-
2
-
-
84867335221
-
From computing with numbers to computing with words-from manipulation of measurements to manipulation of perceptions
-
DOI: 10.1063/1.1388678. Available from: http://link.aip.org/link/?APC/ 573/36/1
-
Zadeh LA,. From computing with numbers to computing with words-from manipulation of measurements to manipulation of perceptions. American Institute of Physics 2001: 36-58. DOI: 10.1063/1.1388678. Available from: http://link.aip.org/link/?APC/573/36/1.
-
(2001)
American Institute of Physics
, pp. 36-58
-
-
Zadeh, L.A.1
-
4
-
-
0016459349
-
The concept of a linguistic variable and its application to approximate reasoning - I
-
Zadeh LA,. The concept of a linguistic variable and its application to approximate reasoning-I. Information Sciences 1975; 8: 199-249.
-
(1975)
Information Sciences
, vol.8
, pp. 199-249
-
-
Zadeh, L.A.1
-
5
-
-
0027266182
-
Functional equivalence between radial basis function networks and fuzzy inference systems
-
Jan;
-
Jang JSR, Sun CT,. Functional equivalence between radial basis function networks and fuzzy inference systems. IEEE Transactions on Neural Networks Jan 1993; 4 (1): 156-159.
-
(1993)
IEEE Transactions on Neural Networks
, vol.4
, Issue.1
, pp. 156-159
-
-
Jang, J.S.R.1
Sun, C.T.2
-
7
-
-
33645283722
-
-
Casillas J. Cordón O. Herrera Triguero F. Magdalena L. (eds). Springer: Heidelberg
-
Casillas J, Cordón O, Herrera Triguero F, Magdalena L, (eds). Studies in fuzziness and soft computing, Vol. 128. Springer: Heidelberg, 2003.
-
(2003)
Studies in Fuzziness and Soft Computing
, vol.128
-
-
-
9
-
-
0032713743
-
Semantic constraints for membership function optimization
-
de Oliveira JV,. Semantic constraints for membership function optimization. IEEE Transactions on Systems, Man, and Cybernetics, Part A 1999; 29 (1): 128-138.
-
(1999)
IEEE Transactions on Systems, Man, and Cybernetics, Part A
, vol.29
, Issue.1
, pp. 128-138
-
-
De Oliveira, J.V.1
-
10
-
-
77950627981
-
Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
-
Gómez Mármol F, Martínez Pérez G,. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards & Interfaces 2010; 32 (4): 185-196.
-
(2010)
Computer Standards & Interfaces
, vol.32
, Issue.4
, pp. 185-196
-
-
Gómez Mármol, F.1
Martínez Pérez, G.2
-
12
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A, Ismail R, Boyd C,. A survey of trust and reputation systems for online service provision. Decision Support Systems 2007; 43 (2): 618-644.
-
(2007)
Decision Support Systems
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
13
-
-
77957558299
-
Trust models in wireless sensor networks: A survey
-
In, Natarajan M. Selma B. Nabendu C. Dhinaharan N. (eds): Chennai, India
-
Momani M,. Trust models in wireless sensor networks: a survey. In Recent Trends in Network Security and Applications, Third International Conference, CNSA 2010, Communications in Computer and Information Science, vol. 89, Natarajan M, Selma B, Nabendu C, Dhinaharan N, (eds): Chennai, India, 2010; 37-46.
-
(2010)
Recent Trends in Network Security and Applications, Third International Conference, CNSA 2010, Communications in Computer and Information Science, Vol. 89
, pp. 37-46
-
-
Momani, M.1
-
14
-
-
19944368437
-
Shilling recommender systems for fun and profit
-
New York, NY, USA
-
Lam SK, Riedl J,. Shilling recommender systems for fun and profit, WWW '04: Proceedings of the 13th International Conference on World Wide Web, New York, NY, USA, 2004; 393-402.
-
(2004)
WWW '04: Proceedings of the 13th International Conference on World Wide Web
, pp. 393-402
-
-
Lam, S.K.1
Riedl, J.2
-
15
-
-
56749140937
-
Defense of trust management vulnerabilities in distributed networks
-
Feb;
-
Sun Y, Han Z, Liu K,. Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine Feb 2008; 46 (2): 112-119.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.2
, pp. 112-119
-
-
Sun, Y.1
Han, Z.2
Liu, K.3
-
16
-
-
70349567489
-
Security threats scenarios in trust and reputation models for distributed systems
-
Gómez Mármol F, Martínez Pérez G,. Security threats scenarios in trust and reputation models for distributed systems. Elsevier Computers & Security 2009; 28 (7): 545-556.
-
(2009)
Elsevier Computers & Security
, vol.28
, Issue.7
, pp. 545-556
-
-
Gómez Mármol, F.1
Martínez Pérez, G.2
-
17
-
-
84880467894
-
The EigenTrust algorithm for reputation management in P2P networks
-
Budapest, Hungary
-
Kamvar S, Schlosser M, Garcia-Molina H,. The EigenTrust algorithm for reputation management in P2P networks, Proceedings of the International World Wide Web Conference (WWW), Budapest, Hungary, 2003.
-
(2003)
Proceedings of the International World Wide Web Conference (WWW)
-
-
Kamvar, S.1
Schlosser, M.2
Garcia-Molina, H.3
-
18
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust in peer-to-peer communities
-
Xiong L, Liu L,. PeerTrust: supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 2004; 16 (7): 843-857.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
19
-
-
34047150751
-
PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing
-
Zhou R, Hwang K,. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. Transactions on Parallel and Distributed Systems 2007; 18 (4): 460-473.
-
(2007)
Transactions on Parallel and Distributed Systems
, vol.18
, Issue.4
, pp. 460-473
-
-
Zhou, R.1
Hwang, K.2
-
20
-
-
34548043694
-
Trust-based security for wireless ad hoc and sensor networks
-
Boukerche A, Xu L, El-Khatib K,. Trust-based security for wireless ad hoc and sensor networks. Computer Communications 2007; 30 (11-12): 2413-2427.
-
(2007)
Computer Communications
, vol.30
, Issue.1112
, pp. 2413-2427
-
-
Boukerche, A.1
Xu, L.2
El-Khatib, K.3
-
21
-
-
67749116290
-
An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks
-
Dhurandher SK, Misra S, Obaidat MS, Gupta N,. An ant colony optimization approach for reputation and quality-of-service-based security in wireless sensor networks. Security and Communication Networks 2009; 2 (2): 215-224.
-
(2009)
Security and Communication Networks
, vol.2
, Issue.2
, pp. 215-224
-
-
Dhurandher, S.K.1
Misra, S.2
Obaidat, M.S.3
Gupta, N.4
-
22
-
-
77950627515
-
A trust model using fuzzy logic in wireless sensor network
-
Kim TK, Seo HS,. A trust model using fuzzy logic in wireless sensor network. Proceedings of World Academy of Science, Engineering and Technology, vol. 32, 2008; 69-72.
-
(2008)
Proceedings of World Academy of Science, Engineering and Technology
, vol.32
, pp. 69-72
-
-
Kim, T.K.1
Seo, H.S.2
-
23
-
-
78049530839
-
RADAR: A reputation-driven anomaly detection system for wireless mesh networks
-
Zhang Z, Ho PH, Nat-Abdesselam F,. RADAR: A reputation-driven anomaly detection system for wireless mesh networks. Wireless Networks 2010; 16: 2221-2236.
-
(2010)
Wireless Networks
, vol.16
, pp. 2221-2236
-
-
Zhang, Z.1
Ho, P.H.2
Nat-Abdesselam, F.3
-
24
-
-
63049099708
-
Reliable and fully distributed trust model for mobile ad hoc networks
-
Omar M, Challal Y, Bouabdallah A,. Reliable and fully distributed trust model for mobile ad hoc networks. Computers and Security 2009; 28 (3-4): 199-214.
-
(2009)
Computers and Security
, vol.28
, Issue.34
, pp. 199-214
-
-
Omar, M.1
Challal, Y.2
Bouabdallah, A.3
-
26
-
-
34447127497
-
PTM: A pervasive trust management model for dynamic open environments
-
Boston, USA
-
Almenárez F, Marín A, Campo C, García C,. PTM: a pervasive trust management model for dynamic open environments. Privacy and Trust, First Workshop on Pervasive Security and Trust, Boston, USA, 2004.
-
(2004)
Privacy and Trust, First Workshop on Pervasive Security and Trust
-
-
Almenárez, F.1
Marín, A.2
Campo, C.3
García, C.4
-
27
-
-
0034834187
-
REGRET: Reputation in gregarious societies
-
In, Müller J.P. Andre E. Sen S. Frasson C. (eds). ACM Press: Montreal, Canada
-
Sabater J, Sierra C,. REGRET: reputation in gregarious societies. In Proceedings of the Fifth International Conference on Autonomous Agents, Müller JP, Andre E, Sen S, Frasson C, (eds). ACM Press: Montreal, Canada, 2001; 194-195.
-
(2001)
Proceedings of the Fifth International Conference on Autonomous Agents
, pp. 194-195
-
-
Sabater, J.1
Sierra, C.2
-
28
-
-
33750053547
-
MTrust: A reputation-based trust model for a mobile agent system
-
In. Springer: Wuhan, China
-
Songsiri S,. MTrust: a reputation-based trust model for a mobile agent system. In Autonomic and Trusted Computing, no.4158 in LNCS Third International Conference, ATC 2006. Springer: Wuhan, China, 2006; 374-385.
-
(2006)
Autonomic and Trusted Computing, no.4158 in LNCS Third International Conference, ATC 2006
, pp. 374-385
-
-
Songsiri, S.1
-
29
-
-
47749147333
-
Trust issues for vehicular ad hoc networks
-
Singapore
-
Breuer J, Held A, Leinmller T, Delgrossi L,. Trust issues for vehicular ad hoc networks. 67th IEEE Vehicular Technology Conference (VTC2008-Spring), Singapore, 2008.
-
(2008)
67th IEEE Vehicular Technology Conference (VTC2008-Spring)
-
-
Breuer, J.1
Held, A.2
Leinmller, T.3
Delgrossi, L.4
-
30
-
-
51349155690
-
On data-centric trust establishment in ephemeral ad hoc networks
-
Phoenix, AZ, USA
-
Raya M, Papadimitratos P, Gligor V, Hubaux JP,. On data-centric trust establishment in ephemeral ad hoc networks. Proceedings of IEEE INFOCOM, Phoenix, AZ, USA, 2008.
-
(2008)
Proceedings of IEEE INFOCOM
-
-
Raya, M.1
Papadimitratos, P.2
Gligor, V.3
Hubaux, J.P.4
-
32
-
-
78650065157
-
Security and privacy challenges in cloud computing environments
-
DOI: 10.1109/MSP.2010.186
-
Takabi H, Joshi JBD, Ahn GJ,. Security and privacy challenges in cloud computing environments. IEEE Security and Privacy 2010; 8: 24-31. DOI: 10.1109/MSP.2010.186.
-
(2010)
IEEE Security and Privacy
, vol.8
, pp. 24-31
-
-
Takabi, H.1
Joshi, J.B.D.2
Ahn, G.J.3
-
33
-
-
78650299224
-
A cloud-based trust model for evaluating quality of Web services
-
DOI: 10.1007/s11390-010-9394-1
-
Wang S, Zhang L, Wang S, Qiu X,. A cloud-based trust model for evaluating quality of Web services. Journal of Computer Science and Technology 2010; 25 (6): 1130-1142. DOI: 10.1007/s11390-010-9394-1.
-
(2010)
Journal of Computer Science and Technology
, vol.25
, Issue.6
, pp. 1130-1142
-
-
Wang, S.1
Zhang, L.2
Wang, S.3
Qiu, X.4
-
34
-
-
77950601673
-
Cloud security with virtualized defense and reputation-based trust mangement
-
Chengdu, China, DOI: 10.1109/DASC.2009.149
-
Hwang K, Kulkarni S, Hu Y,. Cloud security with virtualized defense and reputation-based trust mangement. Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, Chengdu, China, 2009; 717-722. DOI: 10.1109/DASC.2009.149.
-
(2009)
Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing
, pp. 717-722
-
-
Hwang, K.1
Kulkarni, S.2
Hu, Y.3
-
35
-
-
77958473007
-
TRIMS, a privacy-aware trust and reputation model for identity management systems
-
DOI: 10.1016/j.comnet.2010.07.020
-
Gómez Mármol F, Girao J, Martínez Pérez G,. TRIMS, a privacy-aware trust and reputation model for identity management systems. Elsevier Computer Networks Journal 2010; 54 (16): 2899-2912. DOI: 10.1016/j.comnet.2010.07.020.
-
(2010)
Elsevier Computer Networks Journal
, vol.54
, Issue.16
, pp. 2899-2912
-
-
Gómez Mármol, F.1
Girao, J.2
Martínez Pérez, G.3
-
36
-
-
67650083441
-
AttributeTrust - A framework for evaluating trust in aggregated attributes via a reputation system
-
In, DOI: 10.1109/PST.2008.28
-
Mohan A, Blough DM,. AttributeTrust-a framework for evaluating trust in aggregated attributes via a reputation system. In Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust, 2008; 201-212. DOI: 10.1109/PST.2008.28.
-
(2008)
Proceedings of the 2008 Sixth Annual Conference on Privacy, Security and Trust
, pp. 201-212
-
-
Mohan, A.1
Blough, D.M.2
-
37
-
-
74049147262
-
Using reputation to augment explicit authorization
-
In
-
Windley PJ, Daley D, Cutler B, Tew K,. Using reputation to augment explicit authorization. In Proceedings of the 2007 ACM workshop on Digital identity management, DIM '07, 2007; 72-81.
-
(2007)
Proceedings of the 2007 ACM Workshop on Digital Identity Management, DIM '07
, pp. 72-81
-
-
Windley, P.J.1
Daley, D.2
Cutler, B.3
Tew, K.4
-
38
-
-
84865592134
-
A trust management framework for service-oriented environments
-
DOI: 10.1145/1526709.1526829
-
Conner W, Iyengar A, Mikalsen T, Rouvellou I, Nahrstedt K,. A trust management framework for service-oriented environments. Proceedings of the 18th International Conference on World Wide Web, WWW '09, 2009; 891-900. DOI: 10.1145/1526709.1526829.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web, WWW '09
, pp. 891-900
-
-
Conner, W.1
Iyengar, A.2
Mikalsen, T.3
Rouvellou, I.4
Nahrstedt, K.5
-
39
-
-
70350543894
-
RATEWeb: Reputation Assessment for Trust Establishment among Web services
-
DOI: 10.1007/s00778-009-0138-1
-
Malik Z, Bouguettaya A,. RATEWeb: Reputation Assessment for Trust Establishment among Web services. The VLDB Journal 2009; 18 (4): 885-911. DOI: 10.1007/s00778-009-0138-1.
-
(2009)
The VLDB Journal
, vol.18
, Issue.4
, pp. 885-911
-
-
Malik, Z.1
Bouguettaya, A.2
-
40
-
-
38349058621
-
Automated dynamic maintenance of composite services based on service reputation
-
DOI: 10.1007/978-3-540-74974-5-42
-
Bianculli D, Jurca R, Binder W, Ghezzi C, Faltings B,. Automated dynamic maintenance of composite services based on service reputation. Proceedings of the 5th International Conference on Service-Oriented Computing, ICSOC '07, 2007; 449-455. DOI: 10.1007/978-3-540-74974-5-42.
-
(2007)
Proceedings of the 5th International Conference on Service-Oriented Computing, ICSOC '07
, pp. 449-455
-
-
Bianculli, D.1
Jurca, R.2
Binder, W.3
Ghezzi, C.4
Faltings, B.5
-
41
-
-
77957599265
-
Proposed security model and threat taxonomy for the Internet of Things (IoT)
-
In, Natarajan M. Selma B. Nabendu C. Dhinaharan N. (eds). Chennai, India
-
Sachin B, Parikshit M, Antonietta S, Neeli P, Ramjee P,. Proposed security model and threat taxonomy for the Internet of Things (IoT). In Recent Trends in Network Security and Applications, Third International Conference, CNSA 2010, Communications in Computer and Information Science vol. 89, Natarajan M, Selma B, Nabendu C, Dhinaharan N, (eds). Chennai, India, 2010; 420-429.
-
(2010)
Recent Trends in Network Security and Applications, Third International Conference, CNSA 2010, Communications in Computer and Information Science Vol. 89
, pp. 420-429
-
-
Sachin, B.1
Parikshit, M.2
Antonietta, S.3
Neeli, P.4
Ramjee, P.5
-
42
-
-
38649130186
-
Ant-based reputation evidence distribution in P2P networks
-
In. IEEE Computer Society: Changsha, Hunan, China
-
Wang W, Zeng G, Yuan L,. Ant-based reputation evidence distribution in P2P networks. In GCC, Fifth International Conference on Grid and Cooperative Computing. IEEE Computer Society: Changsha, Hunan, China, 2006; 129-132.
-
(2006)
GCC, Fifth International Conference on Grid and Cooperative Computing
, pp. 129-132
-
-
Wang, W.1
Zeng, G.2
Yuan, L.3
-
45
-
-
17644410562
-
A review on the ant colony optimization metaheuristic: Basis, models and new trends
-
Cordón O, Herrera F, Stützle T,. A review on the ant colony optimization metaheuristic: basis, models and new trends. Mathware and Soft Computing 2002; 9 (2-3): 141-175.
-
(2002)
Mathware and Soft Computing
, vol.9
, Issue.23
, pp. 141-175
-
-
Cordón, O.1
Herrera, F.2
Stützle, T.3
-
46
-
-
79551566748
-
Providing trust in wireless sensor networks using a bio-inspired technique
-
Gómez Mármol F, Martínez Pérez G,. Providing trust in wireless sensor networks using a bio-inspired technique. Telecommunication Systems Journal 2011; 46 (2): 163-180.
-
(2011)
Telecommunication Systems Journal
, vol.46
, Issue.2
, pp. 163-180
-
-
Gómez Mármol, F.1
Martínez Pérez, G.2
-
47
-
-
33750036968
-
PATROL-F- A comprehensive reputation-based trust model with fuzzy subsystems
-
In. Springer: Wuhan, China
-
Tajeddine A, Kayssi A, Chehab A, Artail H,. PATROL-F- a comprehensive reputation-based trust model with fuzzy subsystems. In Autonomic and Trusted Computing, no.4158 in LNCS Third International Conference, ATC 2006. Springer: Wuhan, China, 2006; 205-217.
-
(2006)
Autonomic and Trusted Computing, no.4158 in LNCS Third International Conference, ATC 2006
, pp. 205-217
-
-
Tajeddine, A.1
Kayssi, A.2
Chehab, A.3
Artail, H.4
-
49
-
-
78249273664
-
Linguistic fuzzy logic enhancement of a trust mechanism for distributed networks
-
Bradford, UK, DOI: 10.1109/CIT.2010.158
-
Gómez Mármol F, Gómez Marín-Blázquez J, Martínez Pérez G,. Linguistic fuzzy logic enhancement of a trust mechanism for distributed networks. Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10), Bradford, UK, 2010; 838-845. DOI: 10.1109/CIT.2010.158.
-
(2010)
Proceedings of the Third IEEE International Symposium on Trust, Security and Privacy for Emerging Applications (TSP-10)
, pp. 838-845
-
-
Gómez Mármol, F.1
Gómez Marín-Blázquez, J.2
Martínez Pérez, G.3
-
50
-
-
29244436370
-
Taxonomy of trust: Categorizing P2P reputation systems
-
Mar;
-
Marti S, Garcia-Molina H,. Taxonomy of trust: categorizing P2P reputation systems. Computer Networks Mar 2006; 50 (4): 472-484.
-
(2006)
Computer Networks
, vol.50
, Issue.4
, pp. 472-484
-
-
Marti, S.1
Garcia-Molina, H.2
-
52
-
-
0003753097
-
-
Prentice Hall: Upper Saddle River, New Jersey, USA
-
Jang JSR, Sun CT, Mizutani E,. Neuro-Fuzzy and Soft Computing. Prentice Hall: Upper Saddle River, New Jersey, USA, 1997.
-
(1997)
Neuro-Fuzzy and Soft Computing
-
-
Jang, J.S.R.1
Sun, C.T.2
Mizutani, E.3
-
53
-
-
70449469742
-
TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks
-
Dresden, Germany, DOI: 10.1109/ICC.2009.5199545
-
Gómez Mármol F, Martínez Pérez G,. TRMSim-WSN, Trust and Reputation Models Simulator for Wireless Sensor Networks. Proceedings of the IEEE International Conference on Communications (IEEE ICC 2009), Communication and Information Systems Security Symposium, Dresden, Germany, 2009. DOI: 10.1109/ICC.2009.5199545.
-
(2009)
Proceedings of the IEEE International Conference on Communications (IEEE ICC 2009), Communication and Information Systems Security Symposium
-
-
Gómez Mármol, F.1
Martínez Pérez, G.2
|