A survey on technical threat intelligence in the age of sophisticated cyber attacks

W Tounsi, H Rais - Computers & security, 2018 - Elsevier
Today's cyber attacks require a new line of security defenses. The static approach of
traditional security based on heuristic and signature does not match the dynamic nature of …

A review of trust modeling in ad hoc networks

M Mejia, N Pena, JL Munoz, O Esparza - Internet Research, 2009 - emerald.com
Purpose–Mobile ad hoc networks rely on cooperation to perform essential network
mechanisms such as routing. Therefore, network performance depends to a great extent on …

A game theoretic trust model for on-line distributed evolution of cooperation inMANETs

M Mejia, N Peña, JL Muñoz, O Esparza… - Journal of Network and …, 2011 - Elsevier
Cooperation among nodes is fundamental for the operation of mobile ad hoc networks
(MANETs). In such networks, there could be selfish nodes that use resources from other …

What is cyber threat intelligence and how is it evolving?

W Tounsi - Cyber‐Vigilance and Digital Trust: Cyber Security in …, 2019 - Wiley Online Library
This chapter aims to give a clear idea about threat intelligence and how literature subdivides
it given its multiple sources, the gathering methods, the information life‐span and who …

Evolutionary game-based trust strategy adjustment among nodes in wireless sensor networks

Y Li, H Xu, Q Cao, Z Li, S Shen - International Journal of …, 2015 - journals.sagepub.com
Wireless sensor networks (WSNs) provide network services through the cooperation of
sensor nodes, while the basis of cooperation depends on the trust relationships among the …

[PDF][PDF] 基于博弈论的移动自组织网络的信任管理方法

郭晶晶, 马建峰, **琦, 万涛, 高聪, 张亮 - 通信学报, 2014 - infocomm-journal.com
采用博弈论的思想为节点间的间接信任信息获取建立了博弈模型, 提出了惩罚机制并给出了节点
的效用函数. 此外, 建立了信任演化的复制动态方程来研究在不同参数下节点的演化稳定策略 …

Incentive and trust issues in assured information sharing

R Layfield, M Kantarcioglu, B Thuraisingham - … and Worksharing: 4th …, 2009 - Springer
Assured information sharing among different organizations in a coalitional environment is an
important first step in accomplishing many critical tasks. For example, different security …

DECADE: Distributed Emergent Cooperation through ADaptive Evolution in mobile ad hoc networks

M Mejia, N Peña, JL Muñoz, O Esparza, M Alzate - Ad Hoc Networks, 2012 - Elsevier
The scarce resources of a mobile ad hoc network (MANET) should not be wasted attending
selfish nodes (those nodes that use resources from other nodes to send their own packets …

Autoregression models for trust management in wireless ad hoc networks

Z Li, X Li, V Narasimhan, A Nayak… - 2011 IEEE Global …, 2011 - ieeexplore.ieee.org
In this paper, we propose a novel trust management scheme for improving routing reliability
in wireless ad hoc networks. It is grounded on two classic autoregression models, namely …

Trust-based approaches to solve routing issues in ad-hoc wireless networks: A survey

JM Gonzalez, M Anwar… - … Conference on Trust …, 2011 - ieeexplore.ieee.org
Trust is important in Ad-hoc networks because collaboration and cooperation among nodes
are critical towards achieving the system's goals, such as routing reliability. In this paper, we …