Swarmtrust: A swarm optimization-based approach to enhance trustworthiness in smart homes

IU Din, KA Awan, A Almogren, JJPC Rodrigues - Physical Communication, 2023 - Elsevier
As smart home networks become increasingly complex and dynamic, maintaining trust
between the various devices and services is crucial. Existing trust management approaches …

Reputation based approach for improved fairness and robustness in P2P protocols

FN Nwebonyi, R Martins, ME Correia - Peer-to-Peer Networking and …, 2019 - Springer
Abstract Peer-to-Peer (P2P) overlay networks have gained popularity due to their
robustness, cost advantage, network efficiency and openness. Unfortunately, the same …

Protection against semantic social engineering attacks

R Heartfield, G Loukas - Versatile cybersecurity, 2018 - Springer
Phishing, drive-by downloads, file and multimedia masquerading, domain typosquatting,
malvertising and other semantic social engineering attacks aim to deceive the user rather …

A mechanism for resource pricing and fairness in peer-to-peer networks

S Li, W Sun - Electronic Commerce Research, 2016 - Springer
In peer-to-peer (P2P) networks, each peer acts as the role of client and server. As a client,
each peer is regarded as a service customer. It sends requests to other peers to download …

Security and fairness in IoT based e-Health system: A case study of mobile edge-clouds

FN Nwebonyi, R Martins… - … Conference on Wireless …, 2019 - ieeexplore.ieee.org
Through IoT, humans and objects can be connected seamlessly, to guaranty improved
quality of service (QoS). IoT-driven e-Health systems benefit from such rich network setting …

Reputation-based security system for edge computing

FN Nwebonyi, R Martins, ME Correia - Proceedings of the 13th …, 2018 - dl.acm.org
Given the centralized architecture of cloud computing, there is a genuine concern about its
ability to adequately cope with the demands of connecting devices which are sharply …

Trust management in collaborative systems for critical infrastructure protection

N Ait Aali, A Baina, L Echabbi - Security and Communication …, 2018 - Wiley Online Library
Due to the necessity of Critical Infrastructure (CI) Protection against different threats, several
security policies must be applied among the organizations of CI. Based on our conducted …

[KNJIGA][B] Sociological perspectives on media piracy in the Philippines and Vietnam

VO Ballano - 2016 - Springer
Media piracy or the counterfeiting of copyrighted film, music, video games, computer and
music videos, and other digital media products and services has become an urgent and …

Adaptive approach to restraining content pollution in peer-to-peer networks

M Hawa, R Al-Zubi, KA Darabkh… - Information Systems …, 2017 - Springer
Abstract Peer-to-Peer (P2P) networks face the challenge of frequent pollution attacks. In
such attacks, malicious peers pollute the network by sharing mislabeled, corrupt or infected …

Designing and verifying a P2P service security protocol in M2M environment

WS Bae - Peer-to-Peer Networking and Applications, 2016 - Springer
Multifunctional high-performance electronic systems in M2M (Machine-to-Machine) industry
have been evolving substantially in tandem with the advancement of IT. M2M, standing for …