Filters








95 Hits in 7.4 sec

Mobility in Collaborative Alert Systems: Building Trust through Reputation [chapter]

Manuel Gil Pérez, Félix Gómez Mármol, Gregorio Martínez Pérez, Antonio F. Gómez Skarmeta
2011 Lecture Notes in Computer Science  
However, for this alert information to be useful in the context of CIDN networks, certain trust and reputation mechanisms determining the credibility of a particular mobile node, and the alerts it provides  ...  This is the main objective of this paper, where an inter-domain trust and reputation model, together with an architecture for inter-domain collaboration, are presented with the main aim of improving the  ...  Collaborative alert systems provide the basis for building a global knowledge of alerts, based on the cooperation of all members of the system, to increase the accuracy in detecting distributed threats  ... 
doi:10.1007/978-3-642-23041-7_24 fatcat:boirhvacvraafgxo6u44racp34

Trust Management and Admission Control for Host-Based Collaborative Intrusion Detection

Carol Fung, Jie Zhang, Issam Aib, Raouf Boutaba
2010 Journal of Network and Systems Management  
In this paper, we present a trust-based framework for secure and effective collaboration within an intrusion detection network (IDN).  ...  In particular, we design a trust model that allows each IDS to evaluate the trustworthiness of other IDSes based on its personal experience.  ...  For the newcomer attack, malicious nodes white-wash their bad history and re-register as new users to the system. However, it is quite difficult for a newcomer to succeed in our system.  ... 
doi:10.1007/s10922-010-9176-7 fatcat:gwpn2tl37vbgzhbaili5mtx2d4

How Newcomers' Work-Related Use of Enterprise Social Media Affects Their Thriving at Work—The Swift Guanxi Perspective

Yuan Sun, Mengyi Zhu, Zuopeng (Justin) Zhang
2019 Sustainability  
A valid sample consisted of 77 new employee-veteran dyads in a large telecom company was used in Smart-PLS to test our research model.  ...  The findings provide new insights for organizations to better manage the use of ESM to improve newcomers' thriving at work.  ...  Acknowledgments: We are very grateful to the editor Hank Liu and several anonymous reviewers giving their valuable suggestions and comments for improving the quality of our paper.  ... 
doi:10.3390/su11102794 fatcat:lqw5pzxyunaodbpknh4dgyckbq

A Survey of Trust Management in the Internet of Vehicles

Sarah Ali Siddiqui, Adnan Mahmood, Quan Z. Sheng, Hajime Suzuki, Wei Ni
2021 Electronics  
intelligent transportation systems (ITS), wherein vehicles establish a belief towards their peers in the pursuit of ensuring safe and efficacious traffic flows.  ...  In the course of vehicles forming perceptions towards other participating vehicles, a range of contributing parameters regarding the interactions among these vehicles are accumulated to establish a final  ...  To overcome the negative impacts of the said punishing strategy, i.e., the lack of collaboration opportunities available for the newcomer due to a low trust score, a trust based vehicular coalition formation  ... 
doi:10.3390/electronics10182223 fatcat:jqghqqcdv5f4xgbc3mibc2riby

A Trust Framework for Peer-to-Peer Interaction in Ad Hoc Networks

Javesh Boodnah, Stefan Poslad
2009 2009 Computation World: Future Computing, Service Computation, Cognitive, Adaptive, Content, Patterns  
By design, the framework also houses a rule-based mechanism to thwart misbehaving behaviour or non-cooperation.  ...  The work in this thesis is aimed at defining a framework for such an ad hoc network that provides ways for participants to distinguish and collaborate with their most trustworthy neighbours.  ...  In so far as trust generation is concerned, simulations (both software-based and physical) can be carried out on using various other bootstrapping mechanisms in order to find a most suitable one.  ... 
doi:10.1109/computationworld.2009.62 fatcat:vtoz27ksj5aqvpesmjei5by5ju

Efficient Certification Path Discovery for MANET

Georgios Kambourakis, Elisavet Konstantinou, Anastasia Douma, Marios Anagnostopoulos, Georgios Fotiadis
2010 EURASIP Journal on Wireless Communications and Networking  
Our scheme is based on a binary tree formation of the network's nodes.  ...  The binary tree structure is proved very effective for building certificate chains between communicating nodes that are multihops away and the cumbersome problem of certificate chain discovery is avoided  ...  Another credit-based system for MANETs called Sprite is proposed in [22] . Sprite uses a credit system to provide incentives for nodes that collaborate and report actions truthfully.  ... 
doi:10.1155/2010/243985 fatcat:p2tergeiwbayfgwbh6a3zzr3ce

A Survey on Metaverse: Fundamentals, Security, and Privacy [article]

Yuntao Wang, Zhou Su, Ning Zhang, Dongxiao Liu, Rui Xing, Tom H. Luan, Xuemin Shen
2022 arXiv   pre-print
Finally, we draw open research directions for building future metaverse systems.  ...  Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize  ...  power systems using reputation •Fast aggressive attacker detection using the PowerWorld simulator •Lack credibility analysis for historical operations in reputation evaluation Dirichlet-based probabilistic  ... 
arXiv:2203.02662v2 fatcat:k5ba4o3lbbarljwgrrqftamlue

Make new friends, but keep the old

Jilin Chen, Werner Geyer, Casey Dugan, Michael Muller, Ido Guy
2009 Proceedings of the 27th international conference on Human factors in computing systems - CHI 09  
We evaluated four recommender algorithms in an enterprise social networking site using a personalized survey of 500 users and a field study of 3,000 users.  ...  Algorithms based on social network information were able to produce better-received recommendations and find more known contacts for users, while algorithms using similarity of user-created content were  ...  [18] built a hybrid alert filtering system combining collaborative filtering techniques and the content features extracted from the alert message itself.  ... 
doi:10.1145/1518701.1518735 dblp:conf/chi/ChenGDMG09 fatcat:wplorjqkqjepjiepcbl3zqiunu

D2.3: Platform Functionality Requirements & Specification Report

Francisco Sanz, Margaret Gold, Marzia Mazzonetto
2019 Zenodo  
The ambition of EU-Citizen.Science is to build, fill, and promote a sustainable platform and mutual learning space providing different tools, best practice examples and relevant scientific outcomes that  ...  in Europe.  ...  for teachers) but it needs to create a reputation for being the best place to go.  ... 
doi:10.5281/zenodo.3612807 fatcat:4e2hxvggbvamzjzeobeia2grye

5GZORRO_D2.2: Design of the 5GZORRO Platform for Security & Trust

. Carrozzo, P.G. Giardina, J. Brenes, E. Bucchianeri, G. Landi, C. Herranz, A. Fernandez, M. S. Siddiqui, Javier Fernandez, K. Meth, K. Barabash, Diego R. López, P. Diogo, L. Conceicao, T. Subramanya, R. Behravesh, J.M. Jorquera Valero, P. M. Sánchez Sánchez, M. Gil Pérez, G. Martínez Pérez, J. Taylor, J. Bonnet, P. Chainho, M. Mertiri, T. Bozios, A. Lekidis, V. Theodorou, D. Laskaratos, F. Bravo Díaz, A. Ramos, J.M. Mifsud, A. Sciberreas
2021 Zenodo  
Consensus A consensus mechanism is required for network member nodes to agree on ledger updates, a principal element in building trust between transaction participants.  ...  DLT Transaction Model Ultimately a DLT system is simply a decentralized mechanism to execute transactions and store the results (updated state) in a distributed system.  ... 
doi:10.5281/zenodo.5561042 fatcat:o5ecnvwvifhmveigarvfgih3l4

Structuring the world's knowledge: Socio-technical processes and data quality in Wikidata

Alessandro Piscopo
2019 Figshare  
PhD Thesis covering socio-tecnical processes and data quality in Wikidata.Abstract: Wikidata is a collaborative knowledge graph by the Wikimedia Foundation.  ...  These features have drawn the attention of a growing number of researchers and practitioners from several fields. Nevertheless, research about collaboration processes in Wikidata is still scarce.  ...  Data For the purpose of analysis, this thesis uses data from the Wikidata historical dumps, Online knowledge collaboration Socio-technical systems are 'social systems sitting upon a technical base' (Whitworth  ... 
doi:10.6084/m9.figshare.10998791.v1 fatcat:7apohgf4zvbnfa426zgsekq6sy

Structuring the world's knowledge: Socio-technical processes and data quality in Wikidata

Alessandro Piscopo
2019 Figshare  
PhD Thesis covering socio-tecnical processes and data quality in Wikidata.Abstract: Wikidata is a collaborative knowledge graph by the Wikimedia Foundation.  ...  These features have drawn the attention of a growing number of researchers and practitioners from several fields. Nevertheless, research about collaboration processes in Wikidata is still scarce.  ...  Data For the purpose of analysis, this thesis uses data from the Wikidata historical dumps, Online knowledge collaboration Socio-technical systems are 'social systems sitting upon a technical base' (Whitworth  ... 
doi:10.6084/m9.figshare.10998791 fatcat:n7qfv5yefndrvfko24uy5rwtwm

The Patras Blended Strategy Model for Deep and Meaningful Learning in Quality Life-Long Distance Education

2019 The Electronic Journal of e-Learning  
Based on the experiences in distance lifelong learning programmes in the University of Patras' Educational Center for Life-Long Learning (KEDIVIM) the authors present how the principles and attributes  ...  In the context of distance education inlife-long learning, one important challenge is the design of versatile quality assurance strategies for e-training.  ...  We would like to thank Slavka Madarova for her help with translating this document. The utilisation of technology for educational purposes is widely supported in literature.  ... 
doi:10.34190/jel.17.2.01 fatcat:ziy67fc6evfklbwreidhd5ww6q

Can online buddies and bandwagon cues enhance user participation in online health communities?

Hyang-Sook Kim, S. Shyam Sundar
2014 Computers in Human Behavior  
The study constructed a prototype of an online health community website for the experiment.  ...  The core argument of SIT is that individuals are unlikely to offer someone help unless they have received a specific request for such help.  ...  Because the study model included two independent variables, one of which functions as a moderator, Hayes' PROCESS macro in SPSS was used for the moderated mediation analysis using a bootstrapping method  ... 
doi:10.1016/j.chb.2014.04.039 fatcat:ngnslken6ne45dqn3h67eyb5ry

IBM-ACS: Reminiscences and Lessons Learned from a 1960's Supercomputer Project [chapter]

Lynn Conway
2011 Lecture Notes in Computer Science  
This paper contains reminiscences of my work as a young engineer at IBM-Advanced Computing Systems.  ...  of abstraction, about ranging widely across levels of abstraction when seeking innovative system optimizations, about principled versus ad-hoc design and the need for principled design of the design process  ...  Mark's penetrating investigations provide amazing amounts of detail and are a tremendous resource for gaining understandings of project dynamics in earlier times.  ... 
doi:10.1007/978-3-642-24541-1_15 fatcat:khksvqpe7rc2tds34ly6r3j6fy
« Previous Showing results 1 — 15 out of 95 results