Artykuły w czasopismach na temat „Trust models requirements”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Trust models requirements”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Lee, Hyo-Cheol, i Seok-Won Lee. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems". Sensors 23, nr 10 (10.05.2023): 4622. http://dx.doi.org/10.3390/s23104622.
Pełny tekst źródłaTikhvinskiy, Valery O., Grigory Bochechka i Andrey Gryazev. "QoS Requirements as Factor of Trust to 5G Network". Journal of Telecommunications and Information Technology, nr 1 (30.03.2016): 3–8. http://dx.doi.org/10.26636/jtit.2016.1.697.
Pełny tekst źródłaHussein, Aya, Sondoss Elsawah i Hussein Abbass. "A System Dynamics Model for Human Trust in Automation under Speed and Accuracy Requirements". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, nr 1 (listopad 2019): 822–26. http://dx.doi.org/10.1177/1071181319631167.
Pełny tekst źródłaWang, Jingpei, i Jie Liu. "The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios". Journal of Electrical and Computer Engineering 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/4361719.
Pełny tekst źródłaAyed, Samiha, Lamia Chaari i Amina Fares. "A Survey on Trust Management for WBAN: Investigations and Future Directions". Sensors 20, nr 21 (23.10.2020): 6041. http://dx.doi.org/10.3390/s20216041.
Pełny tekst źródłaSun, Po-Ling, i Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, nr 3 (8.04.2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Pełny tekst źródłaSoni, Sonam. "Reliable Trust Computation model in Vehicular ad-hoc Network". American Journal of Advanced Computing 1, nr 3 (1.07.2020): 1–5. http://dx.doi.org/10.15864/ajac.1304.
Pełny tekst źródłaAsiri, Ahmad Yahya, i Sultan S. Alshamrani. "Performance Evaluation of a B2C Model Based on Trust Requirements and Factors". Scientific Programming 2021 (26.05.2021): 1–10. http://dx.doi.org/10.1155/2021/9935849.
Pełny tekst źródłaKulaklıoğlu, Duru. "Explainable AI: Enhancing Interpretability of Machine Learning Models". Human Computer Interaction 8, nr 1 (6.12.2024): 91. https://doi.org/10.62802/z3pde490.
Pełny tekst źródłaKapse, Smita, Latesh Malik i Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS". ASEAN Engineering Journal 14, nr 2 (31.05.2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Pełny tekst źródłaGupta, Punit, i Deepika Agrawal. "Trusted Cloud Platform for Cloud Infrastructure". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, nr 8 (30.08.2013): 1884–91. http://dx.doi.org/10.24297/ijct.v10i8.1473.
Pełny tekst źródłaSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain i Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review". Sustainability 14, nr 18 (7.09.2022): 11213. http://dx.doi.org/10.3390/su141811213.
Pełny tekst źródłaMohammad, Abdulghafour. "Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review". Journal of Cybersecurity and Privacy 2, nr 1 (4.03.2022): 107–23. http://dx.doi.org/10.3390/jcp2010008.
Pełny tekst źródłaWang, Jiuru, Zhiyuan Wang, Jingcheng Song i Hongyuan Cheng. "Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV". Electronics 12, nr 23 (29.11.2023): 4825. http://dx.doi.org/10.3390/electronics12234825.
Pełny tekst źródłaSenan Mahmod Attar Bashi, Zainab, i Shayma Senan. "A Comprehensive Review of Zero Trust Network Architecture (ZTNA) and Deployment Frameworks". International Journal on Perceptive and Cognitive Computing 11, nr 1 (30.01.2025): 148–53. https://doi.org/10.31436/ijpcc.v11i1.494.
Pełny tekst źródłaBaslyman, Malak, Daniel Amyot i John Mylopoulos. "Reasoning about Confidence in Goal Satisfaction". Algorithms 15, nr 10 (23.09.2022): 343. http://dx.doi.org/10.3390/a15100343.
Pełny tekst źródłaBrazhuk, A. I., i E. V. Olizarovich. "Towards the computer systems design based on Zero Trust Architecture". Informatics 21, nr 4 (30.12.2024): 85–98. https://doi.org/10.37661/1816-0301-2024-21-4-85-98.
Pełny tekst źródłaKrul, Evan, Hye-young Paik, Sushmita Ruj i Salil S. Kanhere. "SoK: Trusting Self-Sovereign Identity". Proceedings on Privacy Enhancing Technologies 2024, nr 3 (lipiec 2024): 297–313. http://dx.doi.org/10.56553/popets-2024-0079.
Pełny tekst źródłaFarayola, Michael Mayowa, Irina Tal, Regina Connolly, Takfarinas Saber i Malika Bendechache. "Ethics and Trustworthiness of AI for Predicting the Risk of Recidivism: A Systematic Literature Review". Information 14, nr 8 (27.07.2023): 426. http://dx.doi.org/10.3390/info14080426.
Pełny tekst źródłaArora, Shakti, i Surjeet Dalal. "Trust Evaluation Factors in Cloud Computing with Open Stack". Journal of Computational and Theoretical Nanoscience 16, nr 12 (1.12.2019): 5073–77. http://dx.doi.org/10.1166/jctn.2019.8566.
Pełny tekst źródłaKang, Hongzhaoning, Gang Liu, Quan Wang, Lei Meng i Jing Liu. "Theory and Application of Zero Trust Security: A Brief Survey". Entropy 25, nr 12 (28.11.2023): 1595. http://dx.doi.org/10.3390/e25121595.
Pełny tekst źródłaAluvalu, Rajanikanth, Krishna Keerthi Chennam, M. A.Jabbar i Shaik Sarfaraz Ahamed. "Risk aware Access Control model for Trust Based collaborative organizations in cloud". International Journal of Engineering & Technology 7, nr 4.6 (25.09.2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.6.20235.
Pełny tekst źródłaDjamaluddin, Nursyamsi, Ayub I. Anwar, Burhanuddin Pasiga, Fuad H. Akbar, Rasmidar Samad, Hasanuddin H i Yu Ri-Kim. "The intersection of trust and satisfaction in Dentist-Patient interactions in Indonesia". Journal of Dentomaxillofacial Science 9, nr 1 (1.04.2024): 22–27. http://dx.doi.org/10.15562/jdmfs.v9i1.1689.
Pełny tekst źródłaAlrahhal, Hosam, Razan Jamous, Rabie Ramadan, Abdulaziz M. Alayba i Kusum Yadav. "Utilising Acknowledge for the Trust in Wireless Sensor Networks". Applied Sciences 12, nr 4 (16.02.2022): 2045. http://dx.doi.org/10.3390/app12042045.
Pełny tekst źródłaQi, Ping, Fucheng Wang i Shu Hong. "A Novel Trust Model Based on Node Recovery Technique for WSN". Security and Communication Networks 2019 (3.09.2019): 1–12. http://dx.doi.org/10.1155/2019/2545129.
Pełny tekst źródłaXin, Ruyue, Jingye Wang, Peng Chen i Zhiming Zhao. "Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review". ACM Computing Surveys 57, nr 5 (9.01.2025): 1–37. https://doi.org/10.1145/3701740.
Pełny tekst źródłaSchnabel, Georg, Roberto Capote i Daniel L. Aldama. "Why trust nuclear data evaluations with Bayesian networks". EPJ Web of Conferences 284 (2023): 12004. http://dx.doi.org/10.1051/epjconf/202328412004.
Pełny tekst źródłaTrudy-Ann Campbell, Samson Eromonsei i Olusegun Afolabi. "Efficient compliance with GDPR through automating privacy policy captions in web and mobile application". World Journal of Advanced Engineering Technology and Sciences 12, nr 2 (30.07.2024): 446–67. http://dx.doi.org/10.30574/wjaets.2024.12.2.0317.
Pełny tekst źródłaStanešić, Josip, Zlatan Morić, Damir Regvart i Ivan Bencarić. "Digital signatures and their legal significance". Edelweiss Applied Science and Technology 9, nr 1 (9.01.2025): 431–40. https://doi.org/10.55214/25768484.v9i1.4154.
Pełny tekst źródłaKolomvatsos, Kostas, Maria Kalouda, Panagiota Papadopoulou i Stathes Hadjiefthymiades. "Fuzzy Trust Modelling for Pervasive Computing Applications". Journal of Data Intelligence 2, nr 2 (czerwiec 2021): 101–15. http://dx.doi.org/10.26421/jdi2.2-1.
Pełny tekst źródłaGelei, Andrea, i Imre Dobos. "Evolving trust in business relationships – A behavioural experiment". Acta Oeconomica 72, nr 2 (23.06.2022): 231–47. http://dx.doi.org/10.1556/032.2022.00013.
Pełny tekst źródłaAli, Ali Mohammed Omar. "Explainability in AI: Interpretable Models for Data Science". International Journal for Research in Applied Science and Engineering Technology 13, nr 2 (28.02.2025): 766–71. https://doi.org/10.22214/ijraset.2025.66968.
Pełny tekst źródłaGharbi, Atef, i Saleh M. Altowaijri. "A Multi-Robot-Based Architecture and a Trust Model for Intelligent Fault Management and Control Systems". Electronics 12, nr 17 (31.08.2023): 3679. http://dx.doi.org/10.3390/electronics12173679.
Pełny tekst źródłaGeitz, Sarah, Brian Moon, Anita D'Amico, Robert R. Hoffman i Rob Page. "Beyond Requirements: Improving Software Tools for Intelligence Analysts". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, nr 10 (wrzesień 2005): 932–35. http://dx.doi.org/10.1177/154193120504901013.
Pełny tekst źródłaShah, Syed Alamdar Ali, Raditya Sukmana i Bayu Arie Fianto. "Duration model for maturity gap risk management in Islamic banks". Journal of Modelling in Management 15, nr 3 (12.02.2020): 1167–86. http://dx.doi.org/10.1108/jm2-08-2019-0184.
Pełny tekst źródłaZelensky, A. A., T. K. Abdullin, M. M. Zhdanova, V. V. Voronin i A. A. Gribkov. "Challenge of the performance management of trust control systems with deep learning". Advanced Engineering Research 22, nr 1 (30.03.2022): 57–66. http://dx.doi.org/10.23947/2687-1653-2022-22-1-57-66.
Pełny tekst źródłaHellani, Houssein, Layth Sliman, Abed Ellatif Samhat i Ernesto Exposito. "Overview on the Blockchain-Based Supply Chain Systematics and Their Scalability Tools". Emerging Science Journal 4 (23.08.2021): 45–69. http://dx.doi.org/10.28991/esj-2021-sp1-04.
Pełny tekst źródłaAraddhana Arvind Deshmukh,. "Explainable AI for Adversarial Machine Learning: Enhancing Transparency and Trust in Cyber Security". Journal of Electrical Systems 20, nr 1s (28.03.2024): 11–27. http://dx.doi.org/10.52783/jes.749.
Pełny tekst źródłaBarugahara, Florence. "Financial Inclusion in Zimbabwe: Determinants, Challenges, and Opportunities". International Journal of Financial Research 12, nr 3 (4.02.2021): 261. http://dx.doi.org/10.5430/ijfr.v12n3p261.
Pełny tekst źródłaWu, Kewei, Yiran Wang, Xiaogang He, Jinyu Yan, Yang Guo, Zhuqing Jiang, Xing Zhang i in. "Semi-Open Set Object Detection Algorithm Leveraged by Multi-Modal Large Language Models". Big Data and Cognitive Computing 8, nr 12 (29.11.2024): 175. https://doi.org/10.3390/bdcc8120175.
Pełny tekst źródłaWhaiduzzaman, Md, Mohammad Nazmul Haque, Md Rejaul Karim Chowdhury i Abdullah Gani. "A Study on Strategic Provisioning of Cloud Computing Services". Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/894362.
Pełny tekst źródłaNoardo, Francesca, Rob A. Atkinson, Alejandro Villar, Piotr Zaborowski i Ingo Simonis. "Profiling Standards to Improve Practical Interoperability". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVIII-4-2024 (21.10.2024): 359–66. http://dx.doi.org/10.5194/isprs-archives-xlviii-4-2024-359-2024.
Pełny tekst źródłaRahman, Ashiqur Md, i Rashedur M. Rahman. "CAPM Indexed Hybrid E-Negotiation for Resource Allocation in Grid Computing". International Journal of Grid and High Performance Computing 5, nr 2 (kwiecień 2013): 72–91. http://dx.doi.org/10.4018/jghpc.2013040105.
Pełny tekst źródłaBrazil, Debbie, Charlotte Moss i Karen Blinko. "Acute hospital preoperative assessment redesign: streamlining the patient pathway and reducing on-the-day surgery cancellations". BMJ Open Quality 10, nr 3 (wrzesień 2021): e001338. http://dx.doi.org/10.1136/bmjoq-2021-001338.
Pełny tekst źródłaYuan, Ziyao, Houjun Fang, Binqiang Han i Zejiong Zhou. "A Comparative Study on Poverty Reduction Models of Rural Collective Economic Organizations from the Perspective of Relative Poverty". International Journal of Education and Humanities 5, nr 3 (16.11.2022): 177–84. http://dx.doi.org/10.54097/ijeh.v5i3.2798.
Pełny tekst źródłaEnglund, Cristofer, Eren Erdal Aksoy, Fernando Alonso-Fernandez, Martin Daniel Cooney, Sepideh Pashami i Björn Åstrand. "AI Perspectives in Smart Cities and Communities to Enable Road Vehicle Automation and Smart Traffic Control". Smart Cities 4, nr 2 (18.05.2021): 783–802. http://dx.doi.org/10.3390/smartcities4020040.
Pełny tekst źródłaDrin, Svitlana, i Fedir Serdiuk. "Expected credit loss modeling". Mohyla Mathematical Journal 6 (18.04.2024): 14–19. http://dx.doi.org/10.18523/2617-70806202314-19.
Pełny tekst źródłaRehman, Abdul, Mohd Fadzil Hassan, Kwang Hooi Yew, Irving Paputungan i Duc Chung Tran. "State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR)". PeerJ Computer Science 6 (14.12.2020): e334. http://dx.doi.org/10.7717/peerj-cs.334.
Pełny tekst źródłaZhang, Peng, i Maged N. Kamel Boulos. "Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges". Future Internet 15, nr 9 (24.08.2023): 286. http://dx.doi.org/10.3390/fi15090286.
Pełny tekst źródłaSmruti P. Patil. "Design of an Efficient QOS Aware Trust-Based Security Model with Bioinspired Sidechains for Healthcare Deployments". Communications on Applied Nonlinear Analysis 32, nr 3 (11.10.2024): 181–96. http://dx.doi.org/10.52783/cana.v32.1938.
Pełny tekst źródła