financing[J].Computers & Industrial Engineering, 2021, 151:107001. [24] ZARREH A, WAN H, LEE Y, et al.Risk assessment for cyber security of manufacturing systems:a game theory approach[J].Procedia Manufacturing, 2019, 38:605-612. [25] CHERIGUENE A, KABACHE T, KERRACHE C A, et al.NOTA:a novel online teaching and assessment scheme using blockchain for emergency cases[J].Education and Information Technologies, 2022, 27(1):115-132. |