RobustTrust – A Pro-Privacy Robust Distributed Trust Management Mechanism for Internet of Things
暂无分享,去创建一个
Mohsen Guizani | Ikram Ud Din | Ahmad Almogren | Sultan Ullah Jadoon | Ayman Altameem | Kamran Ahmad Awan | M. Guizani | Ahmad S. Almogren | A. Altameem | K. A. Awan | Ikram Ud Din | S. Jadoon
[1] Tang Yongchuan,et al. Improved evidential fuzzy c-means method , 2018 .
[2] Byung-Seo Kim,et al. The Internet of Things: A Review of Enabled Technologies and Future Challenges , 2019, IEEE Access.
[3] Nouredine Hadjsaid,et al. Smart (Electricity) Grids for Smart Cities: Assessing Roles and Societal Impacts , 2018, Proceedings of the IEEE.
[4] Gu Li-ze,et al. Trust management mechanism for Internet of Things , 2014, China Communications.
[5] Shancang Li,et al. 5G Internet of Things: A survey , 2018, J. Ind. Inf. Integr..
[6] Koushik Majumder,et al. SGSQoT: A Community-Based Trust Management Scheme in Internet of Things , 2018, Advances in Intelligent Systems and Computing.
[7] J. Cynthia,et al. Security Protocols for IoT , 2018, Studies in Big Data.
[8] Peng Li,et al. An Adaptive Dropout Deep Computation Model for Industrial IoT Big Data Learning With Crowdsourcing to Cloud Computing , 2019, IEEE Transactions on Industrial Informatics.
[9] Jun Xu,et al. Adaptive scaled unscented transformation for highly efficient structural reliability analysis by maximum entropy method , 2019, Structural Safety.
[10] Snehanshu Saha,et al. Machine Learning in Astronomy: A Case Study in Quasar-Star Classification , 2018, ArXiv.
[11] Ziyan Jia,et al. An Efficient Trust Evaluation Scheme for Node Behavior Detection in the Internet of Things , 2017, Wirel. Pers. Commun..
[12] Paul J. Werbos,et al. The New AI , 2019, Artificial Intelligence in the Age of Neural Networks and Brain Computing.
[13] Jia Guo,et al. Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.
[14] Shun Zhang,et al. A Subjective and Objective Integration Approach of Determining Weights for Trustworthy Measurement , 2018, IEEE Access.
[15] Izabella Lokshina,et al. A Qualitative Evaluation of IoT-driven eHealth: Knowledge Management, Business Models and Opportunities, Deployment and Evolution , 2018, HICSS.
[16] B. B. Gupta,et al. Security in Internet of Things: issues, challenges, taxonomy, and architecture , 2017, Telecommunication Systems.
[17] Jiabin Yuan,et al. Optimization Algorithms for Multiaccess Green Communications in Internet of Things , 2018, IEEE Internet of Things Journal.
[18] Yacine Challal,et al. A roadmap for security challenges in the Internet of Things , 2017, Digit. Commun. Networks.
[19] Luigi Atzori,et al. Trustworthiness Management in the Social Internet of Things , 2014, IEEE Transactions on Knowledge and Data Engineering.
[20] Oumaima Ben Abderrahim,et al. DTMS-IoT: A Dirichlet-based trust management system mitigating on-off attacks and dishonest recommendations for the Internet of Things , 2016, 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA).
[21] Xiao Wang,et al. A lightweight trust management based on Bayesian and Entropy for wireless sensor networks , 2015, Secur. Commun. Networks.
[22] Subconvexity for modular form L-functions in the t aspect , 2017, Advances in Mathematics.
[23] Oumaima Ben Abderrahim,et al. CTMS-SIOT: A context-based trust management system for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[24] Yasir Faheem,et al. An e-Health care services framework for the detection and classification of breast cancer in breast cytology images as an IoMT application , 2019, Future Gener. Comput. Syst..
[25] Xinyu Yang,et al. A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications , 2017, IEEE Internet of Things Journal.
[26] Fernando De la Prieta,et al. Conflict Resolution With Agents in Smart Cities , 2019, Smart Cities and Smart Spaces.
[27] D. Cox,et al. Applied Statistics: Principles and Examples , 1982 .
[28] Shalini Batra,et al. Trust management in social Internet of Things: A taxonomy, open issues, and challenges , 2020, Comput. Commun..
[29] Ammar Rayes,et al. Internet of Things Security and Privacy , 2017 .
[30] Mazliza Othman,et al. Internet of Things security: A survey , 2017, J. Netw. Comput. Appl..
[31] Xing Li,et al. Security Challenges and Concerns of Internet of Things (IoT) , 2019 .
[32] David J. Wagg,et al. An Efficient Likelihood-Free Bayesian Computation for Model Selection and Parameter Estimation Applied to Structural Dynamics , 2018, Structural Health Monitoring, Photogrammetry & DIC, Volume 6.
[33] Peng Zhang,et al. A Review on Trust Evaluation for Internet of Things , 2016, MobiMedia.
[34] Felix Wortmann,et al. Internet of Things , 2015, Business & Information Systems Engineering.
[35] Mohsen Guizani,et al. Machine learning in the Internet of Things: Designed techniques for smart cities , 2019, Future Gener. Comput. Syst..
[36] Blase Ur,et al. Rethinking Access Control and Authentication for the Home Internet of Things (IoT) , 2018, USENIX Security Symposium.
[37] Fenye Bao,et al. Dynamic trust management for internet of things applications , 2012, Self-IoT '12.
[38] Peter Tolmie,et al. From the Internet of Things to an Internet of Practices , 2017, ECSCW Exploratory Papers.
[39] Jian Shen,et al. Privacy-Preserving and Lightweight Key Agreement Protocol for V2G in the Social Internet of Things , 2018, IEEE Internet of Things Journal.
[40] Mohsen Guizani,et al. HoliTrust-A Holistic Cross-Domain Trust Management Mechanism for Service-Centric Internet of Things , 2019, IEEE Access.
[41] Lin Chen,et al. From Static to Dynamic Tag Population Estimation: An Extended Kalman Filter Perspective , 2016 .
[42] Cheuk Hang Au,et al. Integrating Knowledge Management into Information Security: From Audit to Practice , 2019, Int. J. Knowl. Manag..
[43] Ruchi Agarwal,et al. Improving Accuracy of Classification Based on C4.5 Decision Tree Algorithm Using Big Data Analytics , 2019 .
[44] Puneet Sharma,et al. End-to-End Message Authentication Using CoAP Over IoT , 2018, International Conference on Innovative Computing and Communications.
[45] Akanksha Jain,et al. A Survey on Miscellaneous Attacks and Countermeasures for RPL Routing Protocol in IoT , 2019 .
[46] Karthikeyan Periasamy,et al. A Comprehensive Study on Internet of Things Security , 2019, Advances in Computer and Electrical Engineering.
[47] Xinyu Yang,et al. A Survey on the Edge Computing for the Internet of Things , 2018, IEEE Access.
[48] Dongman Lee,et al. An adaptive IoT trust estimation scheme combining interaction history and stereotypical reputation , 2017, 2017 14th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[49] Jia Guo,et al. Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems , 2013, 2013 IEEE Eleventh International Symposium on Autonomous Decentralized Systems (ISADS).
[50] Mohsen Guizani,et al. Internet of Things: Part 3 , 2017, IEEE Commun. Mag..
[51] João H. Kleinschmidt,et al. Mitigating On-Off Attacks in the Internet of Things Using a Distributed Trust Management Scheme , 2015, Int. J. Distributed Sens. Networks.
[52] Ashok Kumar Das,et al. Government regulations in cyber security: Framework, standards and recommendations , 2019, Future Gener. Comput. Syst..
[53] Emmanuel S. Pilli,et al. A framework to manage Trust in Internet of Things , 2016, 2016 International Conference on Emerging Trends in Communication Technologies (ETCT).
[54] Partha Pratim Ray. A survey on Internet of Things architectures , 2018, J. King Saud Univ. Comput. Inf. Sci..
[55] Donald Degraen. Exploring Interaction Design for the Social Internet of Things , 2019, Social Internet of Things.
[56] Mingchu Li,et al. GroupTrust: Dependable Trust Management , 2017, IEEE Transactions on Parallel and Distributed Systems.
[57] V. B. Narasimha,et al. A Review on Application Security Management Using Web Application Security Standards , 2019 .
[58] Ali Dehghantanha,et al. Internet of Things security and forensics: Challenges and opportunities , 2018, Future Gener. Comput. Syst..
[59] Thierry De Pauw. On ∞-harmonic functions , 2010 .
[60] Chris Chatfield,et al. Statistics for Technology-A Course in Applied Statistics. , 1984 .
[61] Byung-Seo Kim,et al. Trust Management Techniques for the Internet of Things: A Survey , 2019, IEEE Access.
[62] Jun Tanimoto,et al. Three-strategy and four-strategy model of vaccination game introducing an intermediate protecting measure , 2019, Appl. Math. Comput..
[63] Oumaima Ben Abderrahim,et al. TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things , 2017, 2017 13th International Wireless Communications and Mobile Computing Conference (IWCMC).
[64] M. L. Valarmathi,et al. Trust management for reliable decision making among social objects in the Social Internet of Things , 2017, IET Networks.
[65] Heisnam Rohen Singh,et al. Recent Neuro-Fuzzy Approaches for Feature Selection and Classification , 2019 .
[66] Mohsen Ghasemi,et al. Threats of Social Engineering Attacks Against Security of Internet of Things (IoT) , 2018, Lecture Notes in Electrical Engineering.
[67] Suresha,et al. Survey of Security Mechanisms in Internet of Things , 2019 .