Author of the publication

Robust and scalable trust management for collaborative intrusion detection.

, , , and . Integrated Network Management, page 33-40. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Node Population in a Multi-Level 802.15.4 Sensor Network., , and . GLOBECOM, IEEE, (2006)GUIDEX: A Game-Theoretic Incentive-Based Mechanism for Intrusion Detection Networks., , , and . IEEE Journal on Selected Areas in Communications, 30 (11): 2220-2230 (2012)Design and management of collaborative intrusion detection networks., and . IM, page 955-961. IEEE, (2013)Enhancing Twitter spam accounts discovery using cross-account pattern mining., , and . IM, page 491-496. IEEE, (2015)A game-theoretic approach to rule sharing mechanism in networked intrusion detection systems: Robustness, incentives and security., , , and . CDC-ECE, page 243-248. IEEE, (2011)Effective Acquaintance Management based on Bayesian Learning for Distributed Intrusion Detection Networks., , and . IEEE Trans. Network and Service Management, 9 (3): 320-332 (2012)Dirichlet-Based Trust Management for Effective Collaborative Intrusion Detection Networks., , , and . IEEE Trans. Network and Service Management, 8 (2): 79-91 (2011)Demo: RecDroid: An Android Resource Access Permission Recommendation System., , , , , and . MobiHoc, page 403-404. ACM, (2015)Guest Editorial: Special issue on Next Generation Networks and Systems Security., and . J. Internet Serv. Inf. Secur., 5 (2): 1-3 (2015)ENSC: Multi-Resource Hybrid Scaling for Elastic Network Service Chain in Clouds., , , , and . ICPADS, page 34-41. IEEE, (2018)