Search
Now showing items 21-30 of 44
On context-aware DDoS attacks using deep generative networks
(IEEE, 2018-10)
Distributed Denial of Service (DDoS) attacks continue to be one of the most severe threats in the Internet. The intrinsic challenge in preventing DDoS attacks is to distinguish them from legitimate flash crowds since two ...
Trust estimation of sources over correlated propositions
(IEEE, 2018-09-05)
This work analyzes the impact of correlated propositions when estimating the reporting behavior of information sources. These behavior estimates are critical for fusion, and traditional methods assume the propositions are ...
Interest-based negotiation for policy-regulated asset sharing
(Springer Nature, 2016)
Resources sharing is an important but complex problem to be solved. The problem is exacerbated in a coalition context due to policy constraints, that reflect concerns regarding security, privacy and performance to name a ...
Preface
(Springer International Publishing, 2016)
The pervasiveness of open systems raises a range of challenges and opportunities for research and technological development in the area of autonomous agents and multi-agent systems. Open systems comprise loosely coupled ...
How to trust a few among many
(Springer International Publishing, 2017)
The presence of numerous and disparate information sources available to support decision-making calls for efficient methods of harnessing their potential. Information sources may be unreliable, and misleading reports can ...
Privacy enforcement through policy extension
(IEEE, 2016)
Successful coalition operations require contributions from the coalition partners which might have hidden goals and desiderata in addition to the shared coalition goals. Therefore, there is an inevitable risk-utility ...
Semantic reasoning with uncertain information from unreliable sources
(Springer International Publishing, 2016)
Intelligent software agents may significantly benefit from semantic reasoning. However, existing semantic reasoners are based on Description Logics, which cannot handle vague, incomplete, and unreliable knowledge. In this ...
Reasoning about uncertain information and conflict resolution through trust revision
(International Foundation for Autonomous Agents and Multiagent Systems, 2013)
In information driven MAS, information consumers collect information about their environment from various sources such as sensors. However, there is no guarantee that a source will provide the requested information truthfully ...
Location attestation and access control for mobile devices using GeoXACML
(Elsevier, 2017-02)
Access control has been applied in various scenarios in the past for negotiating the best policy. Solutions with XACML for access control has been very well explored by research and have resulted in significant contributions ...
Share this page