A survey on trust modeling from a Bayesian perspective

B Liu - Wireless Personal Communications, 2020 - Springer
In this paper, we are concerned with trust modeling for agents in networked computing
systems. As trust is a subjective notion that is invisible, implicit and uncertain in nature, many …

Lightweight blockchain-assisted intrusion detection system in energy efficient MANETs

VR Sugumaran, A Rajaram - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
This paper focuses on achieving high-level security in Mobile Adhoc Networks (MANET) by
incorporating Blockchain technology-based Intrusion Detection systems (IDS). The existing …

Dandelion: A unified code offloading system for wearable computing

M Golkarifard, J Yang, Z Huang… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Execution speed seriously bothers application developers and users for wearable devices
such as Google Glass. Intensive applications like 3D games suffer from significant delays …

Kpsec: Secure end-to-end communications for multi-hop wireless networks

M Gharib, A Owfi, S Ghorbani - arXiv preprint arXiv:1911.05126, 2019 - arxiv.org
The security of cyber-physical systems, from self-driving cars to medical devices, depends
on their underlying multi-hop wireless networks. Yet, the lack of trusted central …

[PDF][PDF] An Anomaly-Based Intrusion Detection System with Multi-Dimensional Trust Parameters for Mobile Ad Hoc Network.

SV Yeruru, TR Rangaswamy - International Journal of Intelligent …, 2017 - inass.sakura.ne.jp
The distinctive aspect of Mobile Ad Hoc Networks (MANETs), including dynamic network
topology, susceptible wireless medium, limited battery power, network overhead are highly …

[图书][B] Reliable vehicle-to-vehicle weighted localization in vehicular networks

L Altoaimy - 2016 - search.proquest.com
Abstract Vehicular Ad Hoc Network (VANET) supports wireless communication among
vehicles using vehicle-to-vehicle (V2V) communication and between vehicles and …

[引用][C] Unnoticed Consent [Last Word]

B Schneier - IEEE Security and Privacy, 2018 - dl.acm.org
Unnoticed Consent [Last Word] | IEEE Security and Privacy skip to main content ACM Digital
Library home ACM home Google, Inc. (search) Advanced Search Browse About Sign in …