نتایج جستجو برای: bad mouthing attack
تعداد نتایج: 110943 فیلتر نتایج به سال:
Results: The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves. We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals: ballot-stuffing and bad-mouthing, and various attack models including constant attack, camouflage attack, whitewashing attack and sybil attack. Blockchain-based repu...
It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to low...
To ensure a secure computing in a cloud environment, recommendation and trust-based access control model is proposed. The proposed model allows calculation of direct trust and indirect trust based on recommendations. It handles cases where the requesting entity may have a past interaction experience or fresh entity without any past experience with the service. It includes the capability to caus...
To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity re...
Most peer-to-peer systems are vulnerable to Sybil attacks. The Sybil attack is an attack wherein a reputation system is subverted by a considerable number of forging identities in peer-to-peer networks. By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself. For example, in a distributed ...
The Internet of Things (IoT) is widely used to reduce human dependence. It a network interconnected smart devices with internet connectivity that can send and receive data. However, the rapid growth IoT has raised security privacy concerns, identification removal compromised malicious nodes being major challenge. To overcome this, lightweight trust management mechanism called FogTrust proposed....
The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on cooperation between nodes this network. Indeed, given vulnerability wireless sensor networks attack, some entities may engage in malicious behavior aimed at undermining proper functioning As result, selection reliable for task execution becomes necessity To improve and security networks, use Trust Manageme...
Children are exposed to environmental contaminants by placing contaminated hands or objects in their mouths. We quantified hand- and object-mouthing frequencies of Bangladeshi children and determined if they differ from those of U.S. children to evaluate the appropriateness of applying U.S. exposure models in other socio-cultural contexts. We conducted a five-hour structured observation of the ...
If an activity during manipulative play is exploratory, it should, in contrast to other activity, be used differentially for objects that vary in novelty. In a study of 5-month-olds, different definitions of exploratory mouthing were tested, and results suggested that mouthing followed immediately by a look fulfilled some criteria for an exploratory activity. In the next study of 5to 11-month-o...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید