Managing Effective Collaboration in Cybersecurity Alliances Using Social Computational Trust
暂无分享,去创建一个
Ameneh Deljoo | Tom M. van Engers | Leon Gommans | Cees T. A. M. de Laat | Ralph Koning | T. Engers | L. Gommans | C. D. Laat | R. Koning | A. Deljoo
[1] Ana Paula Rocha,et al. The Impact of Benevolence in Computational Trust , 2013, AT.
[2] Jaideep Srivastava,et al. Predicting trusts among users of online communities: an epinions case study , 2008, EC '08.
[3] Daniel Tranel,et al. The human amygdala is necessary for developing and expressing normal interpersonal trust , 2011, Neuropsychologia.
[4] Timothy W. Finin,et al. Trust-Based Security in Pervasive Computing Environments , 2022 .
[5] Ameneh Deljoo,et al. Enabling E-science applications with dynamic optical networks: Secure autonomous response networks , 2017, 2017 Optical Fiber Communications Conference and Exhibition (OFC).
[6] Kai Hwang,et al. Collaborative Detection of DDoS Attacks over Multiple Network Domains , 2007, IEEE Transactions on Parallel and Distributed Systems.
[7] Ameneh Deljoo,et al. Towards Trustworthy Information Sharing by Creating Cyber Security Alliances , 2018, 2018 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/ 12th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE).
[8] Winfried Lamersdorf,et al. Jadex: Implementing a BDI-Infrastructure for JADE Agents , 2003 .
[9] J. Barney,et al. Trustworthiness as a Source of Competitive Advantage , 1994 .
[10] N. Noorderhaven,et al. When Does Trust Matter to Alliance Performance , 2006 .
[11] Daniel Z. Levin,et al. Trust and knowledge sharing: A critical combination , 2002 .
[12] Rino Falcone,et al. Trust Theory: A Socio-Cognitive and Computational Model , 2010 .
[13] P. Ring,et al. Structuring cooperative relationships between organizations , 1992 .
[14] Daniel Thalmann,et al. ETAF: An extended trust antecedents framework for trust prediction , 2014, 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2014).
[15] Cees T. A. M. de Laat,et al. Measuring the efficiency of SDN mitigations against attacks on computer infrastructures , 2019, Future Gener. Comput. Syst..
[16] Gregory D. Abowd,et al. Towards a Better Understanding of Context and Context-Awareness , 1999, HUC.
[17] J. H. Davis,et al. An Integrative Model Of Organizational Trust , 1995 .
[18] Ameneh Deljoo,et al. Social Computational Trust Model (SCTM): A Framework to Facilitate Selection of Partners , 2018, 2018 IEEE/ACM Innovating the Network for Data-Intensive Science (INDIS).
[19] Cees T. A. M. de Laat,et al. Approaches for Collaborative Security Defences in Multi Network Environments , 2019, 2019 6th IEEE International Conference on Cyber Security and Cloud Computing (CSCloud)/ 2019 5th IEEE International Conference on Edge Computing and Scalable Cloud (EdgeCom).
[20] Ameneh Deljoo,et al. The Impact of Competence and Benevolence in a Computational Model of Trust , 2018, IFIPTM.
[21] Stephen Marsh,et al. Formalising Trust as a Computational Concept , 1994 .