A survey on technical threat intelligence in the age of sophisticated cyber attacks
W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …
traditional security based on heuristic and signature does not match the dynamic nature of …
A review of trust modeling in ad hoc networks
Purpose–Mobile ad hoc networks rely on cooperation to perform essential network
mechanisms such as routing. Therefore, network performance depends to a great extent on …
mechanisms such as routing. Therefore, network performance depends to a great extent on …
A game theoretic trust model for on-line distributed evolution of cooperation inMANETs
Cooperation among nodes is fundamental for the operation of mobile ad hoc networks
(MANETs). In such networks, there could be selfish nodes that use resources from other …
(MANETs). In such networks, there could be selfish nodes that use resources from other …
What is cyber threat intelligence and how is it evolving?
W Tounsi - Cyber‐Vigilance and Digital Trust: Cyber Security in …, 2019 - Wiley Online Library
This chapter aims to give a clear idea about threat intelligence and how literature subdivides
it given its multiple sources, the gathering methods, the information life‐span and who …
it given its multiple sources, the gathering methods, the information life‐span and who …
Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks
Y Li, H Xu, Q Cao, Z Li, S Shen - International Journal of …, 2015 - journals.sagepub.com
Wireless sensor networks (WSNs) provide network services through the cooperation of
sensor nodes, while the basis of cooperation depends on the trust relationships among the …
sensor nodes, while the basis of cooperation depends on the trust relationships among the …
Incentive and trust issues in assured information sharing
Assured information sharing among different organizations in a coalitional environment is an
important first step in accomplishing many critical tasks. For example, different security …
important first step in accomplishing many critical tasks. For example, different security …
DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks
The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending
selfish nodes (those nodes that use resources from other nodes to send their own packets …
selfish nodes (those nodes that use resources from other nodes to send their own packets …
Autoregression models for trust management in wireless ad hoc networks
In this paper, we propose a novel trust management scheme for improving routing reliability
in wireless ad hoc networks. It is grounded on two classic autoregression models, namely …
in wireless ad hoc networks. It is grounded on two classic autoregression models, namely …
Trust-based approaches to solve routing issues in ad-hoc wireless networks: A survey
JM Gonzalez, M Anwar… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes
are critical towards achieving the system's goals, such as routing reliability. In this paper, we …
are critical towards achieving the system's goals, such as routing reliability. In this paper, we …