User behaviour trust model to defend denial of service attacks in distributed computational environments
暂无分享,去创建一个
[1] Diego Gambetta. Trust : making and breaking cooperative relations , 1992 .
[2] Nada Lavrac,et al. Trust Modeling for Networked Organizations Using Reputation and Collaboration Estimates , 2007, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[3] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[4] David Wetherall,et al. Improving the performance of distributed applications using active networks , 1998, Proceedings. IEEE INFOCOM '98, the Conference on Computer Communications. Seventeenth Annual Joint Conference of the IEEE Computer and Communications Societies. Gateway to the 21st Century (Cat. No.98.
[5] David Wetherall,et al. Preventing Internet denial-of-service with capabilities , 2004, Comput. Commun. Rev..
[6] Paolo Avesani,et al. Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.
[7] Stephen Hailes,et al. A distributed trust model , 1998, NSPW '97.
[8] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[9] C. Badcock,et al. Trust : making and breaking cooperative relations , 1989 .
[10] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[11] Georg Lausen,et al. Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[12] Munindar P. Singh,et al. Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.
[13] Chris McDonald,et al. Establishing Trust In Pure Ad-hoc Networks , 2004, ACSC.
[14] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[15] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[16] Ninghui Li,et al. Denial of service attacks and defenses in decentralized trust management , 2006, 2006 Securecomm and Workshops.