Autoregressive Trust Management in Wireless Ad Hoc Networks
暂无分享,去创建一个
Amiya Nayak | Xu Li | Zhi Li | Venkat Narasimhan | Milos Stojmenovic | A. Nayak | M. Stojmenovic | Xu Li | Zhi Li | V. Narasimhan
[1] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[2] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[3] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2008, TOSN.
[4] Xiaohui Liang,et al. GRS: The green, reliability, and security of emerging machine to machine communications , 2011, IEEE Communications Magazine.
[5] Vijay Varadharajan,et al. Subjective logic based trust model for mobile ad hoc networks , 2008, SecureComm.
[6] Jiming Chen,et al. Toward Reliable Actor Services in Wireless Sensor and Actor Networks , 2011, 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor Systems.
[7] Ivan Stojmenovic,et al. Strictly Localized Sensor Self-Deployment for Optimal Focused Coverage , 2011, IEEE Transactions on Mobile Computing.
[8] Xu Li,et al. Mobility Prediction Based Neighborhood Discovery in Mobile Ad Hoc Networks , 2011, Networking.
[9] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[10] Petre Stoica,et al. Least-squares, Yule-Walker, and overdetermined Yule—Walker estimation of AR parameters: a Monte Carlo analysis of finite-sample properties , 1986 .
[11] Gregory G. Finn,et al. Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report. , 1987 .
[12] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[13] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[14] Jian-ping Qiu,et al. Trust Management for Semantec Web , 2008, 2008 International Conference on Computer Science and Software Engineering.
[15] P. Young,et al. Time series analysis, forecasting and control , 1972, IEEE Transactions on Automatic Control.
[16] Weihua Zhuang,et al. Exploiting prediction to enable Secure and Reliable routing in Wireless Body Area Networks , 2012, 2012 Proceedings IEEE INFOCOM.
[17] H. Akaike. A new look at the statistical model identification , 1974 .
[18] Xiaohui Liang,et al. SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks , 2012, 2012 IEEE 32nd International Conference on Distributed Computing Systems.
[19] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[20] Robert H. Deng,et al. Highly reliable trust establishment scheme in ad hoc networks , 2004, Comput. Networks.
[21] Eric R. Ziegel,et al. Engineering Statistics , 2004, Technometrics.
[22] Jinshu Su,et al. A reputation inference model based on linear hidden markov process , 2009, 2009 ISECS International Colloquium on Computing, Communication, Control, and Management.
[23] Jordi Sabater-Mir,et al. Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.
[24] Xiaodong Lin,et al. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks , 2009, 2010 Proceedings IEEE INFOCOM.
[25] Lea Kutvonen,et al. Trust Management Survey , 2005, iTrust.
[26] Simson L. Garfinkel,et al. PGP: Pretty Good Privacy , 1994 .
[27] Joel Weise-Sunps,et al. Public Key Infrastructure Overview , 2001 .