A Multiagent Framework for Selection of Trustworthy Service Providers
暂无分享,去创建一个
[1] Antonio F. Gómez-Skarmeta,et al. Network access security for the internet: protocol for carrying authentication for network access , 2012, IEEE Communications Magazine.
[2] Lam-for Kwok,et al. Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).
[3] Patrick D. McDaniel,et al. A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.
[4] Wilfried N. Gansterer,et al. On the detection and identification of botnets , 2010, Comput. Secur..
[5] Markus Jakobsson,et al. Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.
[6] Young Ae Kim,et al. Strategies for predicting local trust based on trust propagation in social networks , 2011, Knowl. Based Syst..
[7] George Kesidis,et al. Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.
[8] David Osher,et al. Creating Comprehensive and Collaborative Systems , 2002 .
[9] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[10] Hossein Shirazi,et al. Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall , 2009, 2009 International Joint Conference on Artificial Intelligence.
[11] Max Mühlhäuser,et al. Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.
[12] Rino Falcone,et al. Trust in information sources as a source for trust: a fuzzy approach , 2003, AAMAS '03.
[13] Adel Bouhoula,et al. Data analyzer based on data mining for Honeypot Router , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[14] Arshad Iqbal,et al. Network Traffic Analysis and Intrusion Detection Using Packet Sniffer , 2010, 2010 Second International Conference on Communication Software and Networks.
[15] Hongli Zhang,et al. IR4CF: A intrusion replay system for computer forensics , 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering.
[16] Gong Wei,et al. Application Design of Data Packet Capturing Based on Sharpcap , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.
[17] Wentao Liu. Design and Implement of Common Network Security Scanning System , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.
[18] Valentin Cristea,et al. Netpy: Advanced Network Traffic Monitoring , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.
[19] K. Kowalski,et al. Packet information collection and transformation for network intrusion detection and prevention , 2008, 2008 International Symposium on Telecommunications.
[20] Ayman Abdel-Hamid,et al. A Visualization Framework for Traffic Data Exploration and Scan Detection , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.
[21] Hamdi Yahyaoui,et al. A trust-based game theoretical model for Web services collaboration , 2012, Knowl. Based Syst..
[22] Jill Slay,et al. Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[23] Wang Xinyu,et al. The research and design of content-based network monitor system , 2009, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS).
[24] John R. Goodall,et al. Visual Discovery in Computer Network Defense , 2007, IEEE Computer Graphics and Applications.
[25] Éva Tardos,et al. Truthful mechanisms for one-parameter agents , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.
[26] Ruixuan Li,et al. Trustworthy assurance of service interoperation in cloud environment , 2011, Int. J. Autom. Comput..
[27] Georg Carle,et al. Packet sampling for worm and botnet detection in TCP connections , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.
[28] Hu Han. Performance improvement of TCP_Reno based on monitoring the wireless packet loss rate , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.
[29] Tharam S. Dillon,et al. Fuzzy Decision Support for Service Selection in E-Business Environments , 2007, 2007 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making.
[30] Bruce J. Nikkel. An introduction to investigating IPv6 networks , 2007, Digit. Investig..
[31] Ayman I. Kayssi,et al. Fuzzy reputation-based trust model , 2011, Appl. Soft Comput..
[32] Faisal B. Luqman. TRIAGE: Applying context to improve timely delivery of critical data in mobile ad hoc networks for disaster response , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).
[33] Naveed Ahmed,et al. TCP/IP protocol stack analysis using MENet , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.
[34] S. H. C. Haris,et al. Packet analysis using packet filtering and traffic monitoring techniques , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.
[35] Emmanuel Hooper,et al. An intelligent detection and response strategy to false positives and network attacks: operation of network quarantine channels and feedback methods to IDS , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[36] Kouichi Sakurai,et al. A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.
[37] Jamal Bentahar,et al. CRM : An efficient trust and reputation model for agent computing , 2011 .
[38] Tharam S. Dillon,et al. SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.
[39] Xinhua Mao,et al. Research on the milling tool monitoring system based on wavelet neural network , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.
[40] Rick Dove. Self-organizing resilient network sensing (SornS) with very large scale anomaly detection , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).
[41] Paulo S. Motta Pires,et al. Using a packet manipulation tool for security analysis of industrial network protocols , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).
[42] Nicholas R. Jennings,et al. An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.
[43] Tharam S. Dillon,et al. Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[44] Shanshan Song,et al. Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.
[45] Michael S. Greenberg,et al. Network Forensics Analysis , 2002, IEEE Internet Comput..
[46] Sarvapali D. Ramchurn,et al. DEVISING A TRUST MODEL FOR MULTI-AGENT INTERACTIONS USING CONFIDENCE AND REPUTATION , 2004, Appl. Artif. Intell..
[47] Sung Jin Hur,et al. Improved trust-aware recommender system using small-worldness of trust networks , 2010, Knowl. Based Syst..
[48] Jordi Sabater-Mir,et al. REGRET: reputation in gregarious societies , 2001, AGENTS '01.
[49] Zhang Shuqin,et al. A Fuzzy Set Based Trust and Reputation Model in P2P Networks , 2004 .
[50] Alba Cristina Magalhaes Alves de Melo,et al. A WS-Agreement-Based QoS Auditor Negotiation Mechanism for Grids , 2011, 2011 IEEE/ACM 12th International Conference on Grid Computing.
[51] Punam Bedi,et al. Trust Based Access Control for Grid Resources , 2011, 2011 International Conference on Communication Systems and Network Technologies.
[52] Emmanuel S. Pilli,et al. Network forensic system for port scanning attack , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).
[53] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[54] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[55] John R. Goodall,et al. Visualization is better! A comparative evaluation , 2009, 2009 6th International Workshop on Visualization for Cyber Security.
[56] Khaled M. Khan,et al. Establishing Trust in Cloud Computing , 2010, IT Professional.
[57] Punam Bedi,et al. Trust based Personalized Ecommerce System for Farmers , 2009, IICAI.
[58] Brigitte Charnomordic,et al. Fuzzy inference systems: An integrated modeling environment for collaboration between expert knowledge and data using FisPro , 2012, Expert Syst. Appl..
[59] M.A. Qadeer,et al. Monitoring and Analysis of Data Packets Using Data Stream Management System , 2008, 2008 International Conference on Computer and Electrical Engineering.
[60] Muthucumaru Maheswaran,et al. A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..
[61] Punam Bedi,et al. Predicting grid user trustworthiness using neural networks , 2011, 2011 World Congress on Information and Communication Technologies.
[62] Giorgos Zacharia,et al. Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..
[63] Sarvapali D. Ramchurn,et al. Trust-based mechanism design , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..
[64] John McHugh,et al. FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.
[65] Shanshan Song,et al. Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.
[66] Hector Garcia-Molina,et al. Limited reputation sharing in P2P systems , 2004, EC '04.
[67] B. Faltings,et al. Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms , 2007, J. Artif. Intell. Res..