-
1
-
-
50149105732
-
Impact of denial of service attacks on ad hoc networks
-
Aug.
-
I. Aad, J.-P. Hubaux, and E. W. Knightly, "Impact of denial of service attacks on ad hoc networks," IEEE/ACM Trans. Netw., vol. 16, no. 4, pp. 791-802, Aug. 2008.
-
(2008)
IEEE/ACM Trans. Netw.
, vol.16
, Issue.4
, pp. 791-802
-
-
Aad, I.1
Hubaux, J.-P.2
Knightly, E.W.3
-
2
-
-
84865619772
-
Combining global optimization with local selection for efficient QoS-aware service composition
-
M. Alrifai and T. Risse, "Combining global optimization with local selection for efficient QoS-aware service composition," in Proc. 18th Int. Conf. World Wide Web, 2009, pp. 881-990.
-
(2009)
Proc. 18th Int. Conf. World Wide Web
, pp. 881-990
-
-
Alrifai, M.1
Risse, T.2
-
3
-
-
79953731616
-
Trust-based dynamic web service composition using social network analysis
-
S. K. Bansal, A. Bansal, and M. B. Blake, "Trust-based dynamic web service composition using social network analysis," in Proc. IEEE Int. Workshop Bus. Appl. Social Netw. Anal., 2010, pp. 1-8.
-
(2010)
Proc. IEEE Int. Workshop Bus. Appl. Social Netw. Anal.
, pp. 1-8
-
-
Bansal, S.K.1
Bansal, A.2
Blake, M.B.3
-
5
-
-
80052171869
-
Trust-based intrusion detection in wireless sensor networks
-
F. Bao, I. R. Chen, M. Chang, and J. H. Cho, "Trust-based intrusion detection in wireless sensor networks," in Proc. IEEE Int. Conf. Comput. Commun., 2011, pp. 1-6.
-
(2011)
Proc. IEEE Int. Conf. Comput. Commun.
, pp. 1-6
-
-
Bao, F.1
Chen, I.R.2
Chang, M.3
Cho, J.H.4
-
6
-
-
84915801700
-
The internet of things vision: Key features, applications and open issues
-
Dec.
-
E. Borgia, "The internet of things vision: Key features, applications and open issues," Comput. Commun., vol. 54, pp. 1-31, Dec. 2014.
-
(2014)
Comput. Commun.
, vol.54
, pp. 1-31
-
-
Borgia, E.1
-
8
-
-
4544381357
-
A distributed service composition protocol for pervasive environments
-
D. Chakraborty, Y. Yesha, and A. Joshi, "A distributed service composition protocol for pervasive environments," in Proc. IEEE Wireless Commun. Netw. Conf., 2004, pp. 2575-2580.
-
(2004)
Proc. IEEE Wireless Commun. Netw. Conf.
, pp. 2575-2580
-
-
Chakraborty, D.1
Yesha, Y.2
Joshi, A.3
-
9
-
-
84896101663
-
Dynamic trust management for delay tolerant networks and its application to secure routing
-
May
-
I. R. Chen, F. Bao, M. Chang, and J. H. Cho, "Dynamic trust management for delay tolerant networks and its application to secure routing," IEEE Trans. Parallel Distrib. Syst., vol. 25, no. 5, pp. 1200-1210, May 2014.
-
(2014)
IEEE Trans. Parallel Distrib. Syst.
, vol.25
, Issue.5
, pp. 1200-1210
-
-
Chen, I.R.1
Bao, F.2
Chang, M.3
Cho, J.H.4
-
10
-
-
79551636196
-
Trust management for encounter-based routing in delay tolerant networks
-
I. R. Chen, F. Bao, M. Chang, and J. H. Cho, "Trust management for encounter-based routing in delay tolerant networks," in Proc. IEEE Global TeleCommun. Conf., 2010, pp. 1-6.
-
(2010)
Proc. IEEE Global TeleCommun. Conf.
, pp. 1-6
-
-
Chen, I.R.1
Bao, F.2
Chang, M.3
Cho, J.H.4
-
11
-
-
77949264858
-
Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks
-
Mar.
-
J. H. Cho, I. R. Chen, and P. G. Feng, "Effect of intrusion detection on reliability of mission-oriented mobile group systems in mobile ad hoc networks," IEEE Trans. Rel., vol. 59, no. 1, pp. 231-241, Mar. 2010.
-
(2010)
IEEE Trans. Rel.
, vol.59
, Issue.1
, pp. 231-241
-
-
Cho, J.H.1
Chen, I.R.2
Feng, P.G.3
-
12
-
-
84857844113
-
A survey on trust management for mobile ad hoc networks
-
4th Quarter
-
J. H. Cho, A. Swami, and I. R. Chen, "A survey on trust management for mobile ad hoc networks," IEEE Comm. Surveys Tuts., vol. 13, no. 4, pp. 562-583, 4th Quarter 2011.
-
(2011)
IEEE Comm. Surveys Tuts.
, vol.13
, Issue.4
, pp. 562-583
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
13
-
-
70749147824
-
Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks
-
J. H. Cho, A. Swami, and I. R. Chen, "Modeling and analysis of trust management for cognitive mission-driven group communication systems in mobile ad hoc networks," in Proc. Int. Conf. Comput. Sci. Eng., 2009, pp. 641-650.
-
(2009)
Proc. Int. Conf. Comput. Sci. Eng.
, pp. 641-650
-
-
Cho, J.H.1
Swami, A.2
Chen, I.R.3
-
14
-
-
84866606762
-
Enhancing data trustworthiness via assured digital signing
-
Nov./Dec.
-
W. Dai, T. P. Parker, H. Jin, and S. Xu, "Enhancing data trustworthiness via assured digital signing," IEEE Trans. Dependable Secure Comput., vol. 9, no. 6, pp. 838-851, Nov./Dec. 2012.
-
(2012)
IEEE Trans. Dependable Secure Comput.
, vol.9
, Issue.6
, pp. 838-851
-
-
Dai, W.1
Parker, T.P.2
Jin, H.3
Xu, S.4
-
15
-
-
77949862568
-
Trust-aware component service selection algorithm in service composition
-
G. Dai and Y. Wang, "Trust-aware component service selection algorithm in service composition," in Proc. 4th Int. Conf. Frontier Comput. Sci. Technol., 2009, pp. 613-618.
-
(2009)
Proc. 4th Int. Conf. Frontier Comput. Sci. Technol.
, pp. 613-618
-
-
Dai, G.1
Wang, Y.2
-
16
-
-
44849093503
-
Reputation-based framework for high integrity sensor networks
-
S. Ganeriwal, L. K. Balzano, and M. B. Srivastava, "Reputation-Based framework for high integrity sensor networks," ACM Trans. Sensor Netw., vol. 4, no. 3, article no. 15, pp. 1-37, 2008.
-
(2008)
ACM Trans. Sensor Netw.
, vol.4
, Issue.3
, pp. 1-37
-
-
Ganeriwal, S.1
Balzano, L.K.2
Srivastava, M.B.3
-
17
-
-
77954870080
-
Approximability and hardness in multi-objective optimization
-
C. Glaßer, C. Reitwießner, H. Schmitz, and M. Witek, "Approximability and hardness in multi-objective optimization," in Proc. Programs, Proofs, Processes. 6th Int. Conf. Comput. Eur., 2010, pp. 180-189.
-
(2010)
Proc. Programs, Proofs, Processes. 6th Int. Conf. Comput. Eur.
, pp. 180-189
-
-
Glaßer, C.1
Reitwießner, C.2
Schmitz, H.3
Witek, M.4
-
18
-
-
79951870161
-
Trustworthy service selection and composition
-
C. W. Hang and M. P. Singh, "Trustworthy service selection and composition," ACM Trans. Auton. Adaptive Syst., vol. 6, no. 1, article no. 5, pp. 1-17, 2011.
-
(2011)
ACM Trans. Auton. Adaptive Syst.
, vol.6
, Issue.1
, pp. 1-17
-
-
Hang, C.W.1
Singh, M.P.2
-
19
-
-
84875836507
-
Shin: Generalized trust propagation with limited evidence
-
Mar.
-
C. W. Hang, Z. Zhang, and M. P. Singh, "Shin: Generalized trust propagation with limited evidence," IEEE Comput., vol. 46, no. 3, pp. 78-85, Mar. 2013.
-
(2013)
IEEE Comput.
, vol.46
, Issue.3
, pp. 78-85
-
-
Hang, C.W.1
Zhang, Z.2
Singh, M.P.3
-
20
-
-
84866358941
-
Behind the curtain: Service selection via trust in composite services
-
C. W. Huang, A. K. Kalia, and M. P. Singh, "Behind the curtain: Service selection via trust in composite services," in Proc. IEEE 19th Int. Conf. Web Services, 2012, pp. 9-16.
-
(2012)
Proc. IEEE 19th Int. Conf. Web Services
, pp. 9-16
-
-
Huang, C.W.1
Kalia, A.K.2
Singh, M.P.3
-
21
-
-
77951492318
-
Pervasive service discovery across heterogeneous tactical networks
-
F. T. Johnsen, J. Flathagen, and T. Hafsoe, "Pervasive service discovery across heterogeneous tactical networks," in Proc. IEEE Military Commun. Conf., 2009, pp. 1-8.
-
(2009)
Proc. IEEE Military Commun. Conf.
, pp. 1-8
-
-
Johnsen, F.T.1
Flathagen, J.2
Hafsoe, T.3
-
22
-
-
84865230829
-
Semantic service discovery for interoperability in tactical military networks
-
F. T. Johnsen, M. Rustad, T. Hafsoe, A. Eggen, and T. Gagnes, "Semantic service discovery for interoperability in tactical military networks," Int. C2 J., vol. 4, no. 1, pp. 1-24, 2010.
-
(2010)
Int. C2 J.
, vol.4
, Issue.1
, pp. 1-24
-
-
Johnsen, F.T.1
Rustad, M.2
Hafsoe, T.3
Eggen, A.4
Gagnes, T.5
-
25
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Syst., vol. 43, no. 2, pp. 618-644, 2007.
-
(2007)
Decision Support Syst.
, vol.43
, Issue.2
, pp. 618-644
-
-
Jøsang, A.1
Ismail, R.2
Boyd, C.3
-
26
-
-
34250346875
-
Dynamic service composition in pervasive computing
-
S. Kalasapur, M. Kumar, and B. A. Shirazi, "Dynamic service composition in pervasive computing," IEEE Trans. Parallel Distrib. Syst., pp. 907-918, 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, pp. 907-918
-
-
Kalasapur, S.1
Kumar, M.2
Shirazi, B.A.3
-
27
-
-
84864498496
-
A distributed constraint satisfaction problem approach to virtual device composition
-
Nov.
-
E. Karmouch and A. Nayak, "A distributed constraint satisfaction problem approach to virtual device composition," IEEE Trans. Parallel Distrib. Syst., vol. 23, no. 11, pp. 1997-2009, Nov. 2012.
-
(2012)
IEEE Trans. Parallel Distrib. Syst.
, vol.23
, Issue.11
, pp. 1997-2009
-
-
Karmouch, E.1
Nayak, A.2
-
28
-
-
77957277560
-
Analyzing the relations between some parameters of web services reputation
-
B. Khosravifar, J. Bentahar, and A. Moazin, "Analyzing the relations between some parameters of web services reputation," in Proc. IEEE Int. Conf. Web Services, 2010, pp. 329-336.
-
(2010)
Proc. IEEE Int. Conf. Web Services
, pp. 329-336
-
-
Khosravifar, B.1
Bentahar, J.2
Moazin, A.3
-
29
-
-
77955116868
-
Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking
-
S. Kosta, A. Mei, and J. Stefa, "Small world in motion (SWIM): Modeling communities in ad-hoc mobile networking," in Proc. 7th IEEE Commun. Society Conf. Sensor, Mesh Ad Hoc Commun. Netw., 2010, pp. 1-9.
-
(2010)
Proc. 7th IEEE Commun. Society Conf. Sensor, Mesh Ad Hoc Commun. Netw.
, pp. 1-9
-
-
Kosta, S.1
Mei, A.2
Stefa, J.3
-
30
-
-
84911427937
-
Correlated multidimensional QoS metrics for trust evaluation within web services
-
M. Mehdi, N. Bougnuila, and J. Bentahar, "Correlated multidimensional QoS metrics for trust evaluation within web services," in Proc. 13th Int. Conf. Auton. Agents Multiagent Syst., 2014, pp. 1605-1606.
-
(2014)
Proc. 13th Int. Conf. Auton. Agents Multiagent Syst.
, pp. 1605-1606
-
-
Mehdi, M.1
Bougnuila, N.2
Bentahar, J.3
-
31
-
-
84906788207
-
Probabilistic approach for QoS-aware recommender system for trustworthy web service selection
-
M. Mehdi, N. Bouguila, and J. Bentabar, "Probabilistic approach for QoS-aware recommender system for trustworthy web service selection," Appl. Intell., vol. 41, no. 2, pp. 503-524, 2014.
-
(2014)
Appl. Intell.
, vol.41
, Issue.2
, pp. 503-524
-
-
Mehdi, M.1
Bouguila, N.2
Bentabar, J.3
-
32
-
-
84958535423
-
QoS-based reputation feedback fusion under unknown correlation
-
M. Mehdi, N. Bouguila, and J. Bentahar, "QoS-based reputation feedback fusion under unknown correlation," in Proc. 3rd Int. Conf. Adaptive Intell. Syst., 2014, pp. 172-181.
-
(2014)
Proc. 3rd Int. Conf. Adaptive Intell. Syst.
, pp. 172-181
-
-
Mehdi, M.1
Bouguila, N.2
Bentahar, J.3
-
33
-
-
84900637145
-
Asurvey of intrusion detection in wireless network applications
-
R. Mitchell and I.R. Chen, "Asurvey of intrusion detection in wireless network applications," Comput. Commun., vol. 42, pp. 1-23, 2014.
-
(2014)
Comput. Commun.
, vol.42
, pp. 1-23
-
-
Mitchell, R.1
Chen, I.R.2
-
34
-
-
84883281959
-
Behavior-rule based intrusion detection systems for safety critical smart grid applications
-
Sep.
-
R. Mitchell and I. R. Chen, "Behavior-rule based intrusion detection systems for safety critical smart grid applications," IEEE Trans. Smart Grid, vol. 4, no. 3, pp. 1254-1263, Sep. 2013.
-
(2013)
IEEE Trans. Smart Grid
, vol.4
, Issue.3
, pp. 1254-1263
-
-
Mitchell, R.1
Chen, I.R.2
-
36
-
-
84883759583
-
Optimizing service selection and allocation in situational computing applications
-
Jul.-Sep.
-
C. Sandionigi, D. Ardagna, G. Cugola, and C. Ghezzi, "Optimizing service selection and allocation in situational computing applications," IEEE Trans. Services Comput., vol. 6, no. 3, pp. 414-428, Jul.-Sep. 2013.
-
(2013)
IEEE Trans. Services Comput.
, vol.6
, Issue.3
, pp. 414-428
-
-
Sandionigi, C.1
Ardagna, D.2
Cugola, G.3
Ghezzi, C.4
-
37
-
-
80051700817
-
A generic framework for distributed multirobot cooperation
-
S. Sariel-Talay, T. R. Balch, and N. Erdogan, "A generic framework for distributed multirobot cooperation," J. Intell. Robot. Syst., vol. 63, no. 2, pp. 323-358, 2011.
-
(2011)
J. Intell. Robot. Syst.
, vol.63
, Issue.2
, pp. 323-358
-
-
Sariel-Talay, S.1
Balch, T.R.2
Erdogan, N.3
-
38
-
-
85029197712
-
Real-time multi-agent adaptive tactical pervasive service-oriented collaborations (TAPS)
-
R-Y. Sheu et al., "Real-time multi-agent adaptive tactical pervasive service-oriented collaborations (TAPS)," in Proc. ACM Int. Conf. Pervasive Services, 2010, pp. 1-8.
-
(2010)
Proc. ACM Int. Conf. Pervasive Services
, pp. 1-8
-
-
Sheu, R.-Y.1
-
39
-
-
7044270651
-
Trustworthy service composition: Challenges and research questions
-
M. P. Singh, "Trustworthy service composition: Challenges and research questions," in Proc. Int. Conf. Trust, Reputation, Security: Theories Practice, 2003, pp. 39-52.
-
(2003)
Proc. Int. Conf. Trust, Reputation, Security: Theories Practice
, pp. 39-52
-
-
Singh, M.P.1
-
41
-
-
79951815088
-
QoS-aware service composition: A survey
-
A. Strunk, "QoS-Aware service composition: A survey," in Proc. 8th Eur. Conf. Web Services, 2010, pp. 67-74.
-
(2010)
Proc. 8th Eur. Conf. Web Services
, pp. 67-74
-
-
Strunk, A.1
-
42
-
-
79952386792
-
Service composition and optimal selection with trust constraints
-
P. Sun, "Service composition and optimal selection with trust constraints," in Proc. IEEE Asia-Pacific Services Comput. Conf., 2010, pp. 645-653.
-
(2010)
Proc. IEEE Asia-Pacific Services Comput. Conf.
, pp. 645-653
-
-
Sun, P.1
-
43
-
-
74049156743
-
Dynamic service-oriented architectures for tactical edge networks
-
N. Suri, "Dynamic Service-Oriented architectures for tactical edge networks," in Proc. 4th Workshop Emerging Web Service Technol., 2009, pp. 3-10.
-
(2009)
Proc. 4th Workshop Emerging Web Service Technol.
, pp. 3-10
-
-
Suri, N.1
-
44
-
-
59049090820
-
Resource service composition and its optimal selection based on particle swarm optimization in manufacturing grid system
-
Nov.
-
F. Tao, "Resource service composition and its optimal selection based on particle swarm optimization in manufacturing grid system," IEEE Trans. Ind. Informat., vol. 4, no. 4, pp. 311-327, Nov. 2008.
-
(2008)
IEEE Trans. Ind. Informat.
, vol.4
, Issue.4
, pp. 311-327
-
-
Tao, F.1
-
45
-
-
77952990853
-
From mission specification to quality of information measures closing the loop in military sensor networks
-
D. J. Thornley, R. Young, and J. Richardson, "From mission specification to quality of information measures closing the loop in military sensor networks," Annu. Conf. Int. Technol. Alliance, 2008.
-
(2008)
Annu. Conf. Int. Technol. Alliance
-
-
Thornley, D.J.1
Young, R.2
Richardson, J.3
-
46
-
-
84860864055
-
Towards robust service compositions in the context of functionally diverse services
-
F. Wagner, B. Kl, F. Ishikawa, and S. Honiden, "Towards robust service compositions in the context of functionally diverse services," in Proc. 21st Int. Conf. World Wide Web, 2012, pp. 969-978.
-
(2012)
Proc. 21st Int. Conf. World Wide Web
, pp. 969-978
-
-
Wagner, F.1
Kl, B.2
Ishikawa, F.3
Honiden, S.4
-
47
-
-
84928939574
-
A survey on trust and reputation models for web services: Single, composite, and communities
-
O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, "A survey on trust and reputation models for web Services: Single, composite, and communities," Decision Support Syst., vol. 74, pp. 121-134, 2015.
-
(2015)
Decision Support Syst.
, vol.74
, pp. 121-134
-
-
Wahab, O.A.1
Bentahar, J.2
Otrok, H.3
Mourad, A.4
-
48
-
-
84897692029
-
Trustbased service composition and binding for tactical networks with multiple objectives
-
Y. Wang, I. R. Chen, J. H. Cho, K. S. Chan, and A. Swami, "Trustbased service composition and binding for tactical networks with multiple objectives," in Proc. 32th IEEE Military Commun. Conf., 2013, pp. 1862-1867.
-
(2013)
Proc. 32th IEEE Military Commun. Conf.
, pp. 1862-1867
-
-
Wang, Y.1
Chen, I.R.2
Cho, J.H.3
Chan, K.S.4
Swami, A.5
-
49
-
-
79959565023
-
A model-driven approach to the construction, composition and analysis of services on sensor networks
-
J. Wright et al., "A model-driven approach to the construction, composition and analysis of services on sensor networks," Annu. Conf. Int. Technol. Alliance, 2010.
-
(2010)
Annu. Conf. Int. Technol. Alliance
-
-
Wright, J.1
-
51
-
-
34248525624
-
Efficient algorithms for web services selection with end-to-end QoS constraints
-
May
-
T. Yu, Y. Zhang, and K. J. Lin, "Efficient algorithms for web services selection with end-to-end QoS constraints," ACM Trans. Web, vol. 1, no. 1, article no. 6, pp. 1-26, May 2007.
-
(2007)
ACM Trans. Web
, vol.1
, Issue.1
, pp. 1-26
-
-
Yu, T.1
Zhang, Y.2
Lin, K.J.3
-
52
-
-
3042666264
-
QoS-aware middleware for web services composition
-
May
-
L. Zeng et al., "QoS-aware middleware for web services composition," IEEE Trans. Softw. Eng., vol. 30, no. 5, pp. 311-327, May 2004.
-
(2004)
IEEE Trans. Softw. Eng.
, vol.30
, Issue.5
, pp. 311-327
-
-
Zeng, L.1
|