Journal articles on the topic 'Security and reputation aggregation'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Security and reputation aggregation.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Piyush, Malviya* Mrs. Rekha Jain Mr. Manish Panchal. "RELIABLE DATA AGGREGATION INCLUDING SECURITY BASED ON AES AND FUNCTIONAL REPUTATION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 5, no. 8 (2016): 681–88. https://doi.org/10.5281/zenodo.60118.
Full textLi, Chaoran, and Yun Liu. "SRDA: Smart Reputation-Based Data Aggregation Protocol for Wireless Sensor Network." International Journal of Distributed Sensor Networks 2015 (2015): 1–10. http://dx.doi.org/10.1155/2015/105364.
Full textVimal, S., and S. K. Srivatsa. "A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (2017): 10.11591/ijece.v7i6.pp3515–3520. https://doi.org/10.11591/ijece.v7i6.pp3515-3520.
Full textRudramurthy, Veeregowdanadoddi Chandraiah, and Ramalingappa Aparna. "Secure authentication and data aggregation scheme for routing packets in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3217–26. https://doi.org/10.11591/ijece.v13i3.pp3217-3226.
Full textVeeregowdanadoddi Chandraiah, Rudramurthy, and Aparna Ramalingappa. "Secure authentication and data aggregation scheme for routing packets in wireless sensor network." International Journal of Electrical and Computer Engineering (IJECE) 13, no. 3 (2023): 3217. http://dx.doi.org/10.11591/ijece.v13i3.pp3217-3226.
Full textTchakounté, Franklin, Athanase Esdras Yera Pagor, Jean Claude Kamgang, and Marcellin Atemkeng. "CIAA-RepDroid: A Fine-Grained and Probabilistic Reputation Scheme for Android Apps Based on Sentiment Analysis of Reviews." Future Internet 12, no. 9 (2020): 145. http://dx.doi.org/10.3390/fi12090145.
Full textShi, Quan, Lankai Wang, Yinxin Bao, and Chen Chen. "Blockchain-Driven Incentive Mechanism and Multi-Level Federated Learning Method for Behavior Detection in the Internet of Vehicles." Symmetry 17, no. 5 (2025): 669. https://doi.org/10.3390/sym17050669.
Full textChen, Zunming, Hongyan Cui, Ensen Wu, and Xi Yu. "Dynamic Asynchronous Anti Poisoning Federated Deep Learning with Blockchain-Based Reputation-Aware Solutions." Sensors 22, no. 2 (2022): 684. http://dx.doi.org/10.3390/s22020684.
Full textThahniyath, Gousia, Priti Mishra, and Sundar Raj Moorthy. "Two phase secure data collection technique for wireless sensor networks." Indonesian Journal of Electrical Engineering and Computer Science 26, no. 1 (2022): 512–20. https://doi.org/10.11591/ijeecs.v26.i1.pp512-520.
Full textWang, Zhihua, Jiahao Liu, Chaoqi Guo, Shuailiang Hu, Yongjian Wang, and Xiaolong Yang. "An Efficient and Secure Malicious User Detection Scheme Based on Reputation Mechanism for Mobile Crowdsensing VANET." Wireless Communications and Mobile Computing 2021 (December 21, 2021): 1–16. http://dx.doi.org/10.1155/2021/5302257.
Full textZhu, Xu Ping. "Application in Data Fusion of Internet of Things Based on the KL Distance of Reputation Model." Advanced Materials Research 760-762 (September 2013): 587–91. http://dx.doi.org/10.4028/www.scientific.net/amr.760-762.587.
Full textAlmatarneh, Rami, Mohammad Aljaidi, Ayoub Alsarhan, Sami Aziz Alshammari, Fahd Alhamazani, and Ahmed Badi Alshammari. "An integrated AI-blockchain framework for securing web applications, mitigating SQL injection, model poisoning, and IoT spoofing attacks." International Journal of Innovative Research and Scientific Studies 8, no. 3 (2025): 2759–73. https://doi.org/10.53894/ijirss.v8i3.7077.
Full textWei, Lijun, Jing Wu, and Chengnian Long. "A Blockchain-Based Hybrid Incentive Model for Crowdsensing." Electronics 9, no. 2 (2020): 215. http://dx.doi.org/10.3390/electronics9020215.
Full textXiong, Jinbo, Rong Ma, Lei Chen, Youliang Tian, Li Lin, and Biao Jin. "Achieving Incentive, Security, and Scalable Privacy Protection in Mobile Crowdsensing Services." Wireless Communications and Mobile Computing 2018 (August 12, 2018): 1–12. http://dx.doi.org/10.1155/2018/8959635.
Full textOriola, Oluwafemi, Adesesan Barnabas Adeyemo, Maria Papadaki, and Eduan Kotzé. "A collaborative approach for national cybersecurity incident management." Information & Computer Security 29, no. 3 (2021): 457–84. http://dx.doi.org/10.1108/ics-02-2020-0027.
Full textMilliff, Aidan. "Data security in human subjects research: new tools for qualitative and mixed-methods scholars." Qualitative & Multi-Method Research 19/20, no. 2/1 (2022): 31–39. https://doi.org/10.5281/zenodo.6448133.
Full textAkinboro, S. A., E. A. Olajubu, I. K. Ogundoyin, and G. A. Aderounmu. "A Prototype for Global Trust Management in Mobile Ambient Home Network." International Journal of Advanced Pervasive and Ubiquitous Computing 6, no. 3 (2014): 54–71. http://dx.doi.org/10.4018/ijapuc.2014070104.
Full textBatool, Zahra, Kaiwen Zhang, and Matthew Toews. "Block-RACS: Towards Reputation-Aware Client Selection and Monetization Mechanism for Federated Learning." ACM SIGAPP Applied Computing Review 23, no. 3 (2023): 49–66. http://dx.doi.org/10.1145/3626307.3626311.
Full textGangwani, Pranav, Alexander Perez-Pons, and Himanshu Upadhyay. "Evaluating Trust Management Frameworks for Wireless Sensor Networks." Sensors 24, no. 9 (2024): 2852. http://dx.doi.org/10.3390/s24092852.
Full textSanapala, Ravi Kumar, and Srineevasa Rao Duggirala. "A Secure LEACH Protocol for Efficient CH Selection and Secure Data Communication in WSNs." International Journal of Computer Network and Information Security 14, no. 5 (2022): 82–93. http://dx.doi.org/10.5815/ijcnis.2022.05.07.
Full textCatonini, Emiliano, and Sergey Stepanov. "Reputation and information aggregation." Journal of Economic Behavior & Organization 208 (April 2023): 156–73. http://dx.doi.org/10.1016/j.jebo.2023.02.002.
Full textMan, Da Peng, Ya Qiong Yang, Wu Yang, Wei Wang, and Shi Chang Xuan. "An Enforcing Integrity and Privacy-Preserving Data Aggregation Protocol in Wireless Sensor Network." Applied Mechanics and Materials 543-547 (March 2014): 3248–51. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3248.
Full textShanshan Song, Kai Hwang, Runfang Zhou, and Yu-Kwong Kwok. "Trusted P2P Transactions with Fuzzy Reputation Aggregation." IEEE Internet Computing 9, no. 6 (2005): 24–34. http://dx.doi.org/10.1109/mic.2005.136.
Full textLiu, Xiao-Lu, and Chong Zhao. "A converging reputation ranking iteration method via the eigenvector." PLOS ONE 17, no. 10 (2022): e0274567. http://dx.doi.org/10.1371/journal.pone.0274567.
Full textYang, Rong, and Dianhua Wang. "Hierarchical Aggregation for Reputation Feedback of Services Networks." Mathematical Problems in Engineering 2020 (May 7, 2020): 1–12. http://dx.doi.org/10.1155/2020/3748383.
Full textFarooq, Umar, Antoine Nongaillard, Yacine Ouzrout, and Muhammad Abdul Qadir. "A Feature-Based Reputation Model for Product Evaluation." International Journal of Information Technology & Decision Making 15, no. 06 (2016): 1521–53. http://dx.doi.org/10.1142/s0219622016500358.
Full textHou, Bochuan, Yang Xin, Hongliang Zhu, Yixian Yang, and Jianhua Yang. "VANET Secure Reputation Evaluation & Management Model Based on Double Layer Blockchain." Applied Sciences 13, no. 9 (2023): 5733. http://dx.doi.org/10.3390/app13095733.
Full textNurhatinah, Nurhatinah. "PENGARUH KEAMANAN, PRIVASI, DAN REPUTASI TERHADAP KEPERCAYAAN KONSUMEN ONLINE SHOPPING DI KOTA PADANG." Jurnal Ecogen 1, no. 4 (2018): 206. http://dx.doi.org/10.24036/jmpe.v1i1.4740.
Full textSTICKEL, SCOTT E. "Reputation and Performance Among Security Analysts." Journal of Finance 47, no. 5 (1992): 1811–36. http://dx.doi.org/10.1111/j.1540-6261.1992.tb04684.x.
Full textVinod, Desai, and A. Dinesh H. "Efficient Reputation-based Cyber Attack Detection Mechanism for Big Data Environment." Indian Journal of Science and Technology 15, no. 13 (2022): 592–602. https://doi.org/10.17485/IJST/v15i13.2102.
Full textSang, Lanqin, and Henry Hexmoor. "Reputation-Based Consensus for Blockchain Technology in Smart Grid." International Journal of Network Security & Its Applications 14, no. 4 (2022): 15–37. http://dx.doi.org/10.5121/ijnsa.2022.14402.
Full textInversini, Alessandro. "Reputation in travel and tourism: a perspective article." Tourism Review 75, no. 1 (2019): 310–13. http://dx.doi.org/10.1108/tr-04-2019-0127.
Full textLanqin, Sang, and Hexmoor Henry. "Reputation-Based Consensus for Blockchain Technology in Smart Grid." International Journal of Network Security & Its Applications (IJNSA) 14, no. 4 (2022): 15–37. https://doi.org/10.5281/zenodo.6979147.
Full textHe, Jingsha, Jing Xu, Xingye Zhu, Yuqiang Zhang, Ting Zhang, and Wanqing Fu. "Reputation-Based Secure Sensor Localization in Wireless Sensor Networks." Scientific World Journal 2014 (2014): 1–10. http://dx.doi.org/10.1155/2014/308341.
Full textAfiah, Nur. "PENGARUH KEAMANAN, REPUTASI DAN PENGALAMAN TERHADAP TRUST PENGGUNA INTERNET UNTUK BERTRANSAKSI SECARA ONLINE." JEKPEND: Jurnal Ekonomi dan Pendidikan 1, no. 2 (2018): 58. http://dx.doi.org/10.26858/jekpend.v1i2.7256.
Full textAperjis, Christina, and Ramesh Johari. "Designing aggregation mechanisms for reputation systems in online marketplaces." ACM SIGecom Exchanges 9, no. 1 (2010): 1–4. http://dx.doi.org/10.1145/1980534.1980537.
Full textZhou, Xin, Yohei Murakami, Toru Ishida, Xuanzhe Liu, and Gang Huang. "ARM: Toward Adaptive and Robust Model for Reputation Aggregation." IEEE Transactions on Automation Science and Engineering 17, no. 1 (2020): 88–99. http://dx.doi.org/10.1109/tase.2019.2902407.
Full textBachrach, Yoram, Ariel Parnes, Ariel D. Procaccia, and Jeffrey S. Rosenschein. "Gossip-based aggregation of trust in decentralized reputation systems." Autonomous Agents and Multi-Agent Systems 19, no. 2 (2008): 153–72. http://dx.doi.org/10.1007/s10458-008-9073-6.
Full textPanigrahi, Monalisa, Sourabh Bharti, and Arun Sharma. "A reputation-aware hierarchical aggregation framework for federated learning." Computers and Electrical Engineering 111 (October 2023): 108900. http://dx.doi.org/10.1016/j.compeleceng.2023.108900.
Full textSisilia, Heng, Stella Octaviani Bustan, Arief Kristianto Lestadi, and Willy Gunadi. "Factors Toward Risk Influencing Millennials Willingness to Invest in Peer-to-Peer Lending." International Journal of Science and Society 6, no. 1 (2024): 695–708. http://dx.doi.org/10.54783/ijsoc.v6i1.1056.
Full textАлькема, Віктор. "METHODOLOGICAL APPROACHES TO ASSESSING THE BUSINESS REPUTATION OF AN ENTERPRISE: ENSURING ECONOMIC SECURITY AND SUSTAINABLE DEVELOPMENT." "Scientific notes of the University"KROK", no. 4(76) (December 31, 2024): 90–95. https://doi.org/10.31732/2663-2209-2024-76-90-95.
Full textSun, Po-Ling, and Cheng-Yuan Ku. "Review of threats on trust and reputation models." Industrial Management & Data Systems 114, no. 3 (2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Full textVinod, Veeramachaneni. "Enhancing IoT Security with Dynamic Reputation-Based Trust Management." Recent Innovations in Wireless Network Security 7, no. 1 (2024): 27–44. https://doi.org/10.5281/zenodo.14168511.
Full textЖивко, Зінаїда, Михайло Живко, and Анастасія Шегинська. "THE PROBLEM OF BUSINESS REPUTATION AS AN INDICATOR OF ECONOMIC SECURITY OF BUSINESS." "Scientific notes of the University"KROK", no. 4(76) (December 31, 2024): 104–13. https://doi.org/10.31732/2663-2209-2024-76-104-113.
Full textDhurandher, Sanjay K., Mohammad S. Obaidat, Amrit Jaiswal, Akanksha Tiwari, and Ankur Tyagi. "Vehicular Security Through Reputation and Plausibility Checks." IEEE Systems Journal 8, no. 2 (2014): 384–94. http://dx.doi.org/10.1109/jsyst.2013.2245971.
Full textSubathra, G., and A. Antonidoss. "Reputation Based Fault Tolerance in Blockchain Networks." Journal of Computational and Theoretical Nanoscience 17, no. 5 (2020): 2402–4. http://dx.doi.org/10.1166/jctn.2020.8903.
Full textSushchenko, Olena, Olena Akhmedova, and Ivan Yermakov. "The Impact of Reputation on the Restaurant`s Safety and Security." Central Ukrainian Scientific Bulletin. Economic Sciences, no. 10(43) (2023): 88–98. http://dx.doi.org/10.32515/2663-1636.2023.10(43).88-98.
Full textABIDI, Bahae, Abdelillah JILBAB, and Mohamed EL HAZITI. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13. http://dx.doi.org/10.11591/ijict.v8i1.pp13-18.
Full textBahae, Abidi, Jilbab Abdelillah, and El Haziti Mohamed. "Security in wireless sensor networks." International Journal of Informatics and Communication Technology (IJ-ICT) 8, no. 1 (2019): 13–18. https://doi.org/10.11591/ijict.v8i1.pp13-18.
Full textK.K.Baseer. "Trust based Reputation Framework for Data Security in Cloud Environment." Journal of Electrical Systems 20, no. 7s (2024): 1102–10. http://dx.doi.org/10.52783/jes.3603.
Full text