A survey on trust modeling from a Bayesian perspective
B Liu - Wireless Personal Communications, 2020 - Springer
In this paper, we are concerned with trust modeling for agents in networked computing
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …
Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs
VR Sugumaran, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …
Dandelion: A unified code offloading system for wearable computing
M Golkarifard, J Yang, Z Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Execution speed seriously bothers application developers and users for wearable devices
such as Google Glass. Intensive applications like 3D games suffer from significant delays …
such as Google Glass. Intensive applications like 3D games suffer from significant delays …
Kpsec: Secure end-to-end communications for multi-hop wireless networks
The security of cyber-physical systems, from self-driving cars to medical devices, depends
on their underlying multi-hop wireless networks. Yet, the lack of trusted central …
on their underlying multi-hop wireless networks. Yet, the lack of trusted central …
[PDF][PDF] An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network.
SV Yeruru, TR Rangaswamy - International Journal of Intelligent …, 2017 - inass.sakura.ne.jp
The distinctive aspect of Mobile Ad Hoc Networks (MANETs), including dynamic network
topology, susceptible wireless medium, limited battery power, network overhead are highly …
topology, susceptible wireless medium, limited battery power, network overhead are highly …
[图书][B] Reliable vehicle-to-vehicle weighted localization in vehicular networks
L Altoaimy - 2016 - search.proquest.com
Abstract Vehicular Ad Hoc Network (VANET) supports wireless communication among
vehicles using vehicle-to-vehicle (V2V) communication and between vehicles and …
vehicles using vehicle-to-vehicle (V2V) communication and between vehicles and …
[引用][C] Unnoticed Consent [Last Word]
B Schneier - IEEE Security and Privacy, 2018 - dl.acm.org
Unnoticed Consent [Last Word] | IEEE Security and Privacy skip to main content ACM Digital
Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …
Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …