Sciweavers

17 search results - page 2 / 4
» Detecting deception in reputation management
Sort
View
OTM
2005
Springer
13 years 11 months ago
QoS-Based Service Selection and Ranking with Trust and Reputation Management
Abstract. QoS-based service selection mechanisms will play an essential role in service-oriented architectures, as e-Business applications want to use services that most accurately...
Le-Hung Vu, Manfred Hauswirth, Karl Aberer
CORR
2010
Springer
160views Education» more  CORR 2010»
13 years 6 months ago
A Semi-distributed Reputation Based Intrusion Detection System for Mobile Adhoc Networks
Abstract: A Mobile Adhoc Network (manet) is a cooperative engagement of a collection of mobile nodes without any centralized access point. The underlying concept of coordination am...
Animesh Kr Trivedi, Rajan Arora, Rishi Kapoor, Sud...
ATAL
2009
Springer
14 years 26 days ago
Comparing trust mechanisms for monitoring aggregator nodes in sensor networks
Sensor nodes are often used to collect data from locations inaccessible or hazardous for humans. As they are not under normal supervision, these nodes are particularly susceptible...
Oly Mistry, Anil Gürsel, Sandip Sen
WAC
2004
Springer
122views Communications» more  WAC 2004»
13 years 11 months ago
Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme
In this paper, we present a feedback-based system for managing trust and detecting malicious behavior in autonomically behaving networks. Like other distributed trust management sy...
Anurag Garg, Roberto Battiti, Gianni Costanzi
WISEC
2010
ACM
14 years 1 months ago
Automating the injection of believable decoys to detect snooping
We propose a novel trap-based architecture for enterprise networks that detects “silent” attackers who are eavesdropping network traffic. The primary contributions of our work...
Brian M. Bowen, Vasileios P. Kemerlis, Pratap V. P...