Threat-modeling-guided trust-based task offloading for resource-constrained Internet of Things

M Bradbury, A Jhumka, T Watson, D Flores… - ACM Transactions on …, 2022 - dl.acm.org
There is an increasing demand for Internet of Things (IoT) networks consisting of resource-
constrained devices executing increasingly complex applications. Due to these resource …

Trust trackers for computation offloading in edge-based IoT networks

M Bradbury, A Jhumka, T Watson - IEEE INFOCOM 2021-IEEE …, 2021 - ieeexplore.ieee.org
Wireless Internet of Things (IoT) devices will be deployed to enable applications such as
sensing and actuation. These devices are typically resource-constrained and are unable to …

[HTML][HTML] Information management for trust computation on resource-constrained IoT devices

M Bradbury, A Jhumka, T Watson - Future Generation Computer Systems, 2022 - Elsevier
Abstract Resource-constrained Internet of Things (IoT) devices are executing increasingly
sophisticated applications that may require computational or memory intensive tasks to be …

Reasoning and interaction for social artificial intelligence

E Black, M Brandão, O Cocarascu… - AI …, 2022 - content.iospress.com
Current work on multi-agent systems at King's College London is extensive, though largely
based in two research groups within the Department of Informatics: the Distributed Artificial …

Proposal for an index measuring the reputation of open data portals: The Odapri

M Ortiz-de-Urbina-Criado… - Profesional de …, 2023 - revista.profesionaldelainformacion …
The demand for open data has led to the creation and the availability of numerous portals
releasing data. However, a large percentage of them are not properly designed for …

T-VLC: A Trust Model for Virtual Learning Communities

L Chamba-Eras, A Arruarte… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In the context of virtual learning communities (VLCs), where the participants may not know
each other, it is necessary to have a mechanism to help when deciding who to work with and …

Improving trust and reputation assessment with dynamic behaviour

C Player, N Griffiths - The Knowledge Engineering Review, 2020 - cambridge.org
Trust between agents in multi-agent systems (MASs) is critical to encourage high levels of
cooperation. Existing methods to assess trust and reputation use direct and indirect past …

Attributes and Dimensions of Trust in Secure Systems

M Bradbury, D Prince, V Marcinkiewicz… - Proceedings of the 12th …, 2022 - dl.acm.org
What is it to be trusted? This is an important question as trust is increasingly placed in a
system and the degree to which a system is trusted is increasingly being assessed …

Impact of social media on e-reputation–analysis of Marriott hotel chain in Algeria

N Bessouh, Y Grari… - Management and …, 2024 - management-journal.org.ua
This research aims to examine the impact of social media on the e-reputation of Marriott
hotels in Algeria, while focusing on electronic word-of-mouth. The main purpose is to …

[HTML][HTML] Experience-based access control in UbiComp: A new paradigm

NA Mhetre, AV Deshpande, PN Mahalle - Journal of Computer and …, 2022 - scirp.org
Experience is a sociological concept and builds over time. In a broader sense, the human-
centered equivalents of experience and trust apply to D2D interaction. Ubiquitous computing …