TML-CDS: Trusted Multi-layer Connected Dominating Set for Secure Routing in Distributed Networks
暂无分享,去创建一个
[1] Han Hu,et al. Optimal Computation Offloading in Collaborative LEO-IoT Enabled MEC: A Multiagent Deep Reinforcement Learning Approach , 2023, IEEE Transactions on Green Communications and Networking.
[2] Han Hu,et al. Energy-Efficient Trajectory Optimization for Aerial Video Surveillance under QoS Constraints , 2022, IEEE Conference on Computer Communications.
[3] Wei Chen,et al. A Trust-Based Security System for Data Collection in Smart City , 2021, IEEE Transactions on Industrial Informatics.
[4] Sudhakar Sengan,et al. RETRACTED ARTICLE: Dominating set based virtual backbone cluster scheduling for ensuring energy efficiency in asymmetric radio WSN , 2021, Journal of Ambient Intelligence and Humanized Computing.
[5] Peng Yuan,et al. CDS-Based Topology Control in FANETs via Power and Position Optimization , 2020, IEEE Wireless Communications Letters.
[6] Wuxiong Zhang,et al. Trust-Based Attack and Defense in Wireless Sensor Networks: A Survey , 2020, Wirel. Commun. Mob. Comput..
[7] Yanyan Li,et al. The Construction of a Virtual Backbone with a Bounded Diameter in a Wireless Network , 2020, Wirel. Commun. Mob. Comput..
[8] Ge Zhang,et al. TrueTrust: a feedback-based trust management model without filtering feedbacks in P2P networks , 2020, Peer-to-Peer Netw. Appl..
[9] Yong Luo,et al. Transforming Device Fingerprinting for Wireless Security via Online Multitask Metric Learning , 2020, IEEE Internet of Things Journal.
[10] Lei Shu,et al. BLTM: Beta and LQI Based Trust Model for Wireless Sensor Networks , 2019, IEEE Access.
[11] Suhyun Kim,et al. Coping with bad-mouthing in peer-to-peer file sharing networks , 2015, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P).
[12] Keshav P. Dahal,et al. Recommendation Based Trust Model with an Effective Defence Scheme for MANETs , 2015, IEEE Transactions on Mobile Computing.
[13] Naima Iltaf,et al. An attack resistant method for detecting dishonest recommendations in pervasive computing environment , 2012, 2012 18th IEEE International Conference on Networks (ICON).
[14] Erman Ayday,et al. Iterative Trust and Reputation Management Using Belief Propagation , 2012, IEEE Transactions on Dependable and Secure Computing.
[15] Otto Carlos Muniz Bandeira Duarte,et al. A Trust Model Robust to Slander Attacks in Ad Hoc Networks , 2008, 2008 Proceedings of 17th International Conference on Computer Communications and Networks.
[16] Jie Wu,et al. An extended localized algorithm for connected dominating set formation in ad hoc wireless networks , 2004, IEEE Transactions on Parallel and Distributed Systems.
[17] Liang Jun-bin,et al. An Energy-Balanced Connected Dominating Sets for Data Gatheringin Wireless Sensor Networks , 2013 .