To see the other types of publications on this topic, follow the link: Security and reputation aggregation.

Journal articles on the topic 'Security and reputation aggregation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Security and reputation aggregation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Piyush, Malviya* Mrs. Rekha Jain Mr. Manish Panchal. "RELIABLE DATA AGGREGATION INCLUDING SECURITY BASED ON AES AND FUNCTIONAL REPUTATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 681–88. https://doi.org/10.5281/zenodo.60118.

Full text
Abstract:
The wireless sensor network has an important role in the field of measurement and instrumentation. The many research activities on the WSN are going on for reliable and economic data communication. One of the important aspect in the WSN is energy efficient communication. In this regards, the cluster based protocol for data communication has become a standard choice for data communication. For this protocol, data aggregation for sensor data has been used in WSN to save the energy of cluster head. Security and trust are fundamental challenges in deployment of this technique in large wireless sen
APA, Harvard, Vancouver, ISO, and other styles
2

Li, Chaoran, and Yun Liu. "SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/105364.

Full text
Abstract:
Wireless sensor network is a self-organizing multihop network, which is composed of a large number of wireless sensor nodes and usually deployed in unattended environment to collect target information. At present, WSN is facing a growing range of security threats owing to its wireless and resource-constrained characteristics. Compromised sensor nodes can easily corrupt data accuracy and integrity by falsifying sensed information, selectively forwarding or misdirecting received data packets during the process of data aggregation. To solve these security problems, we propose a smart reputation-b
APA, Harvard, Vancouver, ISO, and other styles
3

Vimal, S., and S. K. Srivatsa. "A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (2017): 10.11591/ijece.v7i6.pp3515–3520. https://doi.org/10.11591/ijece.v7i6.pp3515-3520.

Full text
Abstract:
In order to evaluate the trustworthiness of participating peers in unstructured peer-to-peer networks, Reputation aggregation methods are used in this method. Each and every peer of the network will collect the local scores of each transaction and will compute global scores by aggregating all the local scores with the help of global scores, each individual peer can interact with its suitable peers. But the existing method will not consider the score of the new peer. In this condition, requests are handled by existing peers who leads to failure in downloading process. To rectify this, NP-TRUST
APA, Harvard, Vancouver, ISO, and other styles
4

Rudramurthy, Veeregowdanadoddi Chandraiah, and Ramalingappa Aparna. "Secure authentication and data aggregation scheme for routing packets in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3217–26. https://doi.org/10.11591/ijece.v13i3.pp3217-3226.

Full text
Abstract:
Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hence it is important to pro
APA, Harvard, Vancouver, ISO, and other styles
5

Veeregowdanadoddi Chandraiah, Rudramurthy, and Aparna Ramalingappa. "Secure authentication and data aggregation scheme for routing packets in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3217. http://dx.doi.org/10.11591/ijece.v13i3.pp3217-3226.

Full text
Abstract:
<span lang="EN-US">Wireless sensor networks (WSNs) comprise a huge number of sensors that sense real-time data; in general, WSNs are designed for monitoring in various application mainly internet of things based (IoT) application. Moreover, these sensors possess a certain amount of energy i.e., they are battery based; thus, the network model must be efficient. Furthermore, data aggregation is a mechanism that minimizes the energy; however, in addition, these aggregated data and networks can be subject to different types of attacks due to the vulnerable characteristics of the network. Hen
APA, Harvard, Vancouver, ISO, and other styles
6

Tchakounté, Franklin, Athanase Esdras Yera Pagor, Jean Claude Kamgang, and Marcellin Atemkeng. "CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews." Future Internet 12, no. 9 (2020): 145. http://dx.doi.org/10.3390/fi12090145.

Full text
Abstract:
To keep its business reliable, Google is concerned to ensure the quality of apps on the store. One crucial aspect concerning quality is security. Security is achieved through Google Play protect and anti-malware solutions. However, they are not totally efficient since they rely on application features and application execution threads. Google provides additional elements to enable consumers to collectively evaluate applications providing their experiences via reviews or showing their satisfaction through rating. The latter is more informal and hides details of rating whereas the former is text
APA, Harvard, Vancouver, ISO, and other styles
7

Shi, Quan, Lankai Wang, Yinxin Bao, and Chen Chen. "Blockchain-Driven Incentive Mechanism and Multi-Level Federated Learning Method for Behavior Detection in the Internet of Vehicles." Symmetry 17, no. 5 (2025): 669. https://doi.org/10.3390/sym17050669.

Full text
Abstract:
With the rapid advancement of intelligent transportation systems (ITSs), behavior detection within the Internet of Vehicles (IoVs) has become increasingly critical for maintaining system security and operational stability. However, existing detection approaches face significant challenges related to data privacy, node trustworthiness, and system transparency. To address these limitations, this study proposes a blockchain-driven federated learning framework for anomaly detection in IoV environments. A reputation evaluation mechanism is introduced to quantitatively assess the credibility and con
APA, Harvard, Vancouver, ISO, and other styles
8

Chen, Zunming, Hongyan Cui, Ensen Wu, and Xi Yu. "Dynamic Asynchronous Anti Poisoning Federated Deep Learning with Blockchain-Based Reputation-Aware Solutions." Sensors 22, no. 2 (2022): 684. http://dx.doi.org/10.3390/s22020684.

Full text
Abstract:
As promising privacy-preserving machine learning technology, federated learning enables multiple clients to train the joint global model via sharing model parameters. However, inefficiency and vulnerability to poisoning attacks significantly reduce federated learning performance. To solve the aforementioned issues, we propose a dynamic asynchronous anti poisoning federated deep learning framework to pursue both efficiency and security. This paper proposes a lightweight dynamic asynchronous algorithm considering the averaging frequency control and parameter selection for federated learning to s
APA, Harvard, Vancouver, ISO, and other styles
9

Thahniyath, Gousia, Priti Mishra, and Sundar Raj Moorthy. "Two phase secure data collection technique for wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 1 (2022): 512–20. https://doi.org/10.11591/ijeecs.v26.i1.pp512-520.

Full text
Abstract:
Wireless sensor networks (WSNs) are the sensors that are dispersed in a different location that can sense the accumulated data in real-time and send it to the central location for the process of data aggregation. During the transfer of the information using the data nodes from the WSNs to the central location, there may be chances that the data node could be compromised by sensor failure or by an attack from a malicious user. To overcome this problem, we propose a two-phase secure data collection (TPSDC) technique for wireless sensor networks which provides confidentiality and integrity for th
APA, Harvard, Vancouver, ISO, and other styles
10

Wang, Zhihua, Jiahao Liu, Chaoqi Guo, Shuailiang Hu, Yongjian Wang, and Xiaolong Yang. "An Efficient and Secure Malicious User Detection Scheme Based on Reputation Mechanism for Mobile Crowdsensing VANET." Wireless Communications and Mobile Computing 2021 (December 21, 2021): 1–16. http://dx.doi.org/10.1155/2021/5302257.

Full text
Abstract:
With the increasing development of wireless communication technology and Vehicular Ad hoc Network (VANET), as well as the continuous popularization of various sensors, Mobile Crowdsensing (MCS) paradigm has been widely concerned in the field of transportation. As a currently popular data sensing way, it mainly relies on wireless sensing devices to complete large-scale and complex sensing tasks. However, since vehicles are highly mobile in this scenario and the sensing system is open, that is, any vehicle equipped with sensing device can join the system, the credibility of all participating veh
APA, Harvard, Vancouver, ISO, and other styles
11

Zhu, Xu Ping. "Application in Data Fusion of Internet of Things Based on the KL Distance of Reputation Model." Advanced Materials Research 760-762 (September 2013): 587–91. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.587.

Full text
Abstract:
The Internet of Things is a bearer network based on the Internet, the traditional telecommunications network, wireless self-organizing networks etc, so that all can be individually addressable ordinary physical objects to achieve the interconnection network. The Internet of Things is evolved from the wireless sensor network, which has limited resource in energy, memory, calculation, bandwidth and etc,. In addition, many applications in the Internet of Things are related to user privacy. In the process of data collection and transmission, the data may be forged , tampered, and a variety of othe
APA, Harvard, Vancouver, ISO, and other styles
12

Almatarneh, Rami, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Fahd Alhamazani, and Ahmed Badi Alshammari. "An integrated AI-blockchain framework for securing web applications, mitigating SQL injection, model poisoning, and IoT spoofing attacks." International Journal of Innovative Research and Scientific Studies 8, no. 3 (2025): 2759–73. https://doi.org/10.53894/ijirss.v8i3.7077.

Full text
Abstract:
The rapid evolution of Web 4.0, characterized by decentralized systems, real-time data processing, and AI-driven interfaces, presents serious security threats such as SQL injection (SQLi) attacks, adversarial model poisoning, and IoT device spoofing. This paper presents a unified AI-blockchain framework designed to address these vulnerabilities, incorporating bidirectional LSTM networks for SQLi detection, Trimmed Mean aggregation with a reputation system for model poisoning defense, and CNN-based IoT authentication anchored to a decentralized blockchain. Evaluated on the Bitcoin OTC trust net
APA, Harvard, Vancouver, ISO, and other styles
13

Wei, Lijun, Jing Wu, and Chengnian Long. "A Blockchain-Based Hybrid Incentive Model for Crowdsensing." Electronics 9, no. 2 (2020): 215. http://dx.doi.org/10.3390/electronics9020215.

Full text
Abstract:
Crowdsensing is an emerging paradigm of data aggregation, which has a pivotal role in data-driven applications. By leveraging the recruitment, a crowdsensing system collects a large amount of data from mobile devices at a low cost. The critical issues in the development of crowdsensing are platform security, privacy protection, and incentive. However, the existing centralized, platform-based approaches suffer from the single point of failure which may result in data leakage. Besides, few previous studies have addressed the considerations of both the economic incentive and data quality. In this
APA, Harvard, Vancouver, ISO, and other styles
14

Xiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin, and Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.

Full text
Abstract:
Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an innovative way to implement ubiquitous social sensing. How to establish an effective mechanism to improve the participation of sensing users and the authenticity of sensing data, protect the users’ data privacy, and prevent malicious users from providing false data are among the urgent problems in mobile crowdsensing services in IoT. These issues raise a gargantuan challenge hindering the further development of mobile crowdsensing. In order to tackle the above issues, in this paper, we propose a reliable
APA, Harvard, Vancouver, ISO, and other styles
15

Oriola, Oluwafemi, Adesesan Barnabas Adeyemo, Maria Papadaki, and Eduan Kotzé. "A collaborative approach for national cybersecurity incident management." Information & Computer Security 29, no. 3 (2021): 457–84. http://dx.doi.org/10.1108/ics-02-2020-0027.

Full text
Abstract:
Purpose Collaborative-based national cybersecurity incident management benefits from the huge size of incident information, large-scale information security devices and aggregation of security skills. However, no existing collaborative approach has been able to cater for multiple regulators, divergent incident views and incident reputation trust issues that national cybersecurity incident management presents. This paper aims to propose a collaborative approach to handle these issues cost-effectively. Design/methodology/approach A collaborative-based national cybersecurity incident management a
APA, Harvard, Vancouver, ISO, and other styles
16

Milliff, Aidan. "Data security in human subjects research: new tools for qualitative and mixed-methods scholars." Qualitative & Multi-Method Research 19/20, no. 2/1 (2022): 31–39. https://doi.org/10.5281/zenodo.6448133.

Full text
Abstract:
Political science research in both qualitative and quantitative traditions frequently uses data that contain personal information about research participants. Personal information can enter the research process in different ways; sometimes researchers collect it directly via a survey or an interview, other times they gather it from an aggregator like a government agency or private company or semi-public sources like social media. In many cases, the personal data that political scientists collect is both personally-identifiable3 and sensitive, meaning that disclosure could expose respondents to
APA, Harvard, Vancouver, ISO, and other styles
17

Akinboro, S. A., E. A. Olajubu, I. K. Ogundoyin, and G. A. Aderounmu. "A Prototype for Global Trust Management in Mobile Ambient Home Network." International Journal of Advanced Pervasive and Ubiquitous Computing 6, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/ijapuc.2014070104.

Full text
Abstract:
This article developed a framework for trust management in mobile ambient home network with a view to secure the home devices and channel against attacks. The framework was design using mobile ad hoc network and social networking concept. The trust management, global reputation aggregation which considered the direct and indirect communication of home devices and remote devices was employed to shield home devices from attacks. While real time dynamic source routing protocol was employed to prevent the channel from attacks by selfish and malicious nodes. The prototype of the framework was imple
APA, Harvard, Vancouver, ISO, and other styles
18

Batool, Zahra, Kaiwen Zhang, and Matthew Toews. "Block-RACS: Towards Reputation-Aware Client Selection and Monetization Mechanism for Federated Learning." ACM SIGAPP Applied Computing Review 23, no. 3 (2023): 49–66. http://dx.doi.org/10.1145/3626307.3626311.

Full text
Abstract:
Federated Learning (FL) is a promising solution for training using data collected from heterogeneous sources (e.g., mobile devices) while avoiding the transmission of large amounts of raw data and preserving privacy. Current FL approaches operate in an iterative manner by selecting a subset of participants each round, asking them to training using their latest local data over the most recent version of the global model, before collecting these local model updates and aggregating them to form the next iteration of the global model, and so forth until convergence is reached. Unfortunately, exist
APA, Harvard, Vancouver, ISO, and other styles
19

Gangwani, Pranav, Alexander Perez-Pons, and Himanshu Upadhyay. "Evaluating Trust Management Frameworks for Wireless Sensor Networks." Sensors 24, no. 9 (2024): 2852. http://dx.doi.org/10.3390/s24092852.

Full text
Abstract:
Wireless Sensor Networks (WSNs) are crucial in various fields including Health Care Monitoring, Battlefield Surveillance, and Smart Agriculture. However, WSNs are susceptible to malicious attacks due to the massive quantity of sensors within them. Hence, there is a demand for a trust evaluation framework within WSNs to function as a secure system, to identify and isolate malicious or faulty sensor nodes. This information can be leveraged by neighboring nodes, to prevent collaboration in tasks like data aggregation and forwarding. While numerous trust frameworks have been suggested in the liter
APA, Harvard, Vancouver, ISO, and other styles
20

Sanapala, Ravi Kumar, and Srineevasa Rao Duggirala. "A Secure LEACH Protocol for Efficient CH Selection and Secure Data Communication in WSNs." International Journal of Computer Network and Information Security 14, no. 5 (2022): 82–93. http://dx.doi.org/10.5815/ijcnis.2022.05.07.

Full text
Abstract:
Due to the applications of wireless sensor networks (WSNs) in distinct fields, like civilian and military, environmental monitoring, and target tracking, etc., it became the important research area for researchers. Therefore, an efficient organization of network topology is needed for multi-hop data aggregation based on the energy constrained WSNs with large scale deployment for making the routing task simpler, balancing the load efficiently, and enhancing the network lifetime. The low-energy adaptive clustering hierarchy (LEACH) is an architecture of application-specific protocol, which is us
APA, Harvard, Vancouver, ISO, and other styles
21

Catonini, Emiliano, and Sergey Stepanov. "Reputation and information aggregation." Journal of Economic Behavior & Organization 208 (April 2023): 156–73. http://dx.doi.org/10.1016/j.jebo.2023.02.002.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Man, Da Peng, Ya Qiong Yang, Wu Yang, Wei Wang, and Shi Chang Xuan. "An Enforcing Integrity and Privacy-Preserving Data Aggregation Protocol in Wireless Sensor Network." Applied Mechanics and Materials 543-547 (March 2014): 3248–51. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3248.

Full text
Abstract:
It is important to ensure the integrity of the aggregation result and quality of communication among node in wireless sensor network in the condition of high-efficient privacy-preserving data aggregation mechanism. In this paper, we propose a method based on reputation model to solve this problem. During the process of data aggregation, the cluster head node will choose the node with max reputation value as collaborative node to accomplish the aggregation process. To show the efficacy and efficiency of this method, we present the simulation results. The simulation results show that our method
APA, Harvard, Vancouver, ISO, and other styles
23

Shanshan Song, Kai Hwang, Runfang Zhou, and Yu-Kwong Kwok. "Trusted P2P Transactions with Fuzzy Reputation Aggregation." IEEE Internet Computing 9, no. 6 (2005): 24–34. http://dx.doi.org/10.1109/mic.2005.136.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Liu, Xiao-Lu, and Chong Zhao. "A converging reputation ranking iteration method via the eigenvector." PLOS ONE 17, no. 10 (2022): e0274567. http://dx.doi.org/10.1371/journal.pone.0274567.

Full text
Abstract:
Ranking user reputation and object quality in online rating systems is of great significance for the construction of reputation systems. In this paper we put forward an iterative algorithm for ranking reputation and quality in terms of eigenvector, named EigenRank algorithm, where the user reputation and object quality interact and the user reputation converges to the eigenvector associated to the greatest eigenvalue of a certain matrix. In addition, we prove the convergence of EigenRank algorithm, and analyse the speed of convergence. Meanwhile, the experimental results for the synthetic netw
APA, Harvard, Vancouver, ISO, and other styles
25

Yang, Rong, and Dianhua Wang. "Hierarchical Aggregation for Reputation Feedback of Services Networks." Mathematical Problems in Engineering 2020 (May 7, 2020): 1–12. http://dx.doi.org/10.1155/2020/3748383.

Full text
Abstract:
Product ratings are popular tools to support buying decisions of consumers, which are also valuable for online retailers. In online marketplaces, vendors can use rating systems to build trust and reputation. To build trust, it is really important to evaluate the aggregate score for an item or a service. An accurate aggregation of ratings can embody the true quality of offerings, which is not only beneficial for providers in adjusting operation and sales tactics, but also helpful for consumers in discovery and purchase decisions. In this paper, we propose a hierarchical aggregation model for re
APA, Harvard, Vancouver, ISO, and other styles
26

Farooq, Umar, Antoine Nongaillard, Yacine Ouzrout, and Muhammad Abdul Qadir. "A Feature-Based Reputation Model for Product Evaluation." International Journal of Information Technology & Decision Making 15, no. 06 (2016): 1521–53. http://dx.doi.org/10.1142/s0219622016500358.

Full text
Abstract:
Knowing the strengths and weaknesses of a product is very important for manufacturers and customers to make decisions. Several sentiment analysis systems are proposed to determine the opinions of customers about products and product features. However, the aggregation methods used are not able to estimate a true reputation value and to reflect the recent opinions quickly. Most of these systems are based on single source and therefore suffer from availability and susceptibility issues. In this paper, we propose a multi-source reputation model where several aggregation methods are introduced in o
APA, Harvard, Vancouver, ISO, and other styles
27

Hou, Bochuan, Yang Xin, Hongliang Zhu, Yixian Yang, and Jianhua Yang. "VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain." Applied Sciences 13, no. 9 (2023): 5733. http://dx.doi.org/10.3390/app13095733.

Full text
Abstract:
Vehicle ad-hoc network (VANET) is interconnected through message forwarding and exchanging among vehicle nodes. Due to its highly dynamic topology and its wireless and heterogeneous communication mode, VANET is more vulnerable to security threats from multiple parties. Compared to entity-based security authentication, it is essential to consider how to protect the security of the data itself. Existing studies have evaluated the reliability of interactive data through reputation quantification, but there are still some issues in the design of secure reputation management schemes, such as its lo
APA, Harvard, Vancouver, ISO, and other styles
28

Nurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.

Full text
Abstract:
This research aims to understand the Influence of security, privacy, and reputation toward trust in online shopping consumer. The purpose of this research are: (1) the effect of security toward trust in online shopping consumer, (2) The effect of privacy toward trust in online shopping consumer, (3) The effect of reputation toward trust in online shopping consumer, (4) The effect of security, privacy, and reputation toward trust in online shopping consumer. The type of research used in this study was a causal quantitative research. The population in this study was citizens of Padang city, that
APA, Harvard, Vancouver, ISO, and other styles
29

STICKEL, SCOTT E. "Reputation and Performance Among Security Analysts." Journal of Finance 47, no. 5 (1992): 1811–36. http://dx.doi.org/10.1111/j.1540-6261.1992.tb04684.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Vinod, Desai, and A. Dinesh H. "Efficient Reputation-based Cyber Attack Detection Mechanism for Big Data Environment." Indian Journal of Science and Technology 15, no. 13 (2022): 592–602. https://doi.org/10.17485/IJST/v15i13.2102.

Full text
Abstract:
Abstract <strong>Objective:</strong>&nbsp;To reduce the cyber-attacks in IoT devices and also to provide security and reliable communication among the IoT devices and Edge servers, we have designed an Efficient Reputation-based Cyber-Attack Detection (ERCAD) mechanism for the Bigdata environment.&nbsp;<strong>Methods:</strong>&nbsp;This work presents an Efficient Reputation-based Cyber-Attack Detection (ERCAD) mechanism using the trust-based method. This work provides reliability and security by employing a trust-based security model and a feedback-based model. Moreover, to increase the networ
APA, Harvard, Vancouver, ISO, and other styles
31

Sang, Lanqin, and Henry Hexmoor. "Reputation-Based Consensus for Blockchain Technology in Smart Grid." International Journal of Network Security & Its Applications 14, no. 4 (2022): 15–37. http://dx.doi.org/10.5121/ijnsa.2022.14402.

Full text
Abstract:
Accurate and thorough measurement of all nodes' trustworthiness should create a safer network environment. We designed a blockchain-based, completely self-operated reputation system, R360, to enhance network security in decentralized network. R360 is a multi-factor measurement on the reputation of all nodes in the network. Specifically, a node's function, defense capability, quality of service provided, availability, malicious behavior, and resources are evaluated, providing a more accurate picture about a node's trustworthiness, which in turn should enhance the security of blockchain operatio
APA, Harvard, Vancouver, ISO, and other styles
32

Inversini, Alessandro. "Reputation in travel and tourism: a perspective article." Tourism Review 75, no. 1 (2019): 310–13. http://dx.doi.org/10.1108/tr-04-2019-0127.

Full text
Abstract:
Purpose This paper aims to discuss the evolution of the concept of reputation towards online reputation and real time reputation assessment and management. It starts by outline the role of reputation within the branding literature and explains the advantages of having a good (online) reputation. The final section looks into the future of reputation assessment and analysis introducing the concept of real time reputation assessment and management. Design/methodology/approach To compile this study, secondary research was conducted; relevant literature was presented in a narrative way to outline c
APA, Harvard, Vancouver, ISO, and other styles
33

Lanqin, Sang, and Hexmoor Henry. "Reputation-Based Consensus for Blockchain Technology in Smart Grid." International Journal of Network Security & Its Applications (IJNSA) 14, no. 4 (2022): 15–37. https://doi.org/10.5281/zenodo.6979147.

Full text
Abstract:
Accurate and thorough measurement of all nodes&rsquo; trustworthiness should create a safer network environment. We designed a blockchain-based, completely self-operated reputation system, R360, to enhance network security in decentralized network. R360 is a multi-factor measurement on the reputation of all nodes in the network. Specifically, a node&rsquo;s function, defense capability, quality of service provided, availability, malicious behavior, and resources are evaluated, providing a more accurate picture about a node&rsquo;s trustworthiness, which in turn should enhance the security of b
APA, Harvard, Vancouver, ISO, and other styles
34

He, Jingsha, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, and Wanqing Fu. "Reputation-Based Secure Sensor Localization in Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/308341.

Full text
Abstract:
Location information of sensor nodes in wireless sensor networks (WSNs) is very important, for it makes information that is collected and reported by the sensor nodes spatially meaningful for applications. Since most current sensor localization schemes rely on location information that is provided by beacon nodes for the regular sensor nodes to locate themselves, the accuracy of localization depends on the accuracy of location information from the beacon nodes. Therefore, the security and reliability of the beacon nodes become critical in the localization of regular sensor nodes. In this paper
APA, Harvard, Vancouver, ISO, and other styles
35

Afiah, Nur. "PENGARUH KEAMANAN, REPUTASI DAN PENGALAMAN TERHADAP TRUST PENGGUNA INTERNET UNTUK BERTRANSAKSI SECARA ONLINE." JEKPEND: Jurnal Ekonomi dan Pendidikan 1, no. 2 (2018): 58. http://dx.doi.org/10.26858/jekpend.v1i2.7256.

Full text
Abstract:
The aims of the research are to analyze to what extent the influence of security, reputation and experience on the trust of internet users for online interaction. The samples of the research were e-commerce users in Indonesia by taking the customers of one of the vendors of online shops, i.e. Lazada.co.id. The main instrument to collect the data was questionnaire measured by likert scale. The respondents consisted of 100 people. All questionnaires were given directly to respondents. Only 73 questionnaires were processed since 19 of them were not returned and 8 were not completed. The data were
APA, Harvard, Vancouver, ISO, and other styles
36

Aperjis, Christina, and Ramesh Johari. "Designing aggregation mechanisms for reputation systems in online marketplaces." ACM SIGecom Exchanges 9, no. 1 (2010): 1–4. http://dx.doi.org/10.1145/1980534.1980537.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Zhou, Xin, Yohei Murakami, Toru Ishida, Xuanzhe Liu, and Gang Huang. "ARM: Toward Adaptive and Robust Model for Reputation Aggregation." IEEE Transactions on Automation Science and Engineering 17, no. 1 (2020): 88–99. http://dx.doi.org/10.1109/tase.2019.2902407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Bachrach, Yoram, Ariel Parnes, Ariel D. Procaccia, and Jeffrey S. Rosenschein. "Gossip-based aggregation of trust in decentralized reputation systems." Autonomous Agents and Multi-Agent Systems 19, no. 2 (2008): 153–72. http://dx.doi.org/10.1007/s10458-008-9073-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
39

Panigrahi, Monalisa, Sourabh Bharti, and Arun Sharma. "A reputation-aware hierarchical aggregation framework for federated learning." Computers and Electrical Engineering 111 (October 2023): 108900. http://dx.doi.org/10.1016/j.compeleceng.2023.108900.

Full text
APA, Harvard, Vancouver, ISO, and other styles
40

Sisilia, Heng, Stella Octaviani Bustan, Arief Kristianto Lestadi, and Willy Gunadi. "Factors Toward Risk Influencing Millennials Willingness to Invest in Peer-to-Peer Lending." International Journal of Science and Society 6, no. 1 (2024): 695–708. http://dx.doi.org/10.54783/ijsoc.v6i1.1056.

Full text
Abstract:
The objective of this study is to analyze the factors influencing the risk perception that affects millennials' willingness to invest in P2P lending. To achieve this goal, a conceptual model was developed involving variables such as financial literacy, company reputation, information security awareness, risk perception, and intention to invest. The sample consisted of 220 respondents, and data were collected through a questionnaire. Structural Equation Modeling and SmartPLS Statistical Software were used to examine the data. The study’s results suggest that, while financial literacy does not s
APA, Harvard, Vancouver, ISO, and other styles
41

Алькема, Віктор. "METHODOLOGICAL APPROACHES TO ASSESSING THE BUSINESS REPUTATION OF AN ENTERPRISE: ENSURING ECONOMIC SECURITY AND SUSTAINABLE DEVELOPMENT." "Scientific notes of the University"KROK", no. 4(76) (December 31, 2024): 90–95. https://doi.org/10.31732/2663-2209-2024-76-90-95.

Full text
Abstract:
In the modern competitive environment, business reputation is one of the key intangible assets of enterprises, which affects the trust of consumers, investors and partners. It provides economic security, contributes to sustainable development and the formation of competitive advantages. Given the importance of reputation, the need for effective methods for its assessment and management is growing. The article is aimed at systematizing methodological approaches to assessing the business reputation of enterprises, determining their impact on economic security and sustainable development, as well
APA, Harvard, Vancouver, ISO, and other styles
42

Sun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.

Full text
Abstract:
Purpose – As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security thr
APA, Harvard, Vancouver, ISO, and other styles
43

Vinod, Veeramachaneni. "Enhancing IoT Security with Dynamic Reputation-Based Trust Management." Recent Innovations in Wireless Network Security 7, no. 1 (2024): 27–44. https://doi.org/10.5281/zenodo.14168511.

Full text
Abstract:
<em>&nbsp;</em><em>The exponential growth of the Internet of Things (IoT) has raised significant security concerns, particularly in managing trust among heterogeneous devices in dynamic environments. This paper proposes a Dynamic Reputation-Based Trust Management (DRBTM) system to enhance security across IoT networks by leveraging reputation scores to assess and manage device trustworthiness. The DRBTM system dynamically updates trust values based on device behavior and reputation ratings, allowing for adaptive responses to potential threats. Our approach incorporates a reputation update algor
APA, Harvard, Vancouver, ISO, and other styles
44

Живко, Зінаїда, Михайло Живко, and Анастасія Шегинська. "THE PROBLEM OF BUSINESS REPUTATION AS AN INDICATOR OF ECONOMIC SECURITY OF BUSINESS." "Scientific notes of the University"KROK", no. 4(76) (December 31, 2024): 104–13. https://doi.org/10.31732/2663-2209-2024-76-104-113.

Full text
Abstract:
The article is devoted to the study of the problems of business reputation as an important tool of economic security of business. The purpose of the study is to define the role of business reputation as an indicator of economic security of business, as well as to analyze the problems that arise during its formation and maintenance. The study is aimed at identifying key factors affecting reputation and developing recommendations for companies to improve their reputation policy. The main methods used in the research were the method of comparative analysis, generalization, as well as the visualiz
APA, Harvard, Vancouver, ISO, and other styles
45

Dhurandher, Sanjay K., Mohammad S. Obaidat, Amrit Jaiswal, Akanksha Tiwari, and Ankur Tyagi. "Vehicular Security Through Reputation and Plausibility Checks." IEEE Systems Journal 8, no. 2 (2014): 384–94. http://dx.doi.org/10.1109/jsyst.2013.2245971.

Full text
APA, Harvard, Vancouver, ISO, and other styles
46

Subathra, G., and A. Antonidoss. "Reputation Based Fault Tolerance in Blockchain Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (2020): 2402–4. http://dx.doi.org/10.1166/jctn.2020.8903.

Full text
Abstract:
The Blockchain technology brings a rapid growth in the industry, It emphasizes the service to lead the complexity of software and malicious attack in the network. This technology is used to monitor the highly vulnerable services and it is used to increase the complexity of the warehouse data. It assures the security and consistency of data, The warehouse data has been replicated the availability and the enhancement of security in the services. This technology originated from internet sector as a decentralized, distributed ledger for data transaction. Nowadays, it is visualised as a backbone or
APA, Harvard, Vancouver, ISO, and other styles
47

Sushchenko, Olena, Olena Akhmedova, and Ivan Yermakov. "The Impact of Reputation on the Restaurant`s Safety and Security." Central Ukrainian Scientific Bulletin. Economic Sciences, no. 10(43) (2023): 88–98. http://dx.doi.org/10.32515/2663-1636.2023.10(43).88-98.

Full text
Abstract:
Within the context of everyday life, there is a huge demand for reducing any risks associated with life, leisure and work. That is why people are increasingly trusting only those businesses that try to minimize risks and ensure safety by all possible means, thus creating a positive reputation in their field of operation. Therefore, the content of the category “reputation” of the restaurant enterprises as the basis of its image formation and its influence on the restaurant`s safety and security in conditions of uncertainty have been disclosed in the paper. The largest restaurant chains in the c
APA, Harvard, Vancouver, ISO, and other styles
48

ABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks, although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between
APA, Harvard, Vancouver, ISO, and other styles
49

Bahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.

Full text
Abstract:
Even in difficult places to reach, the new networking technique allows the easy deployment of sensor networks although these wireless sensor networks confront a lot of constraints. The major constraint is related to the quality of information sent by the network. The wireless sensor networks use different methods to achieve data to the base station. Data aggregation is an important one, used by these wireless sensor networks. But this aggregated data can be subject to several types of attacks and provides security is necessary to resist against malicious attacks, secure communication between s
APA, Harvard, Vancouver, ISO, and other styles
50

K.K.Baseer. "Trust based Reputation Framework for Data Security in Cloud Environment." Journal of Electrical Systems 20, no. 7s (2024): 1102–10. http://dx.doi.org/10.52783/jes.3603.

Full text
Abstract:
Cloud computing relies on the Internet and is susceptible to numerous attacks, hence security is the most significant issue.It takes a long time to create trust values for trust authority and cloud servers.Research into trust relationships and trust-based security mechanisms in cloud environments is important because trust has been regarded as a security relationship that is more important than authorization.In a cloud computing environment, trust should exist between cloud users and service providers.As a result, a trust-based reputation framework with fuzzy rules for cloud data security is p
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!