GenTrust: A genetic trust management model for peer-to-peer systems
暂无分享,去创建一个
[1] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[2] Xin Xu,et al. An adaptive recommendation trust model in multiagent system , 2004 .
[3] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[4] Gayatri Swamynathan,et al. Decoupling Service and Feedback Trust in a Peer-to-Peer Reputation System , 2005, ISPA Workshops.
[5] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[6] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[7] Munindar P. Singh,et al. A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.
[8] Ajith Abraham,et al. Evolving Intrusion Detection Systems , 2006, Genetic Systems Programming.
[9] Eugene H. Spafford,et al. Applying Genetic Programming to Intrusion Detection , 1995 .
[10] Karl Aberer,et al. Trust-Aware Delivery of Composite Goods , 2002, AP2PC.
[11] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[12] Sheila Anand,et al. Peer profile based trust model for P2P systems using genetic algorithm , 2012, Peer Peer Netw. Appl..
[13] Chris Cornelis,et al. Gradual trust and distrust in recommender systems , 2009, Fuzzy Sets Syst..
[14] Chithra Selvaraj,et al. A Role Based Trust Model for Peer to Peer Systems Using Credential Trees , 2011 .
[15] Mark A. Hall,et al. Correlation-based Feature Selection for Machine Learning , 2003 .
[16] John A. Clark,et al. A Multi-objective Optimisation Approach to IDS Sensor Placement , 2009, CISIS.
[17] Vijay Kumar,et al. Building Trust and Security in Peer-to-Peer Systems , 2007, Secure Data Management in Decentralized Systems.
[18] Ernesto Damiani,et al. Managing and Sharing Servents' Reputations in P2P Systems , 2003, IEEE Trans. Knowl. Data Eng..
[20] Krishna P. Gummadi,et al. Measurement study of peer-to-peer file system sharing , 2002 .
[21] John A. Clark,et al. A grammatical evolution approach to intrusion detection on mobile ad hoc networks , 2009, WiSec '09.
[22] Peter Nordin,et al. Genetic programming - An Introduction: On the Automatic Evolution of Computer Programs and Its Applications , 1998 .
[23] Valentin Cristea,et al. Decentralized Trust Management in Peer-to-Peer Systems , 2011, 2011 10th International Symposium on Parallel and Distributed Computing.
[24] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[25] Svein J. Knapskog,et al. Learning Trust in Dynamic Multiagent Environments using HMMs. , 2008 .
[26] Vladimiro Sassone,et al. HMM-Based Trust Model , 2009, Formal Aspects in Security and Trust.
[27] John R. Koza,et al. Genetic programming - on the programming of computers by means of natural selection , 1993, Complex adaptive systems.
[28] Raouf Boutaba,et al. Reputation-Based Trust Management in Peer-to-Peer Systems: Taxonomy and Anatomy , 2010 .
[29] Ahmet Burak Can,et al. Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming , 2014, EvoApplications.
[30] Xin Liu,et al. A GENERIC TRUST FRAMEWORK FOR LARGE‐SCALE OPEN SYSTEMS USING MACHINE LEARNING , 2011, Comput. Intell..
[31] Klara Nahrstedt,et al. A trust management framework for service-oriented environments , 2009, WWW '09.
[32] Chrysanthos Dellarocas,et al. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.
[33] Xu Wu. A distributed trust management model for mobile P2P networks , 2012, Peer Peer Netw. Appl..
[34] Wolfgang Banzhaf,et al. The use of computational intelligence in intrusion detection systems: A review , 2010, Appl. Soft Comput..
[35] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[36] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[37] Julita Vassileva,et al. Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.
[38] David B. Fogel. What is evolutionary computation , 1995 .
[39] John A. Clark,et al. Evolutionary computation techniques for intrusion detection in mobile ad hoc networks , 2011, Comput. Networks.
[40] Stephen P. Boyd,et al. Randomized gossip algorithms , 2006, IEEE Transactions on Information Theory.
[41] Xin Xu,et al. An adaptive recommendation trust model in multiagent system , 2004, Proceedings. IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2004. (IAT 2004)..
[42] Robert Beverly,et al. Machine learning for efficient neighbor selection in unstructured P2P networks , 2007 .
[43] E. Friedman,et al. The Social Cost of Cheap Pseudonyms , 2001 .
[44] Paul Resnick,et al. Reputation systems , 2000, CACM.
[45] Kai Hwang,et al. GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks , 2008, IEEE Transactions on Knowledge and Data Engineering.
[46] Audun Jsang,et al. Analysing topologies of transitive trust , 2003 .
[47] Sevil Sen,et al. A Survey of Intrusion Detection Systems Using Evolutionary Computation , 2015 .
[48] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[49] Krishna P. Gummadi,et al. An analysis of Internet content delivery systems , 2002, OPSR.
[50] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[51] Audun Jøsang,et al. Trust network analysis with subjective logic , 2006, ACSC.
[52] Lik Mui,et al. A Computational Model of Trust and Reputation for E-businesses , 2002 .
[53] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .
[54] Vidhyacharan Bhaskar,et al. A unified trust management strategy for content sharing in Peer-to-Peer networks , 2013 .
[55] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[56] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[57] Bharat K. Bhargava,et al. SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.
[58] Radu Stoleru,et al. On the optimality of cooperative intrusion detection for resource constrained wireless networks , 2013, Comput. Secur..
[59] W. Sweet,et al. The troubling state of nuclear controls , 2000 .
[60] Ying Cai,et al. A Reputation-based Trust Management in Peer-to-Peer Network Systems , 2004, ISCA PDCS.
[61] Basit Qureshi,et al. A distributed reputation and trust management scheme for mobile peer-to-peer networks , 2012, Comput. Commun..
[62] Xin Liu,et al. Modeling Context Aware Dynamic Trust Using Hidden Markov Model , 2012, AAAI.
[63] David Gefen,et al. Reflections on the dimensions of trust and trustworthiness among online consumers , 2002, Data Base.
[64] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[65] Stephen Hailes,et al. Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.
[66] Philippe Chatalic,et al. A probabilistic trust model for semantic peer-to-peer systems , 2008, ECAI.
[67] Juan E. Tapiador,et al. Evolving High-Speed, Easy-to-Understand Network Intrusion Detection Rules with Genetic Programming , 2009, EvoWorkshops.