Single controller-based colored Petri nets for deadlock control in automated manufacturing systems
Deadlock control approaches based on Petri nets are usually implemented by adding
control places and related arcs to the Petri net model of a system. The main disadvantage of …
control places and related arcs to the Petri net model of a system. The main disadvantage of …
Specification and automatic verification of trust-based multi-agent systems
N Drawel, H Qu, J Bentahar, E Shakshuki - Future Generation Computer …, 2020 - Elsevier
We present a new logic-based framework for modeling and automatically verifying trust in
Multi-Agent Systems (MASs). We start by refining TCTL, a temporal logic of trust that extends …
Multi-Agent Systems (MASs). We start by refining TCTL, a temporal logic of trust that extends …
Benchmarking reputation systems: A quantitative verification approach
AJ Bidgoly, BT Ladani - Computers in Human Behavior, 2016 - Elsevier
Trust and reputation systems are classes of decision support tools which help detecting
malicious behavior based on collecting ratings and opinions. Despite their advantages …
malicious behavior based on collecting ratings and opinions. Despite their advantages …
Robustness evaluation of trust and reputation systems using a deep reinforcement learning approach
AJ Bidgoly, F Arabi - Computers & Operations Research, 2023 - Elsevier
One of the biggest challenges facing trust and reputation systems (TRSs) is evaluating their
ability to withstand various attacks, as these systems are vulnerable to multiple types of …
ability to withstand various attacks, as these systems are vulnerable to multiple types of …
Modeling trust and reputation systems in hostile environments
SA Ghasempouri, BT Ladani - Future Generation Computer Systems, 2019 - Elsevier
In many modern network environments, agents of the system have to select optimal service
providers who in turn decide to provide different quality of services. This is while …
providers who in turn decide to provide different quality of services. This is while …
Modelling and quantitative verification of reputation systems against malicious attackers
AJ Bidgoly, BT Ladani - The Computer Journal, 2015 - academic.oup.com
In recent years, trust and reputation systems have gained much interest in many
environments, such as e-market-places, web services, ad-hoc networks and multi-agent …
environments, such as e-market-places, web services, ad-hoc networks and multi-agent …
Modeling and quantitative verification of trust systems against malicious attackers
AJ Bidgoly, BT Ladani - The Computer Journal, 2016 - ieeexplore.ieee.org
Nowadays, trust systems (TSs) are widely used for tackling dishonest entities in many
modern environments. However, these systems are vulnerable to some kinds of attacks …
modern environments. However, these systems are vulnerable to some kinds of attacks …
Retracted article: A new trust evaluation algorithm between cloud entities based on fuzzy mathematics
A Mohsenzadeh, H Motameni, MJ Er - International Journal of Fuzzy …, 2016 - Springer
High security of cloud computing is one of the most challenges to be addressed before the
novel pas-as-you-go business paradigm is widely applied over the internet. Trust brings a …
novel pas-as-you-go business paradigm is widely applied over the internet. Trust brings a …
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net
Trust brings a novel means to improve the security of entities. Entities potentially initiate
interactions with each other without having prior contacts. These interactions can either be …
interactions with each other without having prior contacts. These interactions can either be …
Evaluation of the trust values among human resources in the enterprise cloud using an optimization algorithm and fuzzy logic
L Li, B Pahlevanzadeh - Kybernetes, 2022 - emerald.com
Purpose Cloud eases information processing, but it holds numerous risks, including hacking
and confidentiality problems. It puts businesses at risk in terms of data security and …
and confidentiality problems. It puts businesses at risk in terms of data security and …