A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2015; you can also visit the original URL.
The file type is application/pdf
.
Filters
Mobility in Collaborative Alert Systems: Building Trust through Reputation
[chapter]
2011
Lecture Notes in Computer Science
However, for this alert information to be useful in the context of CIDN networks, certain trust and reputation mechanisms determining the credibility of a particular mobile node, and the alerts it provides ...
This is the main objective of this paper, where an inter-domain trust and reputation model, together with an architecture for inter-domain collaboration, are presented with the main aim of improving the ...
Collaborative alert systems provide the basis for building a global knowledge of alerts, based on the cooperation of all members of the system, to increase the accuracy in detecting distributed threats ...
doi:10.1007/978-3-642-23041-7_24
fatcat:boirhvacvraafgxo6u44racp34
RECLAMO: Virtual and Collaborative Honeynets Based on Trust Management and Autonomous Systems Applied to Intrusion Management
2013
2013 Seventh International Conference on Complex, Intelligent, and Software Intensive Systems
in order to accept their alerts as true. ...
This system will infer the most appropriate response for a given attack, taking into account the attack type, context information, and the trust and reputation of the reporting IDSs. ...
ACKNOWLEDGMENT This work has been partially funded with support from the Spanish MICINN (project RECLAMO, Virtual and Collaborative Honeynets based on Trust Management and Autonomous Systems applied to ...
doi:10.1109/cisis.2013.44
dblp:conf/cisis/PerezLCPV13
fatcat:udesapsfzzfd5k4cudooxqr3g4
Anomaly Detection for Internet of Vehicles: A Trust Management Scheme with Affinity Propagation
2016
Mobile Information Systems
Moreover, the scheme is enhanced with a distributed supervising mechanism and a central reputation arbitrator to assure robustness and fairness in detecting process. ...
In this paper, we introduce a trust-based anomaly detection scheme for IVs, where some malicious or incapable vehicles are existing on roads. ...
Their method therefore makes contributions to building centralized trust management system. ...
doi:10.1155/2016/5254141
fatcat:l2hlf2qa2ze2fntu4gnellp7xq
A Collaborative Intrusion Detection System for Cognitive Radio Networks with Trust and Reputation Management
2019
International journal of recent technology and engineering
, and uni-directional in accessible time window, so trust and reputation system is required. ...
CORE is a reputation based security mechanism which enforces cooperation of nodes in CRN. ...
CORE is a trust-based collaborative reputation mechanism to enforce cooperation of mobile nodes in the networks. ...
doi:10.35940/ijrte.b3356.078219
fatcat:k7wh3v2phjbkrldr36yw6ckxoy
Privacy-Preserving Profile Matching System for Trust-Aware Personalized User Recommendations in Social Networks
[chapter]
2016
Advances in Intelligent Systems and Computing
In the proposed system, a framework is introduced for handling trust in social networks, which is based on reputation mechanism. ...
In order to compute the reputation of each member, we adopt several other properties of trust such as, transitivity, personalization, and context, and draw ideas from sociology axioms. ...
According to Shani and Gunawardana [18] , it is unclear how to measure trust in an offline experiment, since trust is build through an interaction between the user and the system. ...
doi:10.1007/978-981-10-1675-2_4
fatcat:egzljzbgubgxbfsf7clrj3dc4u
Trust management systems for wireless sensor networks: Best practices
2010
Computer Communications
In order to assist this process, trust management systems could play a relevant role. ...
In this paper we list the best practices that we consider are essential for developing a good trust management system for WSN and make an analysis of the state of the art related to these practices. ...
This is the case, for example, of trust and reputation. In most of the cases they are considered jointly in order to build the trust or reputation systems. ...
doi:10.1016/j.comcom.2010.02.006
fatcat:clkxf6s54vgjvoktbpkstm4jga
A Survey of Intrusion Detection Systems in Wireless Sensor Networks
2014
IEEE Communications Surveys and Tutorials
In this article, a survey of the state-of-the-art in Intrusion Detection Systems (IDSs) that are proposed for WSNs is presented. Firstly, detailed information about IDSs is provided. ...
Secondly, a brief survey of IDSs proposed for Mobile Ad-Hoc Networks (MANETs) is presented and applicability of those systems to WSNs are discussed. Thirdly, IDSs proposed for WSNs are presented. ...
Reputation (trust) based IDSs A reputation based IDS scheme promotes node cooperation through collaborative monitoring of the nodes and a grading system associated with the results of the collaborative ...
doi:10.1109/surv.2013.050113.00191
fatcat:kmuvevcrzfattdk3ys3k3pq3wy
A Survey on new Threats and Countermeasures on Emerging Networks
[chapter]
2011
Intrusion Detection Systems
This collaboration is made through a collaborative architecture. ...
To counter such attacks, security mechanisms based on node collaboration and reputation are discussed and compared in a second part. ...
Intrusion Detection Systems The current structure of the chapters reflects the key aspects discussed in the papers but the papers themselves contain more additional interesting information: examples of ...
doi:10.5772/14835
fatcat:dbk5ya7rinfulldsn7jxqxjahm
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
2018
Future generations computer systems
profiles. • We apply Euclidean distance to derive a node's trust between two profiles. • We performed evaluation by collaborating with a practical healthcare center. a b s t r a c t Cyber-physical systems ...
A node's reputation can be judged by identifying the difference in Euclidean distance between two behavioral profiles. ...
Further, based on the suggestions from healthcare managers, we select four mobile and network features to build behavioral profiles, and apply Euclidean distance for evaluating a node's reputation. • By ...
doi:10.1016/j.future.2018.06.007
fatcat:r6lcc6sgbvbepccn3ostmupi3u
Recent Advancements in Intrusion Detection Systems for the Internet of Things
2019
Security and Communication Networks
On the other side, IDSs have already been successfully used in adjacent network types like Mobile Ad hoc Networks (MANET), Wireless Sensor Networks (WSN), and Cyber-Physical Systems (CPS) which, in part ...
In this article, we will give an overview about IDSs suited for IoT networks. ...
A trust management system provides a computer system with mechanisms reflecting the natural trust and reputation gaining process of humans; see, e.g., Khare and Rifkin [41] . ...
doi:10.1155/2019/4301409
fatcat:qupk6elzcvbkrarqf25epmjdci
Enhancing Funders' and Advocates' Effectiveness: The Processes Shaping Collaborative Advocacy for Health System Accountability in South Africa
2016
The Foundation Review
Acknowledgements We would like to thank the leadership and staff of the organizations whose extraordinary work is discussed in this article for sharing their time and insights, The Atlantic Philanthropies ...
Self-Selection Through Trust-Building Another striking feature of these collaborations is that they were consolidated over time. ...
For example, the TAC can mobilize members to march and protest, but can also mobilize its reputation and brand such that both elected representatives and health system staff recognize its ability to gain ...
doi:10.9707/1944-5660.1277
fatcat:qjlibudpzzdnfkumb6dhlge7ya
Towards Engineering Trust-Aware Future Internet Systems
[chapter]
2013
Lecture Notes in Business Information Processing
In this paper we propose a UML extension for specifying trust and reputation requirements, and we apply it to an eHealth case study. ...
and reputation. ...
The goal is to build a web application through which the physician and the patient can interact in a trusted way. ...
doi:10.1007/978-3-642-38490-5_44
fatcat:zauiwiid6rdlnox7ga3pzpofpq
Safety Challenges and Solutions in Mobile Social Networks
2015
IEEE Systems Journal
in MSNs. ...
Mobile social networks (MSNs) are specific types of social media which consolidate the ability of omnipresent connection for mobile users/devices to share user-centric data objects among interested users ...
In other words, trust is based on the reputation between individuals and is a capital asset that people may invest great amount of resources in building and that is acquired slowly but can be destroyed ...
doi:10.1109/jsyst.2013.2284696
fatcat:so3qnnbk65axhn2upzmemss2he
An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network
2017
International Journal of Intelligent Engineering and Systems
major issues in designing Intrusion Detection Systems (IDS). ...
AID-ST system incorporates multi-dimensional trust parameters and subjective logic theory to effectively detect and confirm the attack behavior. ...
MANET comprises of mobile nodes that operate independently in the open medium without any infrastructure [1, 2] . The nodes in MANET communicate with each other through single or multi-hop. ...
doi:10.22266/ijies2017.0831.09
fatcat:etbzk5kghjdqhftnuotobim2vi
Long-term reputation system for vehicular networking based on vehicle's daily commute routine
2011
2011 IEEE Consumer Communications and Networking Conference (CCNC)
Wu el al. has recently proposed a group-based reputation system [9] for mobile P2P systems where peers with similar mobility are clustered into a group. ...
[4, 5] introduced a reputation system in peer-to-peer (P2P) networks in order to establish a trust relationship, and to encourage the cooperation, among peer nodes. Ref. ...
doi:10.1109/ccnc.2011.5766507
dblp:conf/ccnc/ParkAZ11
fatcat:4nnbqd272zasxdfumh77rv7ynq
« Previous
Showing results 1 — 15 out of 11,375 results