A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks
暂无分享,去创建一个
[1] Abdelhak Mourad Guéroui,et al. Bacterial Foraging Optimization Scheme for Mobile Sensing in Wireless Sensor Networks , 2017, International Journal of Wireless Information Networks.
[2] Azzedine Boukerche,et al. Trust-based security for wireless ad hoc and sensor networks , 2007, Comput. Commun..
[3] Majid Bayani Abbasy,et al. Time delay performance analysis of sensor allocation strategies on a WSN , 2011, ACWR '11.
[4] Mohamed Lehsaini,et al. Dishonest recommendation attacks in wireless sensor networks: A survey , 2015, 2015 12th International Symposium on Programming and Systems (ISPS).
[5] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[6] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[7] Heena Rathore. Case Study: A Review of Security Challenges, Attacks and Trust and Reputation Models in Wireless Sensor Networks , 2016 .
[8] Xiang Zhou,et al. A Trust Evaluation Algorithm for Wireless Sensor Networks Based on Node Behaviors and D-S Evidence Theory , 2011, Sensors.
[9] Jie Wu,et al. DRBTS: Distributed Reputation-based Beacon Trust System , 2006, 2006 2nd IEEE International Symposium on Dependable, Autonomic and Secure Computing.
[10] D. Roff,et al. Evolutionary Ecology: Concepts and Case Studies , 2001 .
[11] Qiang Liu,et al. A Credible Bayesian-Based Trust Management Scheme for Wireless Sensor Networks , 2015, Int. J. Distributed Sens. Networks.
[12] E. Crane. A Book of Honey , 1980 .
[13] Abdelhak Mourad Guéroui,et al. A Risk-Aware Reputation-Based Trust Management in Wireless Sensor Networks , 2016, Wirel. Pers. Commun..
[14] Audun Jøsang,et al. Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review , 2013, IFIPTM.
[15] Hyunsoo Yoon,et al. Trust evaluation model for wireless sensor networks , 2005, The 7th International Conference on Advanced Communication Technology, 2005, ICACT 2005..
[16] M. Pham-Delègue,et al. Foraging behaviour of honey bees (Apis mellifera L.) on transgenic oilseed rape (Brassica napus L.var. oleifera) , 1995, Transgenic Research.
[17] K. Frisch. Decoding the Language of the Bee , 1974 .
[18] Xiaodong Li,et al. Swarm Intelligence in Optimization , 2008, Swarm Intelligence.
[19] Abdelhak Mourad Guéroui,et al. Clustering algorithm for wireless sensor networks: the honeybee swarms nest-sites selection process based approach , 2018, Int. J. Sens. Networks.
[20] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[21] Damien Charlet,et al. Using an evolutionary algorithm to optimize the broadcasting methods in mobile ad hoc networks , 2011, J. Netw. Comput. Appl..
[22] Huafeng Wu,et al. Add Semantic Role to Dependency Structure Language Model for Topic Detection and Tracking , 2007 .
[23] Mrinal Kanti Naskar,et al. Trust Evaluation Based on Node’s Characteristics and Neighbouring Nodes’ Recommendations for WSN , 2014 .
[24] Troy Lee,et al. How Information-Mapping Patterns Determine Foraging Behaviour of a Honey Bee Colony , 2002, Open Syst. Inf. Dyn..
[25] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[26] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[27] Rodrigo Roman,et al. Trust management systems for wireless sensor networks: Best practices , 2010, Comput. Commun..
[28] Yuqing Zhang,et al. Dealing with dishonest recommendation: The trials in reputation management court , 2012, Ad Hoc Networks.
[29] Panagiotis Karkazis,et al. DESIGN AND IMPLEMENTATION OF A TRUST -AWARE ROUTING PROTOCOL FOR LARGE WSN S , 2010 .
[30] Xu Wu,et al. A self-adaptive trust management scheme for wireless sensor networks , 2015 .
[31] Kah Phooi Seng,et al. Classical and swarm intelligence based routing protocols for wireless sensor networks: A survey and comparison , 2012, J. Netw. Comput. Appl..
[32] Zhongwei Li,et al. Multi-agent trust-based intrusion detection scheme for wireless sensor networks , 2017, Comput. Electr. Eng..
[33] Dervis Karaboga,et al. A powerful and efficient algorithm for numerical function optimization: artificial bee colony (ABC) algorithm , 2007, J. Glob. Optim..
[34] Bo Xing,et al. Innovative Computational Intelligence: A Rough Guide to 134 Clever Algorithms , 2013 .
[35] Saleh Alrashed. Reducing power consumption of non-preemptive real-time systems , 2017, The Journal of Supercomputing.
[36] Sherali Zeadally,et al. Comparative study of trust and reputation systems for wireless sensor networks , 2013, Secur. Commun. Networks.
[37] Naima Iltaf,et al. A mechanism for detecting dishonest recommendation in indirect trust computation , 2013, EURASIP J. Wirel. Commun. Netw..
[38] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[39] David A. Wagner,et al. Security in wireless sensor networks , 2004, SASN '04.
[40] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[41] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[42] Ado Adamou Abba Ari,et al. A power efficient cluster-based routing algorithm for wireless sensor networks: Honeybees swarm intelligence based approach , 2016, J. Netw. Comput. Appl..
[43] Tanuj Sen,et al. A new approach to solve Economic Dispatch problem using a Hybrid ACO–ABC–HS optimization algorithm , 2016 .
[44] Brian L. Mark,et al. E-Hermes: A robust cooperative trust establishment scheme for mobile ad hoc networks , 2009, Ad Hoc Networks.
[45] Detecting lies about consumer attitudes using the timed antagonistic response alethiometer , 2014, Behavior research methods.
[46] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[47] Félix Gómez Mármol,et al. Providing trust in wireless sensor networks using a bio-inspired technique , 2011, Telecommun. Syst..
[48] A. Gregg. When vying reveals lying: the timed antagonistic response alethiometer , 2007 .
[49] Krishna M. Sivalingam,et al. Data gathering in sensor networks using the energy*delay metric , 2001, Proceedings 15th International Parallel and Distributed Processing Symposium. IPDPS 2001.
[50] Guangjie Han,et al. Management and applications of trust in Wireless Sensor Networks: A survey , 2014, J. Comput. Syst. Sci..
[51] Chuanlei Zhang,et al. BTRES: Beta-based Trust and Reputation Evaluation System for wireless sensor networks , 2016, J. Netw. Comput. Appl..