Sharara et al., 2011
ViewPDF| Publication | Publication Date | Title | 
|---|---|---|
| Bojja Venkatakrishnan et al. | Dandelion: Redesigning the bitcoin network for anonymity | |
| Buchegger et al. | A robust reputation system for mobile ad-hoc networks | |
| Shehada et al. | A new adaptive trust and reputation model for mobile agent systems | |
| Sherwood et al. | Cooperative peer groups in NICE | |
| US7805518B1 (en) | Method and system for reputation management in peer-to-peer networks | |
| Beskow et al. | Agent based simulation of bot disinformation maneuvers in Twitter | |
| Jedari et al. | A survey on human-centric communications in non-cooperative wireless relay networks | |
| Purohit et al. | Defensechain: Consortium blockchain for cyber threat intelligence sharing and defense | |
| Sharara et al. | Utilizing social influence in content distribution networks | |
| Zhang et al. | Accelerating transactions relay in blockchain networks via reputation | |
| Jamali et al. | Defense against SYN flooding attacks: a particle swarm optimization approach | |
| Qi et al. | STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things | |
| Malialis | Distributed reinforcement learning for network intrusion response | |
| Fanti et al. | Barracuda: the power of ℓ-polling in proof-of-stake blockchains | |
| Chen et al. | Parameter-estimation based trust model for unstructured peer-to-peer networks | |
| Pal et al. | A discriminatory rewarding mechanism for Sybil detection with applications to Tor | |
| Lent | Evaluating a migration-based response to DoS attacks in a system of distributed auctions | |
| Huang et al. | Impact of feedback on trust in P2P networks | |
| Bölöni et al. | Task distribution with a random overlay network | |
| Zhang et al. | A game theoretical analysis of distributed denial-of-service defense incentive | |
| Komninos et al. | A worm propagation model based on scale free network structures and people's email acquaintance profiles | |
| da Silva et al. | Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks | |
| Rogers | Private and censorship-resistant communication over public networks | |
| Jayalath et al. | Atmosphere: A universal cross-cloud communication infrastructure | |
| Bonti et al. | Effects of social characters in viral propagation seeding strategies in online social networks |