Single controller-based colored Petri nets for deadlock control in automated manufacturing systems

H Kaid, A Al-Ahmari, Z Li, R Davidrajuh - Processes, 2019 - mdpi.com
Deadlock control approaches based on Petri nets are usually implemented by adding
control places and related arcs to the Petri net model of a system. The main disadvantage of …

Specification and automatic verification of trust-based multi-agent systems

N Drawel, H Qu, J Bentahar, E Shakshuki - Future Generation Computer …, 2020 - Elsevier
We present a new logic-based framework for modeling and automatically verifying trust in
Multi-Agent Systems (MASs). We start by refining TCTL, a temporal logic of trust that extends …

Benchmarking reputation systems: A quantitative verification approach

AJ Bidgoly, BT Ladani - Computers in Human Behavior, 2016 - Elsevier
Trust and reputation systems are classes of decision support tools which help detecting
malicious behavior based on collecting ratings and opinions. Despite their advantages …

Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach

AJ Bidgoly, F Arabi - Computers & Operations Research, 2023 - Elsevier
One of the biggest challenges facing trust and reputation systems (TRSs) is evaluating their
ability to withstand various attacks, as these systems are vulnerable to multiple types of …

Modeling trust and reputation systems in hostile environments

SA Ghasempouri, BT Ladani - Future Generation Computer Systems, 2019 - Elsevier
In many modern network environments, agents of the system have to select optimal service
providers who in turn decide to provide different quality of services. This is while …

Modelling and quantitative verification of reputation systems against malicious attackers

AJ Bidgoly, BT Ladani - The Computer Journal, 2015 - academic.oup.com
In recent years, trust and reputation systems have gained much interest in many
environments, such as e-market-places, web services, ad-hoc networks and multi-agent …

Modeling and quantitative verification of trust systems against malicious attackers

AJ Bidgoly, BT Ladani - The Computer Journal, 2016 - ieeexplore.ieee.org
Nowadays, trust systems (TSs) are widely used for tackling dishonest entities in many
modern environments. However, these systems are vulnerable to some kinds of attacks …

Retracted article: A new trust evaluation algorithm between cloud entities based on fuzzy mathematics

A Mohsenzadeh, H Motameni, MJ Er - International Journal of Fuzzy …, 2016 - Springer
High security of cloud computing is one of the most challenges to be addressed before the
novel pas-as-you-go business paradigm is widely applied over the internet. Trust brings a …

A novel reward and penalty trust evaluation model based on confidence interval using Petri Net

A Mohsenzadeh, AJ Bidgoly, Y Farjami - Journal of Network and Computer …, 2020 - Elsevier
Trust brings a novel means to improve the security of entities. Entities potentially initiate
interactions with each other without having prior contacts. These interactions can either be …

Evaluation of the trust values among human resources in the enterprise cloud using an optimization algorithm and fuzzy logic

L Li, B Pahlevanzadeh - Kybernetes, 2022 - emerald.com
Purpose Cloud eases information processing, but it holds numerous risks, including hacking
and confidentiality problems. It puts businesses at risk in terms of data security and …