Trust based Algorithm for communication between Machine to Machine
暂无分享,去创建一个
[1] Qiang Ni,et al. A K-Anonymity Based Schema for Location Privacy Preservation , 2019, IEEE Transactions on Sustainable Computing.
[2] Ziyan Jia,et al. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..
[3] Keng Siau,et al. Building Trust in Artificial Intelligence, Machine Learning, and Robotics , 2018 .
[4] Qi Shi,et al. Machine Learning Based Trust Computational Model for IoT Services , 2019, IEEE Transactions on Sustainable Computing.
[5] Mirko Perkusich,et al. A Smart Trust Management Method to Detect On-Off Attacks in the Internet of Things , 2018, Secur. Commun. Networks.
[6] Feng Jiang,et al. Deep Learning Based Multi-Channel Intelligent Attack Detection for Data Security , 2020, IEEE Transactions on Sustainable Computing.
[7] Aurelio Tommasetti,et al. A Review of Smart Cities Based on the Internet of Things Concept , 2017 .
[8] Zeinab Movahedi,et al. A Trust-Based Offloading for Mobile M2M Communications , 2016, 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, Advanced and Trusted Computing, Scalable Computing and Communications, Cloud and Big Data Computing, Internet of People, and Smart World Congress (UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld).
[9] Mohsen Guizani,et al. Internet of Things Architecture: Recent Advances, Taxonomy, Requirements, and Open Challenges , 2017, IEEE Wireless Communications.
[10] Xuan Li,et al. Communication-efficient outsourced privacy-preserving classification service using trusted processor , 2019, Inf. Sci..
[11] Ajay Vikram Singh,et al. Trust based Intelligent Routing Algorithm for Delay Tolerant Network using Artificial Neural Network , 2016, Wireless Networks.
[12] Guangjie Han,et al. A Trust Cloud Model for Underwater Wireless Sensor Networks , 2017, IEEE Communications Magazine.
[13] Gu Li-ze,et al. Trust management mechanism for Internet of Things , 2014, China Communications.
[14] Swapna B Sasi,et al. On - off attack management based on trust , 2016, 2016 Online International Conference on Green Engineering and Technologies (IC-GET).
[15] K. Kulothungan,et al. Secure-MQTT: an efficient fuzzy logic-based approach to detect DoS attack in MQTT protocol for internet of things , 2019, EURASIP J. Wirel. Commun. Netw..