-
1
-
-
77954811054
-
-
et al., Measuring behavioral trust in social networks, IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC, Canada,
-
[1] S. Adali et al., Measuring behavioral trust in social networks, IEEE International Conference on Intelligence and Security Informatics, Vancouver, BC, Canada, 2010.
-
(2010)
-
-
Adali, S.1
-
2
-
-
84866034380
-
The social internet of things (SIoT) - when social networks meet the internet of things: concept, architecture and network characterization
-
[2] Atzori, L., Iera, A., Morabito, G., Nitti, M., The social internet of things (SIoT) - when social networks meet the internet of things: concept, architecture and network characterization. Comput. Netw. 56:16 (2012), 3594–3608.
-
(2012)
Comput. Netw.
, vol.56
, Issue.16
, pp. 3594-3608
-
-
Atzori, L.1
Iera, A.2
Morabito, G.3
Nitti, M.4
-
4
-
-
85016075154
-
adaptive and survivable trust management for community of interest based internet of things systems
-
[4] Bao, F., Chen, I.R., Guo, J., Scalable, adaptive and survivable trust management for community of interest based internet of things systems. 11th International Symposium on Autonomous Decentralized System, Mexico City, Mexico, 2013.
-
(2013)
11th International Symposium on Autonomous Decentralized System, Mexico City, Mexico
-
-
Bao, F.1
Chen, I.R.2
Guo, J.3
Scalable4
-
5
-
-
84862138560
-
Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection
-
[5] Bao, F., Chen, I.R., Chang, M., Cho, J.H., Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection. IEEE Trans. Netw. Serv. Manage. 9:2 (2012), 161–183.
-
(2012)
IEEE Trans. Netw. Serv. Manage.
, vol.9
, Issue.2
, pp. 161-183
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
6
-
-
84915801700
-
The internet of things vision: key features, applications and open issues
-
[6] Borgia, E., The internet of things vision: key features, applications and open issues. Comput. Commun. 54 (2014), 1–31.
-
(2014)
Comput. Commun.
, vol.54
, pp. 1-31
-
-
Borgia, E.1
-
7
-
-
84866346403
-
TRM-IoT: a trust management model based on fuzzy reputation for internet of things
-
[7] Chen, D., Chang, G., Sun, D., Li, J., Jia, J., Wang, X., TRM-IoT: a trust management model based on fuzzy reputation for internet of things. Comput. Sci. Inf. Syst. 8:4 (2011), 1207–1228.
-
(2011)
Comput. Sci. Inf. Syst.
, vol.8
, Issue.4
, pp. 1207-1228
-
-
Chen, D.1
Chang, G.2
Sun, D.3
Li, J.4
Jia, J.5
Wang, X.6
-
8
-
-
85027017308
-
Trust-based service management for social internet of things systems
-
in press
-
[8] Chen, I.R., Bao, F., Guo, J., Trust-based service management for social internet of things systems. IEEE Trans. Dependable Secure Comput., 2016, 10.1109/TDSC.2015.2420552, in press.
-
(2016)
IEEE Trans. Dependable Secure Comput.
-
-
Chen, I.R.1
Bao, F.2
Guo, J.3
-
9
-
-
80052171869
-
Trust-based intrusion detection in wireless sensor networks
-
[9] Chen, I.R., Bao, F., Chang, M., Cho, J.H., Trust-based intrusion detection in wireless sensor networks. IEEE International Conference on Communications, Kyoto, Japan, 2011, 1–6.
-
(2011)
IEEE International Conference on Communications, Kyoto, Japan
, pp. 1-6
-
-
Chen, I.R.1
Bao, F.2
Chang, M.3
Cho, J.H.4
-
10
-
-
84896101663
-
Dynamic trust management for delay tolerant networks and its application to secure routing
-
[10] Chen, I.R., et al. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 25:5 (2014), 1200–1210.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.5
, pp. 1200-1210
-
-
Chen, I.R.1
-
11
-
-
84941876279
-
Hierarchical trust management of community of interest groups in mobile Ad Hoc networks
-
[11] Chen, I.R., Guo, J., Hierarchical trust management of community of interest groups in mobile Ad Hoc networks. Ad Hoc Netw. 33 (2015), 154–167.
-
(2015)
Ad Hoc Netw.
, vol.33
, pp. 154-167
-
-
Chen, I.R.1
Guo, J.2
-
12
-
-
84976550217
-
Trust management for SOA-based IoT and its application to service composition
-
[12] Chen, I.R., Guo, J., Bao, F., Trust management for SOA-based IoT and its application to service composition. IEEE Trans. Serv. Comput. 9:3 (2016), 482–495.
-
(2016)
IEEE Trans. Serv. Comput.
, vol.9
, Issue.3
, pp. 482-495
-
-
Chen, I.R.1
Guo, J.2
Bao, F.3
-
13
-
-
84903831603
-
Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection
-
[13] Chen, I.R., Guo, J., Dynamic hierarchical trust management of mobile groups and its application to misbehaving node detection. 28th IEEE International Conference on. Advanced Information Networking and Applications, Victoria, Canada, 2014, 1–6.
-
(2014)
28th IEEE International Conference on. Advanced Information Networking and Applications, Victoria, Canada
, pp. 1-6
-
-
Chen, I.R.1
Guo, J.2
-
14
-
-
79551636196
-
Trust management for encounter-based routing in delay tolerant networks
-
[14] Chen, I.R., Bao, F., Chang, M., Cho, J.H., Trust management for encounter-based routing in delay tolerant networks. Global Telecommunications Conference, Miami, USA, 2010, 1–6.
-
(2010)
Global Telecommunications Conference, Miami, USA
, pp. 1-6
-
-
Chen, I.R.1
Bao, F.2
Chang, M.3
Cho, J.H.4
-
15
-
-
0032309753
-
Performance evaluation of forwarding strategies for location management in mobile networks
-
[15] Chen, I.R., Chen, T.M., Lee, C., Performance evaluation of forwarding strategies for location management in mobile networks. Comput. J. 41:4 (1998), 243–253.
-
(1998)
Comput. J.
, vol.41
, Issue.4
, pp. 243-253
-
-
Chen, I.R.1
Chen, T.M.2
Lee, C.3
-
16
-
-
84941344581
-
Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks
-
[16] Chen, I.R., Verma, N., Simulation study of a class of autonomous host-centric mobility prediction algorithms for wireless cellular and ad hoc networks. 36th Annual Symposium on Simulation, 2003, 65–72.
-
(2003)
36th Annual Symposium on Simulation
, pp. 65-72
-
-
Chen, I.R.1
Verma, N.2
-
17
-
-
84957432672
-
A scheme of access service recommendation for the social internet of things
-
[17] Chen, Z., Ling, R., Huang, C.M., Zhu, X., A scheme of access service recommendation for the social internet of things. Int. J. Commun. Syst. 29:4 (2016), 694–706.
-
(2016)
Int. J. Commun. Syst.
, vol.29
, Issue.4
, pp. 694-706
-
-
Chen, Z.1
Ling, R.2
Huang, C.M.3
Zhu, X.4
-
18
-
-
77949264858
-
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile Ad Hoc networks
-
[18] Cho, J.H., Chen, I.R., Feng, P., Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile Ad Hoc networks. IEEE Trans. Reliab. 59 (2010), 231–241.
-
(2010)
IEEE Trans. Reliab.
, vol.59
, pp. 231-241
-
-
Cho, J.H.1
Chen, I.R.2
Feng, P.3
-
19
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile Ad Hoc networks
-
[19] Cho, J.H., Swami, A., Chen, I.R., Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile Ad Hoc networks. International Conference on Computational Science and Engineering, 2, 2009, 641–650.
-
(2009)
International Conference on Computational Science and Engineering
, vol.2
, pp. 641-650
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
20
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
[20] Cho, J.H., Swami, A., Chen, I.R., A survey on trust management for mobile ad hoc networks. IEEE Commun. Surv. Tutorials 13:4 (2011), 562–583.
-
(2011)
IEEE Commun. Surv. Tutorials
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
21
-
-
84856655935
-
Adaptable service composition for very-large-scale internet of things systems
-
Lisbon, Portugal
-
[21] Dar, K., Taherkordi, A., Rouvoy, R., Eliassen, F., Adaptable service composition for very-large-scale internet of things systems. ACM Middleware, 2011, Lisbon, Portugal.
-
(2011)
ACM Middleware
-
-
Dar, K.1
Taherkordi, A.2
Rouvoy, R.3
Eliassen, F.4
-
22
-
-
0001655091
-
A generalization of Bayesian inference
-
Series B
-
[22] Dempster, A.P., A generalization of Bayesian inference. J. R. Stat. Soc. 30 (1968), 205–247 Series B.
-
(1968)
J. R. Stat. Soc.
, vol.30
, pp. 205-247
-
-
Dempster, A.P.1
-
23
-
-
84856138361
-
Predicting trust and distrust in social networks
-
[23] Dubois, T., Golbeck, J., Srinivasan, A., Predicting trust and distrust in social networks. IEEE 3rd International Conference on Social Computing, Boston, MA, USA, 2011, 418–424.
-
(2011)
IEEE 3rd International Conference on Social Computing, Boston, MA, USA
, pp. 418-424
-
-
Dubois, T.1
Golbeck, J.2
Srinivasan, A.3
-
24
-
-
0000963519
-
Centrality on social networks
-
[24] Freeman, L.C., Centrality on social networks. Social Netw. 1 (1979), 215–239.
-
(1979)
Social Netw.
, vol.1
, pp. 215-239
-
-
Freeman, L.C.1
-
25
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
[25] Ganeriwal, S., Balzano, L.K., Srivastava, M.B., Reputation-based framework for high integrity sensor networks. ACM Trans. Sens. Netw. 4:3 (2008), 1–37.
-
(2008)
ACM Trans. Sens. Netw.
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
26
-
-
84938672829
-
Security for the internet of things: a survey of existing protocols and open research issues
-
[26] Granjal, J., Monteiro, E., Silva, J., Security for the internet of things: a survey of existing protocols and open research issues. IEEE Commun. Surv. Tutorials 17:3 (2015), 1294–1312.
-
(2015)
IEEE Commun. Surv. Tutorials
, vol.17
, Issue.3
, pp. 1294-1312
-
-
Granjal, J.1
Monteiro, E.2
Silva, J.3
-
27
-
-
20844443098
-
Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems
-
[27] Gu, B., Chen, I.R., Performance analysis of location-aware mobile service proxies for reducing network cost in personal communication systems. Mobile Netw. Appl. 10:4 (2005), 453–463.
-
(2005)
Mobile Netw. Appl.
, vol.10
, Issue.4
, pp. 453-463
-
-
Gu, B.1
Chen, I.R.2
-
28
-
-
84902106352
-
Trust management mechanism for internet of things
-
[28] Gu, L., Wang, J., Sun, B.B., Trust management mechanism for internet of things. China Commun. 11:2 (2014), 148–156.
-
(2014)
China Commun.
, vol.11
, Issue.2
, pp. 148-156
-
-
Gu, L.1
Wang, J.2
Sun, B.B.3
-
29
-
-
79951870161
-
Trustworthy service selection and composition
-
article 5
-
[29] Hang, C.W., Singh, M.P., Trustworthy service selection and composition. ACM Trans. Auton. Adapt. Syst., 6(1), 2011 article 5.
-
(2011)
ACM Trans. Auton. Adapt. Syst.
, vol.6
, Issue.1
-
-
Hang, C.W.1
Singh, M.P.2
-
30
-
-
71649094416
-
A survey of attack and defense techniques for reputation systems
-
2009
-
[30] Hoffman, K., Zage, D., Nita-Rotaru, C., A survey of attack and defense techniques for reputation systems. 2009 ACM Comput. Surv. 42:1 (2009), 1–31.
-
(2009)
ACM Comput. Surv.
, vol.42
, Issue.1
, pp. 1-31
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
32
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
[32] Jøsang, A., Ismail, R., Boyd, C., A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43:2 (2007), 618–644.
-
(2007)
Decis. Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
34
-
-
84872848897
-
Internet of things: where to be is to trust
-
[34] Lacuesta, R., Palacios-Navarro, G., Cetina, C., Penalver, L., Lloret, J., Internet of things: where to be is to trust. EURASIP J. Wireless Commun. Networking, 1, 2012, 203.
-
(2012)
EURASIP J. Wireless Commun. Networking
, vol.1
, pp. 203
-
-
Lacuesta, R.1
Palacios-Navarro, G.2
Cetina, C.3
Penalver, L.4
Lloret, J.5
-
35
-
-
77952978241
-
Uncertainty modeling and reduction in MANETs
-
[35] Li, F., Wu, J., Uncertainty modeling and reduction in MANETs. IEEE Trans. Mobile Comput. 9:7 (2010), 1035–1048.
-
(2010)
IEEE Trans. Mobile Comput.
, vol.9
, Issue.7
, pp. 1035-1048
-
-
Li, F.1
Wu, J.2
-
36
-
-
77951006943
-
Trust-based access control for privacy protection in collaborative environment
-
[36] Li, M., Wang, H., Ross, D., Trust-based access control for privacy protection in collaborative environment. IEEE International Conference on E-Business Engineering, 2009, 425–430.
-
(2009)
IEEE International Conference on E-Business Engineering
, pp. 425-430
-
-
Li, M.1
Wang, H.2
Ross, D.3
-
37
-
-
77955193917
-
Coping with node misbehaviors in Ad Hoc networks: a multi-dimensional trust management approach
-
[37] Li, W., Joshi, A., Coping with node misbehaviors in Ad Hoc networks: a multi-dimensional trust management approach. Eleventh International Conference on Mobile Data Management, Kansas City, USA, 2010, 85–94.
-
(2010)
Eleventh International Conference on Mobile Data Management, Kansas City, USA
, pp. 85-94
-
-
Li, W.1
Joshi, A.2
-
38
-
-
78751620590
-
Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks
-
[38] Li, Y., Chen, I.R., Design and performance analysis of mobility management schemes based on pointer forwarding for wireless mesh networks. IEEE Trans. Mobile Comput. 10:3 (2011), 349–361.
-
(2011)
IEEE Trans. Mobile Comput.
, vol.10
, Issue.3
, pp. 349-361
-
-
Li, Y.1
Chen, I.R.2
-
39
-
-
84864999154
-
Cloud-based service composition architecture for internet of things
-
[39] Liu, L., Liu, X., Li, X., Cloud-based service composition architecture for internet of things. International Workshop on Internet of Things, Changsha, China, 2012, 559–564.
-
(2012)
International Workshop on Internet of Things, Changsha, China
, pp. 559-564
-
-
Liu, L.1
Liu, X.2
Li, X.3
-
40
-
-
84887005524
-
A WSN-oriented key agreement protocol in internet of things
-
[40] Liu, T., Guan, Y., Yan, Y., Liu, L., Deng, Q., A WSN-oriented key agreement protocol in internet of things. Appl. Mech. Mater. 401-403 (2013), 1792–1795.
-
(2013)
Appl. Mech. Mater.
, vol.401-403
, pp. 1792-1795
-
-
Liu, T.1
Guan, Y.2
Yan, Y.3
Liu, L.4
Deng, Q.5
-
41
-
-
84865649356
-
An integrated scheme based on service classification in pervasive mobile services
-
[41] Liu, Y., Chen, Z., Xia, F., Lv, X., Bu, F., An integrated scheme based on service classification in pervasive mobile services. Int. J. Commun. Syst. 25:9 (2012), 1178–1188.
-
(2012)
Int. J. Commun. Syst.
, vol.25
, Issue.9
, pp. 1178-1188
-
-
Liu, Y.1
Chen, Z.2
Xia, F.3
Lv, X.4
Bu, F.5
-
42
-
-
79953074982
-
A trust model based on service classification in mobile services
-
[42] Liu, Y., Chen, Z., Xia, F., Lv, X., Bu, F., A trust model based on service classification in mobile services. IEEE/ACM International Conference on Cyber Physical and Social Computing, 2010, 572–577.
-
(2010)
IEEE/ACM International Conference on Cyber Physical and Social Computing
, pp. 572-577
-
-
Liu, Y.1
Chen, Z.2
Xia, F.3
Lv, X.4
Bu, F.5
-
43
-
-
84887630808
-
A fuzzy approach to trust based access control in internet of things
-
[43] Mahalle, P.N., Thakre, P.A., Prasad, N.R., Prasad, R., A fuzzy approach to trust based access control in internet of things. 3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE, NJ, Atlantic City, 2013, 1–5.
-
(2013)
3rd International Conference on Wireless Communications, Vehicular Technology, Information Theory and Aerospace & Electronic Systems, VITAE, NJ, Atlantic City
, pp. 1-5
-
-
Mahalle, P.N.1
Thakre, P.A.2
Prasad, N.R.3
Prasad, R.4
-
44
-
-
70350543894
-
RATEWeb: reputation assessment for trust establishment amongWeb services
-
[44] Malik, Zaki, Bouguettaya, Athman, RATEWeb: reputation assessment for trust establishment amongWeb services. VLDB J. 18 (2009), 885–911.
-
(2009)
VLDB J.
, vol.18
, pp. 885-911
-
-
Malik, Z.1
Bouguettaya, A.2
-
46
-
-
84879230262
-
Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet
-
[46] Martinez-Julia, P., Skarmeta, A.F., Beyond the separation of identifier and locator: building an identity-based overlay network architecture for the future internet. Comput. Netw. 57:10 (2013), 2280–2300.
-
(2013)
Comput. Netw.
, vol.57
, Issue.10
, pp. 2280-2300
-
-
Martinez-Julia, P.1
Skarmeta, A.F.2
-
47
-
-
84948658189
-
Mitigating on-off attacks in the internet of things using a distributed trust management scheme
-
article 859731
-
[47] Mendoza, C.V.L., Mendoza, J.H., Mitigating on-off attacks in the internet of things using a distributed trust management scheme. Int. J. Distrib. Sens. Netw., 11(11), 2015 article 859731.
-
(2015)
Int. J. Distrib. Sens. Netw.
, vol.11
, Issue.11
-
-
Mendoza, C.V.L.1
Mendoza, J.H.2
-
48
-
-
84924597741
-
Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems
-
[48] Mitchell, R., Chen, I.R., Modeling and analysis of attacks and counter defense mechanisms for cyber physical systems. IEEE Trans. Reliab. 65:1 (2016), 350–358.
-
(2016)
IEEE Trans. Reliab.
, vol.65
, Issue.1
, pp. 350-358
-
-
Mitchell, R.1
Chen, I.R.2
-
49
-
-
84874959990
-
Effect of intrusion detection and response on reliability of cyber physical systems
-
[49] Mitchell, R., Chen, I.R., Effect of intrusion detection and response on reliability of cyber physical systems. IEEE Trans. Reliab. 62:1 (2013), 199–210.
-
(2013)
IEEE Trans. Reliab.
, vol.62
, Issue.1
, pp. 199-210
-
-
Mitchell, R.1
Chen, I.R.2
-
50
-
-
84963677348
-
Autonomic trust management in cloud-based and highly dynamic IoT applications
-
Barcelona Spain
-
[50] Namal, S., Granjal, J., Monteiro, E., Silva, J., Autonomic trust management in cloud-based and highly dynamic IoT applications. ITU Kaleidoscope: Trust in the Information Society (K-2015), 2015, Barcelona, Spain.
-
(2015)
ITU Kaleidoscope: Trust in the Information Society (K-2015)
-
-
Namal, S.1
Granjal, J.2
Monteiro, E.3
Silva, J.4
-
51
-
-
84901027315
-
Trustworthiness management in the social internet of things
-
[51] Nitti, M., Girau, R., Atzori, L., Trustworthiness management in the social internet of things. IEEE Trans. Knowl. Data Manage. 26:5 (2014), 1253–1266.
-
(2014)
IEEE Trans. Knowl. Data Manage.
, vol.26
, Issue.5
, pp. 1253-1266
-
-
Nitti, M.1
Girau, R.2
Atzori, L.3
-
52
-
-
84874278922
-
MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture
-
[52] Rahimi1, M.R., Venkatasubramanian1, N., Mehrotra1, S., Vasilakos, A.V., MAPCloud: mobile applications on an elastic and scalable 2-tier cloud architecture. IEEE/ACM Fifth International Conference on Utility and Cloud Computing, 2012, 83–90.
-
(2012)
IEEE/ACM Fifth International Conference on Utility and Cloud Computing
, pp. 83-90
-
-
Rahimi, M.R.1
Venkatasubramanian, N.2
Mehrotra, S.3
Vasilakos, A.V.4
-
53
-
-
51349155690
-
On data-centric trust establishment in ephemeral Ad Hoc networks
-
[53] Raya, M., Papadimitratos, P., Gligory, V.D., Hubaux, J.P., On data-centric trust establishment in ephemeral Ad Hoc networks. IEEE 27th Conference on Computer Communications, 2008.
-
(2008)
IEEE 27th Conference on Computer Communications
-
-
Raya, M.1
Papadimitratos, P.2
Gligory, V.D.3
Hubaux, J.P.4
-
55
-
-
84947556769
-
CertainLogic: a logic for modeling trust and uncertainty
-
Pittsburgh, PA, USA
-
[55] Ries, S., Habib, S.M., Mühlhäuser, M., Varadharajan, V., CertainLogic: a logic for modeling trust and uncertainty. TRUST 2011, 2011, Pittsburgh, PA, USA, 254–261.
-
(2011)
TRUST 2011
, pp. 254-261
-
-
Ries, S.1
Habib, S.M.2
Mühlhäuser, M.3
Varadharajan, V.4
-
56
-
-
0002353862
-
REGRET: a reputation model for gregarious societies
-
Montreal, Canada
-
[56] Sabater, J., Sierra, C., REGRET: a reputation model for gregarious societies. 4th International Workshop on Deception, Fraud and Trust in Agent Societies, 2001, Montreal, Canada, 61–70.
-
(2001)
4th International Workshop on Deception, Fraud and Trust in Agent Societies
, pp. 61-70
-
-
Sabater, J.1
Sierra, C.2
-
57
-
-
84888861197
-
Trust management system design for the internet of things: a context-aware and multi-service approach
-
[57] Saied, Y.B., Olivereau, A., Zeghlache, D., Laurent, M., Trust management system design for the internet of things: a context-aware and multi-service approach. Comput. Secur. 39 (2013), 351–365.
-
(2013)
Comput. Secur.
, vol.39
, pp. 351-365
-
-
Saied, Y.B.1
Olivereau, A.2
Zeghlache, D.3
Laurent, M.4
-
58
-
-
84885211259
-
A survey of trust in social networks
-
Article 47
-
[58] Sherchan, W., Nepal, S., Paris, C., A survey of trust in social networks. ACM Comput. Surv., 45(4), 2013 Article 47.
-
(2013)
ACM Comput. Surv.
, vol.45
, Issue.4
-
-
Sherchan, W.1
Nepal, S.2
Paris, C.3
-
59
-
-
84919372488
-
Security, privacy and trust in internet of things: the road ahead
-
[59] Sicaria, S., Rizzardia, A., Griecob, L.A., Coen-Porisini, A., Security, privacy and trust in internet of things: the road ahead. Comput. Netw. 76 (2015), 146–164.
-
(2015)
Comput. Netw.
, vol.76
, pp. 146-164
-
-
Sicaria, S.1
Rizzardia, A.2
Griecob, L.A.3
Coen-Porisini, A.4
-
60
-
-
84928777284
-
Dynamic and flexible selection of a reputation mechanism for heterogeneous environments
-
[60] Tormo, G.D., Marmol, F.G., Perez, G.M., Dynamic and flexible selection of a reputation mechanism for heterogeneous environments. Future Gener. Comput. Syst. 49 (2015), 113–124.
-
(2015)
Future Gener. Comput. Syst.
, vol.49
, pp. 113-124
-
-
Tormo, G.D.1
Marmol, F.G.2
Perez, G.M.3
-
61
-
-
77956353388
-
Trust management in mobile Ad Hoc networks using a scalable maturity-based model
-
[61] Velloso, P.B., et al. Trust management in mobile Ad Hoc networks using a scalable maturity-based model. IEEE Trans. Netw. Serv. Manage. 7:3 (2010), 172–185.
-
(2010)
IEEE Trans. Netw. Serv. Manage.
, vol.7
, Issue.3
, pp. 172-185
-
-
Velloso, P.B.1
-
62
-
-
84893434026
-
Integrating context-awareness and trustworthiness in IoT descriptions
-
Peking, China
-
[62] Wan, K., Alagar, V., Integrating context-awareness and trustworthiness in IoT descriptions. IEEE International Conference on Internet of Things, 2013, Peking, China, 1168–1174.
-
(2013)
IEEE International Conference on Internet of Things
, pp. 1168-1174
-
-
Wan, K.1
Alagar, V.2
-
63
-
-
84883144500
-
Distributed trust management mechanism for the internet of things
-
[63] Wang, J., Bin, S., Yu, Y., Niu, X., Distributed trust management mechanism for the internet of things. Appl. Mech. Mater. 347-350 (2013), 2463–2467.
-
(2013)
Appl. Mech. Mater.
, vol.347-350
, pp. 2463-2467
-
-
Wang, J.1
Bin, S.2
Yu, Y.3
Niu, X.4
-
64
-
-
84953299098
-
LogitTrust: a logit regression-based trust model for mobile Ad Hoc networks
-
Boston, MA
-
[64] Wang, Y., Lu, Y.C., Chen, I.R., Cho, J.H., Swami, A., LogitTrust: a logit regression-based trust model for mobile Ad Hoc networks. 6th ASE International Conference on Privacy, Security, Risk and Trust, 2014, Boston, MA.
-
(2014)
6th ASE International Conference on Privacy, Security, Risk and Trust
-
-
Wang, Y.1
Lu, Y.C.2
Chen, I.R.3
Cho, J.H.4
Swami, A.5
-
65
-
-
85023642615
-
Trust-based service composition and binding with multiple objective optimization in service-oriented mobile Ad Hoc networks
-
in press
-
[65] Wang, Y., Chen, I.R., Cho, J.H., Swami, A., Chan, K., Trust-based service composition and binding with multiple objective optimization in service-oriented mobile Ad Hoc networks. IEEE Trans. Serv. Comput., 2016, 10.1109/TSC.2015.2491285, in press.
-
(2016)
IEEE Trans. Serv. Comput.
-
-
Wang, Y.1
Chen, I.R.2
Cho, J.H.3
Swami, A.4
Chan, K.5
-
66
-
-
84901427258
-
A survey on trust management for internet of things
-
[66] Yan, Z., Zhang, P., Vasilakos, A.V., A survey on trust management for internet of things. J. Netw. Comput. Appl. 42 (2014), 120–134.
-
(2014)
J. Netw. Comput. Appl.
, vol.42
, pp. 120-134
-
-
Yan, Z.1
Zhang, P.2
Vasilakos, A.V.3
-
68
-
-
77956948315
-
A survey of trust and reputation management systems in wireless communications
-
[68] Yu, H., Shen, Z., Miao, C., Leung, C., Niyato, D., A survey of trust and reputation management systems in wireless communications. Proc. IEEE 98:10 (2010), 1755–1772.
-
(2010)
Proc. IEEE
, vol.98
, Issue.10
, pp. 1755-1772
-
-
Yu, H.1
Shen, Z.2
Miao, C.3
Leung, C.4
Niyato, D.5
|