Mobile ad hoc networks consist of mobile wireless devices which autonomously organize their infrastructure. In such a network, a central issue, ensured by routing protocols, is to ...
Abstract. The security of any computer system that is configured or operated by human beings critically depends on the information conveyed by the user interface, the decisions of...
Representing the impact of external factors on the behaviour of a system is a challenge for modellers, particularly when these factors are dynamic and may change during the simulat...
In this paper, we propose a new quantitative trust model for argumentation-based negotiating agents. The purpose of such a model is to provide a secure environment for agent negot...
Secure software engineering is a new research area that has been proposed to address security issues during the development of software systems. This new area of research advocates...