Segueix
Tim Muller
Tim Muller
University of Nottingham
Correu electrònic verificat a ntu.edu.sg - Pàgina d'inici
Títol
Citada per
Citada per
Any
Towards robust and effective trust management for security: A survey
D Wang, T Muller, Y Liu, J Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
932014
On beta models with trust chains
T Muller, P Schweitzer
Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM …, 2013
302013
Using Information Theory to Improve the Robustness of Trust Systems.
D Wang, T Muller, AA Irissappane, J Zhang, Y Liu
AAMAS, 791-799, 2015
292015
Expressiveness modulo bisimilarity of regular expressions with parallel composition
JCM Baeten, B Luttik, T Muller, P Van Tilburg
Mathematical Structures in Computer Science 26 (6), 933-968, 2016
282016
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory
D Wang, T Muller, J Zhang, Y Liu
Proceedings of the 24th International Joint Conference on Artificial …, 2015
202015
Trust revision for conflicting sources
A Jøsang, M Ivanovska, T Muller
2015 18th International Conference on Information Fusion (Fusion), 550-557, 2015
182015
On robustness of trust systems
T Muller, Y Liu, S Mauw, J Zhang
Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014
172014
Semantics of trust
T Muller
International Workshop on Formal Aspects in Security and Trust, 141-156, 2010
152010
The fallacy of endogenous discounting of trust recommendations
T Muller, Y Liu, J Zhang
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
82015
Information theoretical analysis of unfair rating attacks under subjectivity
D Wang, T Muller, J Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 15, 816-828, 2019
72019
Information theory for subjective logic
T Muller, D Wang, A Jøsang
Modeling Decisions for Artificial Intelligence: 12th International …, 2015
72015
A formal derivation of composite trust
T Muller, P Schweitzer
International Symposium on Foundations and Practice of Security, 132-148, 2012
72012
The reputation lag attack
S Sirur, T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
62019
Is It Harmful When Advisors Only Pretend to Be Honest?
D Wang, T Muller, J Zhang, Y Liu
30th AAAI Conference on Artificial Intelligence (AAAI), 2016
62016
How to use information theory to mitigate unfair rating attacks
T Muller, D Wang, Y Liu, J Zhang
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016
52016
An unforeseen equivalence between uncertainty and entropy
T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
42019
The foul adversary: formal models
N Dong, T Muller
Formal Methods and Software Engineering: 20th International Conference on …, 2018
42018
Simulating the Impact of Personality on Fake News.
A Coates, T Muller, S Sirur
TRUST@ AAMAS, 1-12, 2021
22021
Provably robust decisions based on potentially malicious sources of information
T Muller, D Wang, J Sun
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020
22020
A language for trust modelling
T Muller, J Zhang, Y Liu
Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary …, 2016
22016
En aquests moments el sistema no pot dur a terme l'operació. Torneu-ho a provar més tard.
Articles 1–20