Multidimensional Trust-Based Anomaly Detection System in Internet of Things
暂无分享,去创建一个
Fangyu Gai | Peidong Zhu | Jiexin Zhang | Xinwen Jiang | Jiexin Zhang | Peidong Zhu | Xinwen Jiang | Fangyu Gai
[1] Antonio Iera,et al. The Social Internet of Things (SIoT) - When social networks meet the Internet of Things: Concept, architecture and network characterization , 2012, Comput. Networks.
[2] Ing-Ray Chen,et al. Trust management for the internet of things and its application to service composition , 2012, 2012 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks (WoWMoM).
[3] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[4] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[5] Seungjoon Lee,et al. Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[6] Thiemo Voigt,et al. SVELTE: Real-time intrusion detection in the Internet of Things , 2013, Ad Hoc Networks.
[7] Carlos Martín-Vide,et al. Special Issue on Second International Conference on the Theory and Practice of Natural Computing, TPNC 2013 , 2016, Soft Comput..
[8] Ebrahim Mamdani,et al. Applications of fuzzy algorithms for control of a simple dynamic plant , 1974 .
[9] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[10] Lotfi A. Zadeh,et al. Fuzzy logic = computing with words , 1996, IEEE Trans. Fuzzy Syst..
[11] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[12] Sateesh Addepalli,et al. Fog computing and its role in the internet of things , 2012, MCC '12.
[13] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[14] G. Cauley,et al. Practices and new concepts in power system control , 1996 .
[15] Guiran Chang,et al. TRM-IoT: A trust management model based on fuzzy reputation for internet of things , 2011, Comput. Sci. Inf. Syst..
[16] Zdzislaw Pawlak,et al. Rough sets, decision algorithms and Bayes' theorem , 2002, Eur. J. Oper. Res..
[17] N. Truong,et al. A Reputation and Knowledge Based Trust Service Platform for Trustworthy Social Internet of Things , 2016 .
[18] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[19] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[20] Athanasios V. Vasilakos,et al. A survey on trust management for Internet of Things , 2014, J. Netw. Comput. Appl..
[21] Antonio F. Gómez-Skarmeta,et al. TACIoT: multidimensional trust-aware access control system for the Internet of Things , 2016, Soft Comput..