Zobrazeno 1 - 10
of 261
pro vyhledávání: '"Trust metric"'
Autor:
Ankita A. Mahamune, M.M. Chandane
Publikováno v:
Digital Communications and Networks, Vol 10, Iss 4, Pp 1079-1087 (2024)
The working of a Mobile Ad hoc NETwork (MANET) relies on the supportive cooperation among the network nodes. But due to its intrinsic features, a misbehaving node can easily lead to a routing disorder. This paper presents two trust-based routing sche
Externí odkaz:
https://doaj.org/article/f29be9b16e6e434193b2cac3834b5686
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
Automatika, Vol 61, Iss 4, Pp 694-703 (2020)
Group recommendation is a special service type which has the ability to satisfy a group’s common interest and find the preferred items for group users. Deep mining of trust relationship between group members can contribute to the improvement of acc
Externí odkaz:
https://doaj.org/article/d50fa64fd7214d148ab1c60ac38b109e
Publikováno v:
IEEE Internet of Things Journal. 9:22230-22245
Software-defined wireless sensor networks (SDWSNs) can be functionally affected by malicious sensor nodes that perform arbitrary actions, e.g., message dropping or flooding. The malicious nodes can degrade the availability of the network due to in-ba
Publikováno v:
IEEE Transactions on Emerging Topics in Computational Intelligence. 6:450-461
Human-robot interactive decision-making is increasingly becoming ubiquitous, and trust is an influential factor in determining the reliance on autonomy. However, it is not reasonable to trust systems that are beyond our comprehension, and typical mac
Autor:
Vitalii Zubok
Publikováno v:
Сучасні інформаційні технології у сфері безпеки та оборони. 39:61-66
The Internet operates and is constantly growing due to global routing system, the scalability of which is indisputable. But this system has certain information security flaws, due to which there are threats of deliberate distortion of packet transmis
Publikováno v:
IEEE Access, Vol 8, Pp 119961-119979 (2020)
Shala, B, Trick, U, Lehmann, A, Ghita, B & Shiaeles, S 2020, ' Blockchain and trust for secure, end-user-based and decentralized IoT service provision ', IEEE Access, vol. 8, 9127445, pp. 119961-119979 . https://doi.org/10.1109/ACCESS.2020.3005541
Shala, B, Trick, U, Lehmann, A, Ghita, B & Shiaeles, S 2020, ' Blockchain and trust for secure, end-user-based and decentralized IoT service provision ', IEEE Access, vol. 8, 9127445, pp. 119961-119979 . https://doi.org/10.1109/ACCESS.2020.3005541
Building trust relationships between different decentralized entities in the IoT ecosystem is essential. Hereof, the combination of blockchain technology and trust evaluation techniques is recently considered as an efficient measure. However, both te
As the world calls it, data is the new oil. With vast installments of Industrial Internet-of-Things (IIoT) infrastructure, data is produced at a rate like never before. Similarly, artificial intelligence (AI) and machine learning (ML) solutions are g
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::69261cd106b1a966c424c319038f2363
Autor:
Arman Pashamokhtari, Hassan Habibi Gharakheili, Yutaka Miyake, Norihiro Okui, Masataka Nakahara
Publikováno v:
LCN
Residential ISPs today have limited device-level visibility into subscriber houses, primarily due to network address translation (NAT) technology. The continuous growth of "unmanaged" consumer IoT devices combined with the rise of work-from-home make
Publikováno v:
Computers and Security
Computers and Security, Elsevier, 2019
Computers and Security, Elsevier, 2019
International audience; The importance of trust in social networks instigated many research efforts to understand it and predict it. However, the complex nature of trust and its counterpart; distrust; makes these tasks challenging. While early trust