![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Detection of Android API Call Using Logging Mechanism within Android Framework
Android based smartphones have become popular. Accordingly, many malwares are developed. The malwares target information leaked from Android. However, it is difficult for users to judge the availability of app...
-
Chapter and Conference Paper
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures
The increased application of sensor network introduces new security challenges. In this paper, we analyze the detection methods of compromised nodes and its countermeasure in the sensor network. We first revie...
-
Chapter and Conference Paper
Collaborative Behavior Visualization and Its Detection by Observing Darknet Traffic
Recently, we have a problem about an attack generated by a botnet which consists of a group of compromised computers called bots. An attacker called botmaster controls it and a botnet invokes an attack such as...
-
Article
Characterizing Economic and Social Properties of Trust and Reputation Systems in P2P Environment
Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers ...
-
Chapter and Conference Paper
On Studying Front-Peer Attack-Resistant Trust and Reputation Mechanisms Based on Enhanced Spreading Activation Model in P2P Environments
In this paper, we proposed two enhanced trust propagation and reputation ranking approaches based on spreading activation model to mitigate the effect of front peer. By front peer it means that these malicious...
-
Chapter and Conference Paper
An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System
It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions “in tandem”, and generally computes trust ranks for sets of individuals according to peers’ so...
-
Chapter and Conference Paper
On Characterizing Economic-Based Incentive-Compatible Mechanisms to Solving Hidden Information and Hidden Action in Ad Hoc Network
This paper attempts to comprehensively characterize economic-based incentive compatible routing and forwarding mechanisms in ad hoc network, including hidden information in routing phase, and hidden action in ...
-
Chapter and Conference Paper
On Studying P2P Topology Construction Based on Virtual Regions and Its Effect on Search Performance
The virtual region-based P2P architecture was provided in this paper, which extended the proximity concept in overlay network. By virtual region it meant various related factors should be integrated into the d...