Hierarchical trust management of community of interest groups in mobile ad hoc networks
暂无分享,去创建一个
Jia Guo | Ing-Ray Chen | I. Chen | Jia Guo
[1] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[2] Ing-Ray Chen,et al. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[3] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[4] Sokol Kosta,et al. Small World in Motion (SWIM): Modeling Communities in Ad-Hoc Mobile Networking , 2010, 2010 7th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON).
[5] Ing-Ray Chen,et al. Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..
[6] Mrs. A. Sangeetha,et al. REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .
[7] Stathes Hadjiefthymiades,et al. Trust management in mobile ad hoc networks , 2014, 2014 16th International Telecommunications Network Strategy and Planning Symposium (Networks).
[8] Junping Du,et al. LDTS: A Lightweight and Dependable Trust System for Clustered Wireless Sensor Networks , 2013, IEEE Transactions on Information Forensics and Security.
[9] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[10] Sheng-Tzong Cheng,et al. Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.
[11] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[12] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[13] Ing-Ray Chen,et al. A survey of intrusion detection in wireless network applications , 2014, Comput. Commun..
[14] Ersin Uzun,et al. A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..
[15] Jin-Hee Cho,et al. Performance analysis of hierarchical group key management integrated with adaptive intrusion detection in mobile ad hoc networks , 2011, Perform. Evaluation.
[16] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[17] Ing-Ray Chen,et al. Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..
[18] Jin-Hee Cho,et al. Performance optimization of region-based group key management in mobile ad hoc networks , 2008, Perform. Evaluation.
[19] Erman Ayday,et al. An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.
[20] Ing-Ray Chen,et al. Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.
[21] Jin-Hee Cho,et al. Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[22] Mingchu Li,et al. ServiceTrust: Trust Management in Service Provision Networks , 2013, 2013 IEEE International Conference on Services Computing.
[23] Audun Jøsang,et al. Semantic Constraints for Trust Transitivity , 2005, APCCM.
[24] Vijay Varadharajan,et al. A trust management architecture for hierarchical wireless sensor networks , 2010, IEEE Local Computer Network Conference.
[25] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[26] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[27] Jia Guo,et al. Dynamic Hierarchical Trust Management of Mobile Groups and Its Application to Misbehaving Node Detection , 2014, 2014 IEEE 28th International Conference on Advanced Information Networking and Applications.
[28] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[29] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[30] David M. Nicol,et al. A calculus of trust and its application to PKI and identity management , 2009, IDtrust '09.
[31] Ananthram Swami,et al. Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[32] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[33] Ing-Ray Chen,et al. Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..
[34] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[35] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[36] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[37] Muthucumaru Maheswaran,et al. Towards a Gravity-Based Trust Model for Social Networking Systems , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[38] Qinghua Li,et al. Routing in Socially Selfish Delay Tolerant Networks , 2010, 2010 Proceedings IEEE INFOCOM.
[39] Ing-Ray Chen,et al. Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..
[40] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.