Credibility Propagation for Robust Data Aggregation in WSNs
暂无分享,去创建一个
E. Bertino | S. Jha | A. Ignjatović | M. Rezvani | S. Jha
[1] Elisa Bertino,et al. Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks , 2015, IEEE Transactions on Dependable and Secure Computing.
[2] Michèle Sebag,et al. Data Stream Clustering With Affinity Propagation , 2014, IEEE Transactions on Knowledge and Data Engineering.
[3] D. Bhattacharya. Secure Data Aggregation in Wireless Sensor Networks , 2014 .
[4] Luca de Alfaro,et al. CrowdGrader: Crowdsourcing the Evaluation of Homework Assignments , 2013, ArXiv.
[5] Yang Xiao,et al. Outlier detection based fault tolerant data aggregation for wireless sensor networks , 2011, 2011 5th International Conference on Application of Information and Communication Technologies (AICT).
[6] Giulio Giunta,et al. A mathematical model of collaborative reputation systems , 2012, Int. J. Comput. Math..
[7] Sajal K. Das,et al. A Trust-Based Framework for Fault-Tolerant Data Aggregation in Wireless Multimedia Sensor Networks , 2012, IEEE Transactions on Dependable and Secure Computing.
[8] Giulio Cimini,et al. Measuring quality, reputation and trust in online communities , 2012, ISMIS.
[9] Sajal K. Das,et al. ZoneTrust: Fast Zone-Based Node Compromise Detection and Revocation in Wireless Sensor Networks Using Sequential Hypothesis Testing , 2012, IEEE Transactions on Dependable and Secure Computing.
[10] Elisa Bertino,et al. A Game-Theoretic Approach for High-Assurance of Data Trustworthiness in Sensor Networks , 2012, 2012 IEEE 28th International Conference on Data Engineering.
[11] Yan Sun,et al. Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..
[12] Hong Cheng,et al. Robust Reputation-Based Ranking on Bipartite Rating Networks , 2012, SDM.
[13] Belle L. Tseng,et al. User reputation in a comment rating environment , 2011, KDD.
[14] Sangkyum Kim,et al. Tru-Alarm: Trustworthiness Analysis of Sensor Networks in Cyber-Physical Systems , 2010, 2010 IEEE International Conference on Data Mining.
[15] Elisa Bertino,et al. Provenance-based trustworthiness assessment in sensor networks , 2010, DMSN '10.
[16] Hasan Çam,et al. Integration of False Data Detection With Data Aggregation and Confidential Transmission in Wireless Sensor Networks , 2010, IEEE/ACM Transactions on Networking.
[17] François Fouss,et al. A probabilistic reputation model based on transaction ratings , 2010, Inf. Sci..
[18] Alex Talevski,et al. Taxonomy of Wireless Sensor Network Cyber Security Attacks in the Oil and Gas Industries , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[19] Matús Medo,et al. The effect of discrete vs. continuous-valued ratings on reputation and ranking systems , 2010, ArXiv.
[20] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[21] Paul Van Dooren,et al. Iterative Filtering in Reputation Systems , 2010, SIAM J. Matrix Anal. Appl..
[22] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[23] Erman Ayday,et al. An iterative algorithm for trust and reputation management , 2009, 2009 IEEE International Symposium on Information Theory.
[24] Deepak Ganesan,et al. PRESTO: feedback-driven data management in sensor networks , 2009, TNET.
[25] A. Jøsang,et al. Challenges for Robust Trust and Reputation Systems , 2009 .
[26] Bruno Sinopoli,et al. Challenges for Securing Cyber Physical Systems , 2009 .
[27] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[28] François Ingelrest,et al. SensorScope: Out-of-the-Box Environmental Monitoring , 2008, 2008 International Conference on Information Processing in Sensor Networks (ipsn 2008).
[29] Sencun Zhu,et al. SDAP: a secure hop-by-Hop data aggregation protocol for sensor networks , 2006, MobiHoc '06.
[30] S. Muthukrishnan,et al. Sequential Change Detection on Data Streams , 2007, Seventh IEEE International Conference on Data Mining Workshops (ICDMW 2007).
[31] Hsinchun Chen,et al. A Comparison of Collaborative-Filtering Recommendation Algorithms for E-commerce , 2007, IEEE Intelligent Systems.
[32] Wang-Chien Lee,et al. Using sensorranks for in-network detection of faulty readings in wireless sensor networks , 2007, MobiDE '07.
[33] Robert Lund,et al. A Review and Comparison of Changepoint Detection Techniques for Climate Data , 2007 .
[34] Dawn Xiaodong Song,et al. Secure hierarchical in-network aggregation in sensor networks , 2006, CCS '06.
[35] Yi-Cheng Zhang,et al. Information filtering via Iterative Refinement , 2006, ArXiv.
[36] Yi-Kuo Yu,et al. Decoding Information from noisy, redundant, and intentionally-distorted sources , 2006, cond-mat/0603620.
[37] Aoying Zhou,et al. Density-Based Clustering over an Evolving Data Stream with Noise , 2006, SDM.
[38] Stuart Barber,et al. All of Statistics: a Concise Course in Statistical Inference , 2005 .
[39] David A. Wagner,et al. Resilient aggregation in sensor networks , 2004, SASN '04.
[40] Reza Curtmola,et al. Mitigating Byzantine Attacks in Ad Hoc Wireless Networks , 2004 .
[41] Dawn Xiaodong Song,et al. SIA: secure information aggregation in sensor networks , 2003, SenSys '03.