Author of the publication

Enhancement of Critical Financial Infrastructure Protection Using Trust Management.

, , , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 156-165. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A service-centric approach to access control and monitoring based on distributed trust., and . CASCON, page 294-305. IBM, (2007)Enhancement of Critical Financial Infrastructure Protection Using Trust Management., , , and . STA Workshops, volume 187 of Communications in Computer and Information Science, page 156-165. Springer, (2011)Profitability and Cost Management of Trustworthy Composite Services., , and . TrustBus, volume 7449 of Lecture Notes in Computer Science, page 179-191. Springer, (2012)A Combined Biologically and Socially Inspired Approach to Mitigating Ad Hoc Network Threats., , and . VTC Fall, page 2010-2014. IEEE, (2007)Trustworthiness monitoring and prediction of composite services., , and . ISCC, page 580-587. IEEE Computer Society, (2012)Attack surface-based security metric framework for service selection and composition., , and . Int. J. Auton. Adapt. Commun. Syst., 10 (1): 88-113 (2017)An Evaluation of AI-Based Network Intrusion Detection in Resource-Constrained Environments., , , and . UEMCON, page 275-282. IEEE, (2023)A service-centric model for intrusion detection in next-generation networks., , and . Comput. Stand. Interfaces, 27 (5): 513-520 (2005)A Trust Based System for Enhanced Spam Filtering., and . J. Softw., 3 (5): 55-64 (2008)Implementing a Trust Overlay Framework for Digital Ecosystems., , , and . OPAALS, volume 67 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 178-191. Springer, (2010)