Semantic Web attacks and countermeasures
暂无分享,去创建一个
[1] Henda Hajjami Ben Ghézala,et al. Situational Secure Web Services Design Methods , 2007, International Conference on Software Engineering Advances (ICSEA 2007).
[2] James A. Hendler,et al. The Semantic Web" in Scientific American , 2001 .
[3] Andreas Schaad,et al. SOAP-based Secure Conversation and Collaboration , 2007, IEEE International Conference on Web Services (ICWS 2007).
[4] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[5] Chrysanthos Dellarocas,et al. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.
[6] Suresh Kumar,et al. Realization of Threats and Countermeasure in Semantic Web Services , 2010 .
[7] Bhavani M. Thuraisingham,et al. Security standards for the semantic web , 2005, Comput. Stand. Interfaces.
[8] Bos. Krupa Bihać. Making secure Semantic Web , 2010 .
[9] S. Buchegger,et al. Coping with False Accusations in Misbehavior Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[10] R. Doyle. The American terrorist. , 2001, Scientific American.
[11] Podzvizd Velika. Making secure Semantic Web , 2010 .
[12] Abhinav Nath Gupta,et al. ATTACKS ON WEB SERVICES NEED TO SECURE XML ON WEB , 2013 .
[13] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[14] Singh Chalga Manjeet,et al. Cancellable Biometrics for Security and Privacy Enforcement on Semantic Web , 2011 .
[15] Zhu Han,et al. Defense of trust management vulnerabilities in distributed networks , 2008, IEEE Communications Magazine.
[16] I. Sasase,et al. Detection of HTTP-GET flood Attack Based on Analysis of Page Access Behavior , 2007, 2007 IEEE Pacific Rim Conference on Communications, Computers and Signal Processing.
[17] S. Kumar,et al. Ontology for Detection of Web Attacks , 2013, 2013 International Conference on Communication Systems and Network Technologies.
[18] Feng Xiao,et al. DSybil: Optimal Sybil-Resistance for Recommendation Systems , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[19] James A. Hendler,et al. The Semantic Web 10 , 2011 .
[20] Alice Cheng,et al. Sybilproof reputation mechanisms , 2005, P2PECON '05.
[21] L.F. Perrone,et al. A Study of On-Off Attack Models for Wireless Ad Hoc Networks , 2006, 2006 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks.
[22] Suresh Kumar,et al. Apprehension of threats and countermeasures in semantic web services , 2011 .
[23] Bhavani M. Thuraisingham,et al. Trustworthy Semantic Web Technologies for Secure Knowledge Management , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.