Author of the publication

A survey of attack and defense techniques for reputation systems.

, , and . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A survey of attack and defense techniques for reputation systems., , and . ACM Comput. Surv., 42 (1): 1:1-1:31 (2009)A platform for creating efficient, robust, and resilient peer-to-peer systems. Purdue University, USA, (2010)A Marauder's Map for the IoT Edge., , , and . CIC, page 236-245. IEEE, (2019)Experimental comparison of peer-to-peer streaming overlays: An application perspective., , , and . LCN, page 20-27. IEEE Computer Society, (2008)A framework for mitigating attacks against measurement-based adaptation mechanisms in unstructured multicast overlay networks., , and . IEEE/ACM Trans. Netw., 16 (6): 1434-1446 (2008)Improving supply chain security using big data., , and . ISI, page 254-259. IEEE, (2013)An Architectural Vision for a Data-Centric IoT: Rethinking Things, Trust and Clouds., , , , , and . ICDCS, page 1717-1728. IEEE Computer Society, (2017)Harnessing many-core processors for scalable, highly efficient, and adaptable firewall solutions., , , , and . ICNC, page 637-641. IEEE Computer Society, (2013)Tracking Network Events with Write Optimized Data Structures: The Design and Implementation of TWIAD: The Write-Optimized IP Address Database., , , , , and . CoRR, (2015)Utilizing linear subspaces to improve cloud security., and . DSN Workshops, page 1-6. IEEE Computer Society, (2012)