[1]
|
Trust node identification using game theory approach for routing in wireless sensor network
MATHEMATICS AND ITS APPLICATIONS IN TECHNOLOGY,
2024
DOI:10.1063/5.0224818
|
|
|
[2]
|
Trust Analysis to Identify Malicious Nodes in the Social Internet of Things
2023 International Conference on Software, Telecommunications and Computer Networks (SoftCOM),
2023
DOI:10.23919/SoftCOM58365.2023.10271601
|
|
|
[3]
|
A comprehensive review on trust management approaches in fog computing
Journal of Intelligent & Fuzzy Systems,
2023
DOI:10.3233/JIFS-232892
|
|
|
[4]
|
A detailed study on trust management techniques for security and privacy in IoT: challenges, trends, and research directions
High-Confidence Computing,
2023
DOI:10.1016/j.hcc.2023.100127
|
|
|
[5]
|
A Survey of Machine Learning for Information Processing and Networking
Journal of Machine and Computing,
2022
DOI:10.53759/7669/jmc202202023
|
|
|
[6]
|
Research Anthology on Architectures, Frameworks, and Integration Strategies for Distributed and Cloud Computing
2021
DOI:10.4018/978-1-7998-5339-8.ch109
|
|
|
[7]
|
Improving the Precision of Data by segregating Malicious Node from Sensor Network's
2021 5th International Conference on Intelligent Computing and Control Systems (ICICCS),
2021
DOI:10.1109/ICICCS51141.2021.9432194
|
|
|
[8]
|
Trust Evaluation Model Based on Statistical Tests in Social Network
2020 International Conference on Advanced Science and Engineering (ICOASE),
2020
DOI:10.1109/ICOASE51841.2020.9436543
|
|
|
[9]
|
HTMS: Fuzzy Based Hierarchical Trust Management Scheme in WSN
Wireless Personal Communications,
2020
DOI:10.1007/s11277-020-07092-w
|
|
|
[10]
|
Improved Trust Model based on Centrality Measures and Recommendation in Social Network
2020 4th International Conference on Electronics, Communication and Aerospace Technology (ICECA),
2020
DOI:10.1109/ICECA49313.2020.9297562
|
|
|
[11]
|
A Novel Trust Model for Secure Group Communication in Distributed Computing
Journal of Organizational and End User Computing,
2020
DOI:10.4018/JOEUC.2020070101
|
|
|
[12]
|
Ad Hoc Networks
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2019
DOI:10.1007/978-3-030-05888-3_13
|
|
|
[13]
|
Dynamic alternate buffer switching and congestion control in wireless multimedia sensor networks
Peer-to-Peer Networking and Applications,
2019
DOI:10.1007/s12083-019-00797-1
|
|
|
[14]
|
An efficient weighted trust‐based malicious node detection scheme for wireless sensor networks
International Journal of Communication Systems,
2019
DOI:10.1002/dac.3878
|
|
|
[15]
|
A cognitive chronometry strategy associated with a revised cloud model to deal with the dishonest recommendations attacks in wireless sensor networks
Journal of Network and Computer Applications,
2018
DOI:10.1016/j.jnca.2018.09.001
|
|
|
[16]
|
An efficient weighted trust-based malicious node detection scheme for wireless sensor networks
International Journal of Communication Systems,
2018
DOI:10.1002/dac.3878
|
|
|
[17]
|
Communications, Signal Processing, and Systems
Lecture Notes in Electrical Engineering,
2018
DOI:10.1007/978-981-10-3229-5_36
|
|
|
[18]
|
Trust analysis of WSN nodes based on fuzzy theory
International Journal of Computers and Applications,
2017
DOI:10.1080/1206212X.2017.1396430
|
|
|
[19]
|
Trust security mechanism for maritime wireless sensor networks
Concurrency and Computation: Practice and Experience,
2017
DOI:10.1002/cpe.3945
|
|
|
[20]
|
Trust security mechanism for maritime wireless sensor networks
Concurrency and Computation: Practice and Experience,
2016
DOI:10.1002/cpe.3945
|
|
|
[21]
|
Mobile Computing, Applications, and Services
Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering,
2015
DOI:10.1007/978-3-319-29003-4_8
|
|
|