A Multiagent Framework for Selection of Trustworthy Service Providers

[1]  Antonio F. Gómez-Skarmeta,et al.  Network access security for the internet: protocol for carrying authentication for network access , 2012, IEEE Communications Magazine.

[2]  Lam-for Kwok,et al.  Adaptive context-aware packet filter scheme using statistic-based blacklist generation in network intrusion detection , 2011, 2011 7th International Conference on Information Assurance and Security (IAS).

[3]  Patrick D. McDaniel,et al.  A Survey of BGP Security Issues and Solutions , 2010, Proceedings of the IEEE.

[4]  Wilfried N. Gansterer,et al.  On the detection and identification of botnets , 2010, Comput. Secur..

[5]  Markus Jakobsson,et al.  Controlling data in the cloud: outsourcing computation without outsourcing control , 2009, CCSW '09.

[6]  Young Ae Kim,et al.  Strategies for predicting local trust based on trust propagation in social networks , 2011, Knowl. Based Syst..

[7]  George Kesidis,et al.  Denial-of-service attack-detection techniques , 2006, IEEE Internet Computing.

[8]  David Osher,et al.  Creating Comprehensive and Collaborative Systems , 2002 .

[9]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[10]  Hossein Shirazi,et al.  Increasing Overall Network Security by Integrating Signature-Based NIDS with Packet Filtering Firewall , 2009, 2009 International Joint Conference on Artificial Intelligence.

[11]  Max Mühlhäuser,et al.  Cloud Computing Landscape and Research Challenges Regarding Trust and Reputation , 2010, 2010 7th International Conference on Ubiquitous Intelligence & Computing and 7th International Conference on Autonomic & Trusted Computing.

[12]  Rino Falcone,et al.  Trust in information sources as a source for trust: a fuzzy approach , 2003, AAMAS '03.

[13]  Adel Bouhoula,et al.  Data analyzer based on data mining for Honeypot Router , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.

[14]  Arshad Iqbal,et al.  Network Traffic Analysis and Intrusion Detection Using Packet Sniffer , 2010, 2010 Second International Conference on Communication Software and Networks.

[15]  Hongli Zhang,et al.  IR4CF: A intrusion replay system for computer forensics , 2011, 2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering.

[16]  Gong Wei,et al.  Application Design of Data Packet Capturing Based on Sharpcap , 2011, 2011 Fourth International Joint Conference on Computational Sciences and Optimization.

[17]  Wentao Liu Design and Implement of Common Network Security Scanning System , 2009, 2009 International Symposium on Intelligent Ubiquitous Computing and Education.

[18]  Valentin Cristea,et al.  Netpy: Advanced Network Traffic Monitoring , 2009, 2009 International Conference on Intelligent Networking and Collaborative Systems.

[19]  K. Kowalski,et al.  Packet information collection and transformation for network intrusion detection and prevention , 2008, 2008 International Symposium on Telecommunications.

[20]  Ayman Abdel-Hamid,et al.  A Visualization Framework for Traffic Data Exploration and Scan Detection , 2009, 2009 3rd International Conference on New Technologies, Mobility and Security.

[21]  Hamdi Yahyaoui,et al.  A trust-based game theoretical model for Web services collaboration , 2012, Knowl. Based Syst..

[22]  Jill Slay,et al.  Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[23]  Wang Xinyu,et al.  The research and design of content-based network monitor system , 2009, 2009 2nd International Conference on Power Electronics and Intelligent Transportation System (PEITS).

[24]  John R. Goodall,et al.  Visual Discovery in Computer Network Defense , 2007, IEEE Computer Graphics and Applications.

[25]  Éva Tardos,et al.  Truthful mechanisms for one-parameter agents , 2001, Proceedings 2001 IEEE International Conference on Cluster Computing.

[26]  Ruixuan Li,et al.  Trustworthy assurance of service interoperation in cloud environment , 2011, Int. J. Autom. Comput..

[27]  Georg Carle,et al.  Packet sampling for worm and botnet detection in TCP connections , 2010, 2010 IEEE Network Operations and Management Symposium - NOMS 2010.

[28]  Hu Han Performance improvement of TCP_Reno based on monitoring the wireless packet loss rate , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[29]  Tharam S. Dillon,et al.  Fuzzy Decision Support for Service Selection in E-Business Environments , 2007, 2007 IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making.

[30]  Bruce J. Nikkel An introduction to investigating IPv6 networks , 2007, Digit. Investig..

[31]  Ayman I. Kayssi,et al.  Fuzzy reputation-based trust model , 2011, Appl. Soft Comput..

[32]  Faisal B. Luqman TRIAGE: Applying context to improve timely delivery of critical data in mobile ad hoc networks for disaster response , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[33]  Naveed Ahmed,et al.  TCP/IP protocol stack analysis using MENet , 2003, TENCON 2003. Conference on Convergent Technologies for Asia-Pacific Region.

[34]  S. H. C. Haris,et al.  Packet analysis using packet filtering and traffic monitoring techniques , 2010, 2010 International Conference on Computer Applications and Industrial Electronics.

[35]  Emmanuel Hooper,et al.  An intelligent detection and response strategy to false positives and network attacks: operation of network quarantine channels and feedback methods to IDS , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).

[36]  Kouichi Sakurai,et al.  A Design of History Based Traffic Filtering with Probabilistic Packet Marking against DoS Attacks , 2010, 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet.

[37]  Jamal Bentahar,et al.  CRM : An efficient trust and reputation model for agent computing , 2011 .

[38]  Tharam S. Dillon,et al.  SLA-Based Trust Model for Cloud Computing , 2010, 2010 13th International Conference on Network-Based Information Systems.

[39]  Xinhua Mao,et al.  Research on the milling tool monitoring system based on wavelet neural network , 2011, Proceedings of 2011 International Conference on Electronic & Mechanical Engineering and Information Technology.

[40]  Rick Dove Self-organizing resilient network sensing (SornS) with very large scale anomaly detection , 2011, 2011 IEEE International Conference on Technologies for Homeland Security (HST).

[41]  Paulo S. Motta Pires,et al.  Using a packet manipulation tool for security analysis of industrial network protocols , 2007, 2007 IEEE Conference on Emerging Technologies and Factory Automation (EFTA 2007).

[42]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[43]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[44]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[45]  Michael S. Greenberg,et al.  Network Forensics Analysis , 2002, IEEE Internet Comput..

[46]  Sarvapali D. Ramchurn,et al.  DEVISING A TRUST MODEL FOR MULTI-AGENT INTERACTIONS USING CONFIDENCE AND REPUTATION , 2004, Appl. Artif. Intell..

[47]  Sung Jin Hur,et al.  Improved trust-aware recommender system using small-worldness of trust networks , 2010, Knowl. Based Syst..

[48]  Jordi Sabater-Mir,et al.  REGRET: reputation in gregarious societies , 2001, AGENTS '01.

[49]  Zhang Shuqin,et al.  A Fuzzy Set Based Trust and Reputation Model in P2P Networks , 2004 .

[50]  Alba Cristina Magalhaes Alves de Melo,et al.  A WS-Agreement-Based QoS Auditor Negotiation Mechanism for Grids , 2011, 2011 IEEE/ACM 12th International Conference on Grid Computing.

[51]  Punam Bedi,et al.  Trust Based Access Control for Grid Resources , 2011, 2011 International Conference on Communication Systems and Network Technologies.

[52]  Emmanuel S. Pilli,et al.  Network forensic system for port scanning attack , 2010, 2010 IEEE 2nd International Advance Computing Conference (IACC).

[53]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[54]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[55]  John R. Goodall,et al.  Visualization is better! A comparative evaluation , 2009, 2009 6th International Workshop on Visualization for Cyber Security.

[56]  Khaled M. Khan,et al.  Establishing Trust in Cloud Computing , 2010, IT Professional.

[57]  Punam Bedi,et al.  Trust based Personalized Ecommerce System for Farmers , 2009, IICAI.

[58]  Brigitte Charnomordic,et al.  Fuzzy inference systems: An integrated modeling environment for collaboration between expert knowledge and data using FisPro , 2012, Expert Syst. Appl..

[59]  M.A. Qadeer,et al.  Monitoring and Analysis of Data Packets Using Data Stream Management System , 2008, 2008 International Conference on Computer and Electrical Engineering.

[60]  Muthucumaru Maheswaran,et al.  A trust brokering system and its application to resource management in public-resource grids , 2004, 18th International Parallel and Distributed Processing Symposium, 2004. Proceedings..

[61]  Punam Bedi,et al.  Predicting grid user trustworthiness using neural networks , 2011, 2011 World Congress on Information and Communication Technologies.

[62]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[63]  Sarvapali D. Ramchurn,et al.  Trust-based mechanism design , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[64]  John McHugh,et al.  FloVis: Flow Visualization System , 2009, 2009 Cybersecurity Applications & Technology Conference for Homeland Security.

[65]  Shanshan Song,et al.  Trusted Grid Computing with Security Binding and Trust Integration , 2005, Journal of Grid Computing.

[66]  Hector Garcia-Molina,et al.  Limited reputation sharing in P2P systems , 2004, EC '04.

[67]  B. Faltings,et al.  Obtaining Reliable Feedback for Sanctioning Reputation Mechanisms , 2007, J. Artif. Intell. Res..