Author of the publication

Robust and scalable trust management for collaborative intrusion detection.

, , , and . Integrated Network Management, page 33-40. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Approach on Detecting Attack Based on Causality in Network Behavior., , , and . CSSE (3), page 947-950. IEEE Computer Society, (2008)978-0-7695-3336-0.Strategic Alliance via Co-Opetition: Supply Chain Partnership with a Competitor., and . HICSS, page 1-10. IEEE Computer Society, (2010)Globally Convergent Inexact Smoothing Newton Method for SOCCP., and . NL-MUA, volume 100 of Advances in Intelligent and Soft Computing, page 427-434. Springer, (2011)Model Checking for SpaceWire Link Interface Design Using Uppaal., , , , , and . COMPSAC Workshops, page 181-186. IEEE Computer Society, (2013)Secure Distributed Key Generation on Vector Space Access Structures in Bilinear Groups., and . INCoS, page 803-808. IEEE, (2013)SARC: subjectivity alignment for reputation computation., , , and . AAMAS, page 1365-1366. IFAAMAS, (2012)Robustness evaluation of incentive mechanisms., and . AAMAS, page 1293-1294. IFAAMAS, (2013)A biclustering-based approach to filter dishonest advisors in multi-criteria e-marketplaces., , and . AAMAS, page 1385-1386. IFAAMAS/ACM, (2014)A practical robustness measure of incentive mechanisms., , , and . AAMAS, page 1379-1380. IFAAMAS/ACM, (2014)The Fallacy of Endogenous Discounting of Trust Recommendations., , and . AAMAS, page 563-572. ACM, (2015)