{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T17:18:21Z","timestamp":1757611101330,"version":"3.44.0"},"reference-count":35,"publisher":"Informa UK Limited","issue":"5","funder":[{"name":"arch received no external fun"}],"content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Journal of Computer Information Systems"],"published-print":{"date-parts":[[2025,9,3]]},"DOI":"10.1080\/08874417.2024.2308207","type":"journal-article","created":{"date-parts":[[2024,1,31]],"date-time":"2024-01-31T17:01:53Z","timestamp":1706720513000},"page":"555-579","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":5,"title":["Machine Learning Ensures Quantum-Safe Blockchain Availability"],"prefix":"10.1080","volume":"65","author":[{"given":"Jongho","family":"Seol","sequence":"first","affiliation":[{"name":"Middle Georgia State University","place":["Macon, USA"]}]},{"given":"Jongyeop","family":"Kim","sequence":"additional","affiliation":[{"name":"Georgia Southern University","place":["Statesboro, USA"]}]}],"member":"301","published-online":{"date-parts":[[2024,1,31]]},"reference":[{"key":"e_1_3_5_2_1","volume-title":"Quantum computing challenges: Mathematics Unlimited-2001 and Beyond","author":"Gruska J.","year":"1999","unstructured":"Gruska J. Quantum computing challenges: Mathematics Unlimited-2001 and Beyond. London: McGraw-Hill; 1999."},{"key":"e_1_3_5_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524455"},{"key":"e_1_3_5_4_1","doi-asserted-by":"publisher","DOI":"10.1093\/oso\/9780198570004.001.0001"},{"key":"e_1_3_5_5_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667"},{"key":"e_1_3_5_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2018.3761723"},{"key":"e_1_3_5_7_1","doi-asserted-by":"publisher","DOI":"10.1038\/nature23461"},{"key":"e_1_3_5_8_1","first-page":"106","article-title":"Towards post-quantum blockchain platforms. Security technologies and methods for advanced cyber threat intelligence","author":"Brotsis S","year":"2022","unstructured":"Brotsis S, Kolokotronis N, Limniotis K. Towards post-quantum blockchain platforms. Security technologies and methods for advanced cyber threat intelligence. Detection And Mitigation. 2022;106\u201330.","journal-title":"Detection And Mitigation"},{"key":"e_1_3_5_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2968985"},{"key":"e_1_3_5_10_1","unstructured":"Rodenburg B Pappas S. Blockchain and quantum computing. 2017."},{"key":"e_1_3_5_11_1","first-page":"225","volume-title":"Blockchain technology: principles and applications","author":"Marc P","year":"2016","unstructured":"Marc P. Blockchain technology: principles and applications. Edward Elgar Publishing; 2016;225\u201353."},{"key":"e_1_3_5_12_1","doi-asserted-by":"publisher","DOI":"10.14569\/IJACSA.2022.0130167"},{"key":"e_1_3_5_13_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.64.022307"},{"key":"e_1_3_5_14_1","volume-title":"Cryptography & network security","author":"Forouzan BA","year":"2007","unstructured":"Forouzan BA. Cryptography & network security. McGraw-Hill, Inc.; 2007."},{"key":"e_1_3_5_15_1","doi-asserted-by":"publisher","DOI":"10.2514\/1.J062267"},{"key":"e_1_3_5_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIEEE.2018.8592253"},{"key":"e_1_3_5_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/OPTRONIX.2017.8350006"},{"key":"e_1_3_5_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2021.100065"},{"key":"e_1_3_5_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-022-03557-y"},{"key":"e_1_3_5_20_1","doi-asserted-by":"publisher","DOI":"10.1088\/2058-9565\/aabc6b"},{"key":"e_1_3_5_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292548"},{"key":"e_1_3_5_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/DFT.2015.7315144"},{"key":"e_1_3_5_23_1","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.61.052304"},{"key":"e_1_3_5_24_1","unstructured":"Mubashir M. A taxonomy of attacks on quantum key distribution. 2011."},{"key":"e_1_3_5_25_1","doi-asserted-by":"publisher","DOI":"10.3390\/s23031228"},{"key":"e_1_3_5_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384943.3409423"},{"key":"e_1_3_5_27_1","volume-title":"Design & analysis of fault tolerant digital systems","author":"Johnson BW","year":"1988","unstructured":"Johnson BW. Design & analysis of fault tolerant digital systems. Addison-Wesley Longman Publishing Co., Inc.; 1988."},{"key":"e_1_3_5_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3594556.3594628"},{"key":"e_1_3_5_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3384943.3409435"},{"key":"e_1_3_5_30_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511617744"},{"key":"e_1_3_5_31_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2013.5208"},{"key":"e_1_3_5_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-020-00901-w"},{"key":"e_1_3_5_33_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-qtc.2020.0027"},{"key":"e_1_3_5_34_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_5_35_1","unstructured":"Chollet F. Keras [online]: https:\/\/github.com\/fchollet\/keras. 2015; 12(01): 2021."},{"key":"e_1_3_5_36_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"}],"container-title":["Journal of Computer Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/08874417.2024.2308207","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,3]],"date-time":"2025-09-03T18:16:25Z","timestamp":1756923385000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/08874417.2024.2308207"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,31]]},"references-count":35,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2025,9,3]]}},"alternative-id":["10.1080\/08874417.2024.2308207"],"URL":"https:\/\/doi.org\/10.1080\/08874417.2024.2308207","relation":{},"ISSN":["0887-4417","2380-2057"],"issn-type":[{"type":"print","value":"0887-4417"},{"type":"electronic","value":"2380-2057"}],"subject":[],"published":{"date-parts":[[2024,1,31]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=ucis20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2024-01-31","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}