{"id":"https://openalex.org/W4415744083","doi":"https://doi.org/10.1109/qrs-c65679.2025.00089","title":"A Comprehensive Blockchain Security Evaluation Method Integrating Hierarchical Analysis, Entropy Weighting and Ideal Solution Techniques","display_name":"A Comprehensive Blockchain Security Evaluation Method Integrating Hierarchical Analysis, Entropy Weighting and Ideal Solution Techniques","publication_year":2025,"publication_date":"2025-07-16","ids":{"openalex":"https://openalex.org/W4415744083","doi":"https://doi.org/10.1109/qrs-c65679.2025.00089"},"language":null,"primary_location":{"id":"doi:10.1109/qrs-c65679.2025.00089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063671391","display_name":"Jinfu Chen","orcid":"https://orcid.org/0000-0002-3124-5452"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Jinfu Chen","raw_affiliation_strings":["Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":null,"display_name":"Xingquan Mao","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xingquan Mao","raw_affiliation_strings":["Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5108923252","display_name":"Rongtian Xu","orcid":null},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Rongtian Xu","raw_affiliation_strings":["Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5072715528","display_name":"Bo Geng","orcid":"https://orcid.org/0000-0001-6055-1865"},"institutions":[{"id":"https://openalex.org/I115592961","display_name":"Jiangsu University","ror":"https://ror.org/03jc41j30","country_code":"CN","type":"education","lineage":["https://openalex.org/I115592961"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Geng","raw_affiliation_strings":["Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013"],"affiliations":[{"raw_affiliation_string":"Jiangsu University,School of Computer Science and Communication Engineering,Zhenjiang,China,212013","institution_ids":["https://openalex.org/I115592961"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063671391"],"corresponding_institution_ids":["https://openalex.org/I115592961"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.44427731,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"689","last_page":"699"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4350999891757965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.4350999891757965,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14347","display_name":"Big Data and Digital Economy","score":0.20800000429153442,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T14413","display_name":"Advanced Technologies in Various Fields","score":0.03220000118017197,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.8125},{"id":"https://openalex.org/keywords/entropy","display_name":"Entropy (arrow of time)","score":0.6407999992370605},{"id":"https://openalex.org/keywords/weighting","display_name":"Weighting","score":0.6370000243186951},{"id":"https://openalex.org/keywords/ideal-solution","display_name":"Ideal solution","score":0.569100022315979},{"id":"https://openalex.org/keywords/analytic-hierarchy-process","display_name":"Analytic hierarchy process","score":0.5447999835014343},{"id":"https://openalex.org/keywords/evaluation-methods","display_name":"Evaluation methods","score":0.5425999760627747},{"id":"https://openalex.org/keywords/concrete-security","display_name":"Concrete security","score":0.4884999990463257},{"id":"https://openalex.org/keywords/topsis","display_name":"TOPSIS","score":0.4287000000476837}],"concepts":[{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.8125},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7103000283241272},{"id":"https://openalex.org/C106301342","wikidata":"https://www.wikidata.org/wiki/Q4117933","display_name":"Entropy (arrow of time)","level":2,"score":0.6407999992370605},{"id":"https://openalex.org/C183115368","wikidata":"https://www.wikidata.org/wiki/Q856577","display_name":"Weighting","level":2,"score":0.6370000243186951},{"id":"https://openalex.org/C89591040","wikidata":"https://www.wikidata.org/wiki/Q1779030","display_name":"Ideal solution","level":2,"score":0.569100022315979},{"id":"https://openalex.org/C87345402","wikidata":"https://www.wikidata.org/wiki/Q485202","display_name":"Analytic hierarchy process","level":2,"score":0.5447999835014343},{"id":"https://openalex.org/C3018395757","wikidata":"https://www.wikidata.org/wiki/Q1379672","display_name":"Evaluation methods","level":2,"score":0.5425999760627747},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.49639999866485596},{"id":"https://openalex.org/C147343967","wikidata":"https://www.wikidata.org/wiki/Q5159078","display_name":"Concrete security","level":3,"score":0.4884999990463257},{"id":"https://openalex.org/C51566761","wikidata":"https://www.wikidata.org/wiki/Q1235853","display_name":"TOPSIS","level":2,"score":0.4287000000476837},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3864000141620636},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.3856000006198883},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.3594000041484833},{"id":"https://openalex.org/C2776639384","wikidata":"https://www.wikidata.org/wiki/Q840396","display_name":"Ideal (ethics)","level":2,"score":0.30709999799728394},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.29600000381469727},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.2858000099658966},{"id":"https://openalex.org/C2986045029","wikidata":"https://www.wikidata.org/wiki/Q294240","display_name":"Public security","level":2,"score":0.2703999876976013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.26919999718666077},{"id":"https://openalex.org/C58166","wikidata":"https://www.wikidata.org/wiki/Q224821","display_name":"Fuzzy logic","level":2,"score":0.2678000032901764},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.257099986076355},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.25619998574256897},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.2549999952316284}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/qrs-c65679.2025.00089","is_oa":false,"landing_page_url":"https://doi.org/10.1109/qrs-c65679.2025.00089","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 25th International Conference on Software Quality, Reliability, and Security Companion (QRS-C)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W2793423901","https://openalex.org/W2892997857","https://openalex.org/W2969576933","https://openalex.org/W3010858269","https://openalex.org/W3016687266","https://openalex.org/W3034576047","https://openalex.org/W3039840332","https://openalex.org/W3135503287","https://openalex.org/W3139257894","https://openalex.org/W3144594777","https://openalex.org/W3156506586","https://openalex.org/W3198478013","https://openalex.org/W4214746114","https://openalex.org/W4297121088","https://openalex.org/W4315798336","https://openalex.org/W4316022171","https://openalex.org/W4361802972","https://openalex.org/W4362677131","https://openalex.org/W4383898425","https://openalex.org/W4384026675"],"related_works":[],"abstract_inverted_index":{"Blockchain":[0],"technology":[1],"has":[2],"gained":[3],"widespread":[4],"societal":[5],"recognition,":[6],"with":[7,134],"its":[8],"associated":[9],"security":[10,21,43,91,102,110,117],"issues":[11],"increasingly":[12],"drawing":[13],"the":[14,57,81,85,101,114,132,145],"attention":[15],"of":[16,31,84,149],"researchers.":[17],"However,":[18],"existing":[19],"blockchain":[20,33,48,86,128,138],"assessment":[22],"models":[23],"suffer":[24],"from":[25,136],"excessive":[26],"subjectivity":[27],"and":[28,41,52,66,107,130,147],"insufficient":[29],"consideration":[30],"fundamental":[32],"technology.":[34,49],"This":[35],"paper":[36],"proposes":[37],"AET,":[38],"a":[39,89,109],"novel":[40],"comprehensive":[42,90],"evaluation":[44,55,92,139],"method":[45,78],"tailored":[46],"to":[47,73,87,100],"AET":[50],"integrates":[51],"enhances":[53],"three":[54],"approaches:":[56],"Analytic":[58],"Hierarchy":[59],"Process":[60],"(AHP),":[61],"Entropy":[62],"Weight":[63],"Method":[64],"(EWM),":[65],"Technique":[67],"for":[68],"Order":[69],"Preference":[70],"by":[71,123],"Similarity":[72],"Ideal":[74],"Solution":[75],"(TOPSIS).":[76],"The":[77,141],"first":[79],"analyzes":[80],"hierarchical":[82],"structure":[83],"establish":[88],"index":[93],"system.":[94],"It":[95],"then":[96],"objectively":[97],"assigns":[98],"weights":[99],"attributes":[103],"within":[104],"this":[105],"system":[106],"calculates":[108],"score":[111],"that":[112],"reflects":[113],"blockchain\u2019s":[115],"overall":[116],"level.":[118],"We":[119],"validate":[120],"our":[121,150],"approach":[122],"evaluating":[124],"20":[125],"common":[126],"public":[127],"projects":[129],"comparing":[131],"results":[133,143],"assessments":[135],"established":[137],"institutions.":[140],"experimental":[142],"demonstrate":[144],"effectiveness":[146],"viability":[148],"proposed":[151],"method.":[152]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-10-31T00:00:00"}
