Self-observation and recommendation based trust model with defense scheme for wireless ad hoc network
暂无分享,去创建一个
[1] Francesco Palmieri,et al. Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification , 2016, Soft Computing.
[2] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[3] Ning Liu,et al. An Adaptive Approach to Detecting Black and Gray Hole Attacks in Ad Hoc Network , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.
[4] Ravinder Singh,et al. Multi-level trust based intelligence intrusion detection system to detect the malicious nodes using elliptic curve cryptography in MANET , 2017, Cluster Computing.
[5] Masoud Sabaei,et al. An Efficient Scheme to Motivate Cooperation in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).
[6] Jean-Yves Le Boudec,et al. Self-policing mobile ad hoc networks by reputation systems , 2005, IEEE Communications Magazine.
[7] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[8] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[9] Yongguang Zhang,et al. Security in Mobile Ad-Hoc Networks , 2005 .
[10] Zheng Yan,et al. Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .
[11] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[12] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[13] Niki Pissinou,et al. Collaborative Trust-Based Secure Routing in Multihop Ad Hoc Networks , 2004, NETWORKING.
[14] Francesco Palmieri,et al. Detecting unfair recommendations in trust-based pervasive environments , 2019, Inf. Sci..
[15] Ivan Stojmenovic,et al. MOBILE AD HOC NETWORKING : THE CUTTING EDGE DIRECTIONS , 2012 .
[16] Anupam Joshi,et al. Security Through Collaboration and Trust in MANETs , 2012, Mob. Networks Appl..
[17] Meng Wu,et al. A Trust Evaluation Method for Node Cooperation in Mobile Ad Hoc Networks , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).
[18] Peng Liu,et al. A Novel Hybrid Trust Management Framework for MANETs , 2009, 2009 29th IEEE International Conference on Distributed Computing Systems Workshops.
[19] P. Bharathisindhu,et al. An improved model based on genetic algorithm for detecting intrusion in mobile ad hoc network , 2018, Cluster Computing.
[20] Ping Li,et al. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures , 2012, J. Netw. Comput. Appl..
[21] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[22] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[23] Uthman A. Baroudi,et al. Efficient monitoring approach for reputation system-based trust-aware routing in wireless sensor networks , 2009, IET Commun..
[24] Mani B. Srivastava,et al. Reputation-based framework for high integrity sensor networks , 2004, SASN '04.
[25] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..