نتایج جستجو برای: bad mouthing attack

تعداد نتایج: 110943  

2017
Yuanfeng Cai Dan Zhu

Results: The detection of fraudulent raters is not easy since they can behave strategically to camouflage themselves. We explore the potential strengths and limitations of blockchain-based reputation systems under two attack goals: ballot-stuffing and bad-mouthing, and various attack models including constant attack, camouflage attack, whitewashing attack and sybil attack. Blockchain-based repu...

Journal: :Logic Journal of the IGPL 2013
Zorana Bankovic Juan Carlos Vallejo David Fraga José Manuel Moya

It has been demonstrated that rating trust and reputation of individual nodes is an effective approach in distributed environments in order to improve security, support decision-making and promote node collaboration. Nevertheless, these systems are vulnerable to deliberate false or unfair testimonies. In one scenario, the attackers collude to give negative feedback on the victim in order to low...

2015
Chaitali Uikey

To ensure a secure computing in a cloud environment, recommendation and trust-based access control model is proposed. The proposed model allows calculation of direct trust and indirect trust based on recommendations. It handles cases where the requesting entity may have a past interaction experience or fresh entity without any past experience with the service. It includes the capability to caus...

Journal: :EURASIP J. Wireless Comm. and Networking 2012
Naima Iltaf Abdul Ghafoor Mukhtar Hussain

To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity re...

2013
Wei Chang Jie Wu

Most peer-to-peer systems are vulnerable to Sybil attacks. The Sybil attack is an attack wherein a reputation system is subverted by a considerable number of forging identities in peer-to-peer networks. By illegitimately infusing false or biased information via the pseudonymous identities, an adversary can mislead a system into making decisions benefiting herself. For example, in a distributed ...

Journal: :Technologies (Basel) 2023

The Internet of Things (IoT) is widely used to reduce human dependence. It a network interconnected smart devices with internet connectivity that can send and receive data. However, the rapid growth IoT has raised security privacy concerns, identification removal compromised malicious nodes being major challenge. To overcome this, lightweight trust management mechanism called FogTrust proposed....

Journal: :International Journal of Computer Network and Information Security 2021

The success of the mission assigned to a Wireless Sensor Network (WSN) depends heavily on cooperation between nodes this network. Indeed, given vulnerability wireless sensor networks attack, some entities may engage in malicious behavior aimed at undermining proper functioning As result, selection reliable for task execution becomes necessity To improve and security networks, use Trust Manageme...

2016
Laura H. Kwong Ayse Ercumen Amy J. Pickering Leanne Unicomb Jennifer Davis Stephen P. Luby

Children are exposed to environmental contaminants by placing contaminated hands or objects in their mouths. We quantified hand- and object-mouthing frequencies of Bangladeshi children and determined if they differ from those of U.S. children to evaluate the appropriateness of applying U.S. exposure models in other socio-cultural contexts. We conducted a five-hour structured observation of the ...

2004
Holly A. Ruff Lisa M. Saltarelli Mary Capozzoli Karen Dubiner

If an activity during manipulative play is exploratory, it should, in contrast to other activity, be used differentially for objects that vary in novelty. In a study of 5-month-olds, different definitions of exploratory mouthing were tested, and results suggested that mouthing followed immediately by a look fulfilled some criteria for an exploratory activity. In the next study of 5to 11-month-o...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید