Trust management in mobile ad hoc networks for bias minimization and application performance maximization
暂无分享,去创建一个
Jia Guo | Jin-Hee Cho | Ing-Ray Chen | Fenye Bao | I. Chen | Fenye Bao | Jin-Hee Cho | Jia Guo
[1] Ananthram Swami,et al. A Provenance-Based Trust Model for Delay Tolerant Networks , 2012, IFIPTM.
[2] Jin-Hee Cho,et al. Trust Management for Encounter-Based Routing in Delay Tolerant Networks , 2010, 2010 IEEE Global Telecommunications Conference GLOBECOM 2010.
[3] Ing-Ray Chen,et al. Performance Analysis of Admission Control Algorithms Based on Reward Optimization for Real-Time Multimedia Servers , 1998, Perform. Evaluation.
[4] Licia Capra,et al. Autonomic trust prediction for pervasive systems , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).
[5] Stefanos Gritzalis,et al. Trust Establishment in Ad Hoc and Sensor Networks , 2006, CRITIS.
[6] Jin-Hee Cho,et al. Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing , 2014, IEEE Transactions on Parallel and Distributed Systems.
[7] Sheng-Tzong Cheng,et al. Dynamic quota-based admission control with sub-rating in multimedia servers , 2000, Multimedia Systems.
[8] Ben-Jye Chang,et al. Markov Chain Trust Model for Trust-Value Analysis and Key Management in Distributed Multicast MANETs , 2009, IEEE Transactions on Vehicular Technology.
[9] Jean-Yves Le Boudec,et al. Analysis of a reputation system for mobile ad-hoc networks with liars , 2005, Third International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks (WiOpt'05).
[10] Jin-Hee Cho,et al. Composite trust-based public key management in mobile ad hoc networks , 2013, SAC '13.
[11] Ing-Ray Chen,et al. Analysis of Replicated Data with Repair Dependency , 1996, Comput. J..
[12] Mukesh Singhal,et al. Trust Management in Distributed Systems , 2007, Computer.
[13] Carlton R. Davis. A localized trust management scheme for ad hoc networks , 2004 .
[14] Malik Magdon-Ismail,et al. Simulating the Diffusion of Information: An Agent-Based Modeling Approach , 2010, Int. J. Agent Technol. Syst..
[15] Svein J. Knapskog,et al. TSR: trust-based secure MANET routing using HMMs , 2008, Q2SWinet '08.
[16] Zhu Han,et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[17] Öznur Özkasap,et al. Ad-Hoc Networks , 2008, Encyclopedia of Algorithms.
[18] Pang-Ning Tan,et al. Local detection of selfish routing behavior in ad hoc networks , 2005, 8th International Symposium on Parallel Architectures,Algorithms and Networks (ISPAN'05).
[19] Farokh B. Bastani,et al. Effect of artificial-intelligence planning-procedures on system reliability , 1991 .
[20] Audun Jøsang,et al. AIS Electronic Library (AISeL) , 2017 .
[21] Ananthram Swami,et al. Modeling and Analysis of Trust Management for Cognitive Mission-Driven Group Communication Systems in Mobile Ad Hoc Networks , 2009, 2009 International Conference on Computational Science and Engineering.
[22] Jin-Hee Cho,et al. Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection , 2012, IEEE Transactions on Network and Service Management.
[23] Amiya Nayak,et al. A Distributed Constraint Satisfaction Problem Approach to Virtual Device Composition , 2012, IEEE Transactions on Parallel and Distributed Systems.
[24] Thomas F. La Porta,et al. On Exploiting Transient Social Contact Patterns for Data Forwarding in Delay-Tolerant Networks , 2013, IEEE Transactions on Mobile Computing.
[25] G. Pulla,et al. A SURVEY ON TRUST MANAGEMENT FOR MOBILE AD HOC NETWORKS , 2010 .
[26] Isaac Woungang,et al. Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..
[27] Farokh B. Bastani,et al. Reliability of systems with fuzzy-failure criterion , 1994, Proceedings of Annual Reliability and Maintainability Symposium (RAMS).
[28] Michael R. Lyu,et al. Trust- and clustering-based authentication services in mobile ad hoc networks , 2004, 24th International Conference on Distributed Computing Systems Workshops, 2004. Proceedings..
[29] Azzedine Boukerche,et al. Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.
[30] Ing-Ray Chen,et al. Design and Performance Analysis of Mobility Management Schemes Based on Pointer Forwarding for Wireless Mesh Networks , 2011, IEEE Transactions on Mobile Computing.
[31] Erman Ayday,et al. An Iterative Algorithm for Trust Management and Adversary Detection for Delay-Tolerant Networks , 2012, IEEE Transactions on Mobile Computing.
[32] Ing-Ray Chen,et al. Utilizing call admission control for pricing optimization of multiple service classes in wireless cellular networks , 2009, Comput. Commun..
[33] Joan Feigenbaum,et al. Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[34] Ing-Ray Chen,et al. Adaptive Fault-Tolerant QoS Control Algorithms for Maximizing System Lifetime of Query-Based Wireless Sensor Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[35] I. Sengupta,et al. A Distributed Trust Mechanism for Mobile Ad Hoc Networks , 2006, 2006 International Symposium on Ad Hoc and Ubiquitous Computing.
[36] Antonio Alfredo Ferreira Loureiro,et al. Decentralized intrusion detection in wireless sensor networks , 2005, Q2SWinet '05.
[37] Gene Tsudik,et al. Diffie-Hellman key distribution extended to group communication , 1996, CCS '96.
[38] Ing-Ray Chen,et al. Performance Analysis of Location-Aware Mobile Service Proxies for Reducing Network Cost in Personal Communication Systems , 2005, Mob. Networks Appl..
[39] Ing-Ray Chen,et al. Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks , 2003, 36th Annual Simulation Symposium, 2003..
[40] Zhaoyu Liu,et al. A dynamic trust model for mobile ad hoc networks , 2004, Proceedings. 10th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2004. FTDCS 2004..
[41] Jennifer Golbeck,et al. Computing with Trust: Definition, Properties, and Algorithms , 2006, 2006 Securecomm and Workshops.
[42] L. Bengtsson,et al. Lookup Table Optimization for Sensor Linearization in Small Embedded Systems , 2012 .
[43] George F. Riley,et al. The ns-3 Network Simulator , 2010, Modeling and Tools for Network Simulation.
[44] Ananthram Swami,et al. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks , 2012, J. Netw. Comput. Appl..
[45] Brijesh Kumar Chaurasia,et al. Trust Management Model for Wireless Ad Hoc Networks , 2011, SocProS.
[46] Kishor S. Trivedi,et al. Performance and Reliability Analysis of Computer Systems , 1996, Springer US.
[47] Ing-Ray Chen,et al. Agent-Based Forwarding Strategies for Reducing Location Management Cost in Mobile Networks , 2001, Mob. Networks Appl..
[48] Zhenfu Cao,et al. A Probabilistic Misbehavior Detection Scheme toward Efficient Trust Establishment in Delay-Tolerant Networks , 2014 .
[49] John S. Baras,et al. On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.
[50] Ing-Ray Chen,et al. Performance Evaluation of Forwarding Strategies for Location Management in Mobile Networks , 1998, Comput. J..
[51] Farokh B. Bastani,et al. On the Reliability of AI Planning Software in Real-Time Applications , 1995, IEEE Trans. Knowl. Data Eng..
[52] Ing-Ray Chen,et al. Analyzing dynamic voting using Petri nets , 1996, Proceedings 15th Symposium on Reliable Distributed Systems.
[53] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.
[54] William Joseph Adams,et al. Validating a Trust-based Access Control System , 2007, IFIPTM.
[55] John D. Musa,et al. Operational profiles in software-reliability engineering , 1993, IEEE Software.
[56] Jia Guo,et al. Integrated social and quality of service trust management of mobile groups in ad hoc networks , 2013, 2013 9th International Conference on Information, Communications & Signal Processing.
[57] Munindar P. Singh,et al. Trustworthy Service Selection and Composition , 2011, TAAS.
[58] Jean-Yves Le Boudec,et al. The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .
[59] Jin-Hee Cho,et al. Trust-Based Intrusion Detection in Wireless Sensor Networks , 2011, 2011 IEEE International Conference on Communications (ICC).
[60] Vijay Varadharajan,et al. Trust and Recommendations in Mobile Ad hoc Networks , 2007, International Conference on Networking and Services (ICNS '07).
[61] Jin-Hee Cho,et al. Effect of Intrusion Detection on Reliability of Mission-Oriented Mobile Group Systems in Mobile Ad Hoc Networks , 2010, IEEE Transactions on Reliability.
[62] Ing-Ray Chen,et al. Admission Control Algorithms for Revenue Optimization with QoS Guarantees in Mobile Wireless Networks , 2006, Wirel. Pers. Commun..
[63] Ing-Ray Chen,et al. Effect of Intrusion Detection and Response on Reliability of Cyber Physical Systems , 2013, IEEE Transactions on Reliability.
[64] Ing-Ray Chen,et al. Behavior-Rule Based Intrusion Detection Systems for Safety Critical Smart Grid Applications , 2013, IEEE Transactions on Smart Grid.
[65] Refik Molva,et al. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.
[66] Xue Liu,et al. A trust model based on fuzzy recommendation for mobile ad-hoc networks , 2009, Comput. Networks.
[67] Mrs. A. Sangeetha,et al. REDUNDANCY MANAGEMENT OF MULTIPATH ROUTING FOR INTRUSION TOLERANCE IN HETEROGENEOUS WIRELESS SENSOR NETWORKS , 2014 .
[68] Brian L. Mark,et al. Robust cooperative trust establishment for MANETs , 2006, SASN '06.
[69] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[70] Mads Haahr,et al. Social Network Analysis for Information Flow in Disconnected Delay-Tolerant MANETs , 2009, IEEE Transactions on Mobile Computing.
[71] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[72] Otto Carlos Muniz Bandeira Duarte,et al. Trust management in mobile ad hoc networks using a scalable maturity-based model , 2010, IEEE Transactions on Network and Service Management.
[73] Franck Legendre,et al. Social Trust in Opportunistic Networks , 2010, 2010 INFOCOM IEEE Conference on Computer Communications Workshops.
[74] Jin-Hee Cho,et al. On the tradeoff between altruism and selfishness in MANET trust management , 2013, Ad Hoc Networks.
[75] Jean-Yves Le Boudec,et al. Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.