Sciweavers

361 search results - page 22 / 73
» A Vector Model of Trust for Developing Trustworthy Systems
Sort
View
ESORICS
2008
Springer
13 years 10 months ago
Symmetric Key Approaches to Securing BGP - A Little Bit Trust Is Enough
The Border Gateway Protocol (BGP) is the de facto inter-domain routing protocol that connects autonomous systems (ASes). Despite its importance for the Internet infrastructure, BGP...
Bezawada Bruhadeshwar, Sandeep S. Kulkarni, Alex X...
GLOBECOM
2008
IEEE
14 years 3 months ago
Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis
— Unwanted and malicious messages dominate Email traffic and pose a great threat to the utility of email communications. Reputation systems have been getting momentum as the sol...
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yan...
ATAL
2009
Springer
14 years 3 months ago
Adaptive learning in evolving task allocation networks
In this paper, we study multi-agent economic systems using a recent approach to economic modeling called Agent-based Computational Economics (ACE): the application of the Complex ...
Tomas Klos, Bart Nooteboom
AAMAS
2006
Springer
13 years 8 months ago
TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources
In many dynamic open systems, agents have to interact with one another to achieve their goals. Here, agents may be self-interested and when trusted to perform an action for another...
W. T. Luke Teacy, Jigar Patel, Nicholas R. Jenning...
ICSE
2007
IEEE-ACM
14 years 8 months ago
The CRUTIAL Architecture for Critical Information Infrastructures
Abstract. In this chapter we discuss the susceptibility of critical information infrastructures to computer-borne attacks and faults, mainly due to their largely computerized natur...
Paulo Veríssimo, Nuno Ferreira Neves, Migue...