The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networks
暂无分享,去创建一个
Adnan Al-Anbuky | William Liu | Ming Xiang | Quan Bai | William Liu | A. Al-Anbuky | Ming-Sen Xiang | Q. Bai
[1] J. Martín-Hernández. Measuring Robustness of Complex Networks , 2013 .
[2] H. T. Mouftah,et al. The internet of things [Guest Editorial] , 2011, IEEE Commun. Mag..
[3] J. H. Davis,et al. An Integrative Model of Organizational Trust: Past, Present, and Future , 2007 .
[4] Subhash Challa,et al. Survey of trust models in different network domains , 2010, ArXiv.
[5] Audun Jøsang,et al. The right type of trust for distributed systems , 1996, NSPW '96.
[6] R. Burt. The Network Structure Of Social Capital , 2000 .
[7] Richard A. Watson,et al. The web as an adaptive network: coevolution of web behavior and web structure , 2011, WebSci '11.
[8] Adnan Al-Anbuky,et al. An Authenticated Key Agreement Scheme for Wireless Sensor Networks , 2014, J. Sens. Actuator Networks.
[9] Lingfeng Wang,et al. Trust System Design Optimization in Smart Grid Network Infrastructure , 2013, IEEE Transactions on Smart Grid.
[10] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[11] John S. Baras,et al. On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.
[12] Steven B. Andrews,et al. Structural Holes: The Social Structure of Competition , 1995, The SAGE Encyclopedia of Research Design.
[13] Chunyan Miao,et al. A Survey of Trust and Reputation Management Systems in Wireless Communications , 2010, Proceedings of the IEEE.
[14] Lin Chuang,et al. Quantitative Analysis of Trust Evidence in Internet , 2006, 2006 International Conference on Communication Technology.
[15] N.J. Davis,et al. Toward a decentralized trust-based access control system for dynamic collaboration , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[16] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[17] Robert E. Kooij,et al. Graph measures and network robustness , 2013, ArXiv.
[18] Luming Tan,et al. Future internet: The Internet of Things , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).
[19] Jingsha He,et al. Reputation-based Trust Update in Network Environment , 2008, 2008 International Symposium on Electronic Commerce and Security.
[20] William Liu,et al. Self-Adjustable Trust-Based Energy Efficient Routing for Smart Grid Systems , 2012, 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology.
[21] Michel Riguidel,et al. Distributed Trust Infrastructure and Trust-Security Articulation: Application to Heterogeneous Networks , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[22] Bin Mu,et al. A method for evaluating initial trust value of direct trust and recommender trust , 2010, 2010 International Conference On Computer Design and Applications.
[23] Caterina M. Scoglio,et al. Optimizing algebraic connectivity by edge rewiring , 2013, Appl. Math. Comput..
[24] Neeli R. Prasad,et al. A fuzzy approach to trust based access control in internet of things , 2013, Wireless VITAE 2013.
[25] Thilo Gross,et al. Adaptive Networks: Theory, Models and Applications , 2009 .
[26] Vito Latora,et al. Social Cohesion, Structural Holes, and a Tale of Two Measures , 2012, ArXiv.
[27] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .