Security Computing
Submission DeadlineApr. 10, 2020

Submission Guidelines:

Lead Guest Editor
Fang Zhao
Tongji university, Shanghai, China
Guest Editors
  • Jing Zhu
    University of Science and Technology of China, Hefei, Anhui, China
  • Neema Elharoun
    Department of Statistics, North Sinai university, North Sinai City, Egypt
Recently, with the development of a third-party payment platform, the development of online trading, electronic trading could be seen everywhere in our daily life. Compared with the previous businesses where the merchants and customers have to face to face, it brings much convenience and a series of security issues. The funds may be illegal to paraphrase by malicious users, and then bring certain losses to the businessman, consumers or the third-party payment platform. Petri nets as a formal method could be used to analysis the security issues better and easily.
Aims and Scope:
  1. Petri nets
  2. Control flow
  3. Data flow
  4. Consistency
  5. Behavioral profile
  6. Data flow errors
Guidelines for Submission
Manuscripts should be formatted according to the guidelines for authors

Please download the template to format your manuscript.

Science Publishing Group
1 Rockefeller Plaza,
10th and 11th Floors,
New York, NY 10020
Tel: (001)347-983-5186