Author of the publication

Soft Security: Isolating Unreliable Agents from Society.

, and . Trust, Reputation, and Security, volume 2631 of Lecture Notes in Computer Science, page 224-233. Springer, (2002)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evaluating dynamic correctness properties of domain reference architectures., , and . J. Syst. Softw., 68 (3): 217-231 (2003)Systemic Reciprocal Rewards: Motivating Expert Participation in Online Communities with a Novel Class of Incentives., and . Int. J. Agent Technol. Syst., 6 (2): 30-50 (2014)Agent Technology Portfolio Manager., , , , and . SEKE, page 37-44. (2004)Architectural Model for Designing Agent-based System., , and . SEKE, page 753-760. (2005)Understanding victim-enabled identity theft., , and . PST, page 196-202. IEEE, (2016)A Survival Game Analysis to Personal Identity Protection Strategies., , and . TPS-ISA, page 209-217. IEEE, (2020)Is Your Phone You? How Privacy Policies of Mobile Apps Allow the Use of Your Personally Identifiable Information., , and . TPS-ISA, page 256-262. IEEE, (2020)Selection of Conflict Resolution Strategies in Dynamically Organized Sensible Agent-Based Systems., and . AAAI/IAAI, page 1193. AAAI Press / The MIT Press, (1998)Goal and Responsibility Allocation in Sensible Agent-Based Systems., and . AAAI/IAAI, page 1195. AAAI Press / The MIT Press, (1998)Finding Trustworthy Users: Twitter Sentiment Towards US Presidential Candidates in 2016 and 2020., , and . IntelliSys (2), volume 295 of Lecture Notes in Networks and Systems, page 804-821. Springer, (2021)