A fuzzy-based trust model for flying ad hoc networks (FANETs)
暂无分享,去创建一个
[1] Zhiping Jia,et al. A Subjective Trust Management Model with Multiple Decision Factors for MANET Based on AHP and Fuzzy Logic Rules , 2011, 2011 IEEE/ACM International Conference on Green Computing and Communications.
[2] Edwin Hsing-Mean Sha,et al. Trust prediction and trust-based source routing in mobile ad hoc networks , 2013, Ad Hoc Networks.
[3] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[4] Anil Kumar Verma,et al. Experimental analysis of AODV, DSDV and OLSR routing protocol for flying adhoc networks (FANETs) , 2015, 2015 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT).
[5] Rutvij H. Jhaveri,et al. Attack‐pattern discovery based enhanced trust model for secure routing in mobile ad‐hoc networks , 2017, Int. J. Commun. Syst..
[6] J. Bezdek,et al. FCM: The fuzzy c-means clustering algorithm , 1984 .
[7] Levente Buttyán,et al. Stimulating Cooperation in Self-Organizing Mobile Ad Hoc Networks , 2003, Mob. Networks Appl..
[8] Peng Liu,et al. An Objective Trust Management Framework for Mobile Ad Hoc Networks , 2007, 2007 IEEE 65th Vehicular Technology Conference - VTC2007-Spring.
[9] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[10] Robert P. W. Duin,et al. Feature Scaling in Support Vector Data Descriptions , 2000 .
[11] Jia Guo,et al. Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[12] Rajashekhar C. Biradar,et al. Secured routing in wireless sensor networks using fault‐free and trusted nodes , 2016, Int. J. Commun. Syst..
[13] Ruidong Li,et al. Future trust management framework for mobile ad hoc networks , 2008, IEEE Communications Magazine.
[14] Hossein Jadidoleslamy. TMS-HCW: a trust management system in hierarchical clustered wireless sensor networks , 2015, Secur. Commun. Networks.
[15] Christine Julien,et al. Pervasive Context Sharing in Magpie: Adaptive Trust-Based Privacy Protection , 2015, MobiCASE.
[16] Fan Bai,et al. MVSec: Secure and Easy-to-Use Pairing of Mobile Devices with Vehicles (CMU-CyLab-14-006) , 2014 .
[17] Theodore S. Rappaport,et al. Wireless Communications -- Principles and Practice, Second Edition. (The Book End) , 2002 .
[18] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[19] Xiao Zhi Gao,et al. A Hybrid Optimization Method for Fuzzy Classification Systems , 2008, 2008 Eighth International Conference on Hybrid Intelligent Systems.
[20] Ilker Bekmezci,et al. Flying Ad-Hoc Networks (FANETs): A survey , 2013, Ad Hoc Networks.
[21] Guy Pujolle,et al. Trust-Distortion Resistant Trust Management Frameworks on Mobile Ad Hoc Networks: A Survey , 2016, IEEE Communications Surveys & Tutorials.
[22] A. V. Deshpande,et al. Trust Management Model based on Fuzzy Approach for Ubiquitous Computing , 2016, Int. J. Ambient Comput. Intell..
[23] Ernesto Damiani,et al. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems , 2006, J. Assoc. Inf. Sci. Technol..
[24] Yongwei Wang,et al. Enhancing Node Cooperation in Mobile Wireless Ad Hoc Networks with Selfish Nodes , 2008 .
[25] Kamel Adi,et al. Efficient certificateless web-of-trust model for public-key authentication in MANET , 2015, Comput. Commun..
[26] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[27] Yacine Rebahi,et al. A reputation-based trust mechanism for ad hoc networks , 2005, 10th IEEE Symposium on Computers and Communications (ISCC'05).
[28] Nadeem Javaid,et al. Fuzzy-Based Trust Model for Detection of Selfish Nodes in MANETs , 2016, 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA).
[29] Joan Feigenbaum,et al. Compliance Checking in the PolicyMaker Trust Management System , 1998, Financial Cryptography.
[30] Ramanathan V. Guha,et al. Propagation of trust and distrust , 2004, WWW '04.
[31] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.