194
Views
2
CrossRef citations to date
0
Altmetric
Articles

A robust ensemble-based trust and reputation system against different types of intruder attacks

, , &
Pages 308-324 | Received 04 Jan 2014, Accepted 08 Jul 2014, Published online: 04 Sep 2014

References

  • Accuracy and F-measure. Available at http://en.wikipedia.org/wiki/F-score
  • D. Artz, and Y. Gil, A survey of trust in computer science and the semantic web, Web Semantics: Sci. Serv. Agents World Wide Web. 5 (2007), pp. 58–71. doi: 10.1016/j.websem.2007.03.002
  • L. Breiman, Bagging predictors, Mach. Learn. 24 (1996), pp. 123–140.
  • L. Breiman, Random forests, Mach. Learn. 45 (2001), pp. 5–32. doi: 10.1023/A:1010933404324
  • C. Dellarocas, The digitization of word of mouth: Promise and challenges of online feedback mechanisms, Manag. Sci. 49 (2003), pp. 1407–1424. doi: 10.1287/mnsc.49.10.1407.17308
  • F. Fouss, Y. Achbany, and M. Saerens, A probabilistic reputation model based on transaction ratings, Inform. Sci. 180 (2010), pp. 2095–2123. doi: 10.1016/j.ins.2010.01.020
  • Y. Freund and R.E. Schapire, Experiments with a new boosting algorithm, Int. Conf. Mach Learn. 26 (1996), pp. 148–156.
  • Y. Freund and R.E. Schapire, Discussion: Arcing Classifiers, Ann. Stat. 26 (1998), pp. 824–832.
  • J.A. Golbeck, Computing and applying trust in web-based social networks, Ph.D. diss., University of Maryland, 2005.
  • T. Hastie, R. Tibshirani, J. Friedman, and J. Franklin, The elements of statistical learning: data mining, inference and prediction, Math Intell. 27 (2005), pp. 83–85.
  • K. Hoffman, D. Zage, and C. Nita-Rotaru, A survey of attack and defense techniques for reputation systems, ACM Comput. Surv. 42 (2009), pp. 1–31. doi: 10.1145/1592451.1592452
  • A. Jøsang and J.A. Golbeck, The beta reputation system, Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002, pp. 41–55.
  • A. Jøsang and J.A. Golbeck, Challenges for robust trust and reputation systems, Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, 2009. Available at http://folk.uio.no/josang/papers/JG2009-STM.pdf
  • A. Jøsang, R. Ismail, and C. Boyd, A survey of trust and reputation systems for online service provision, Decis. Support Syst. 43 (2007), pp. 618–644. doi: 10.1016/j.dss.2005.05.019
  • Y. Liu, A.H. Ngu, and L.Z. Zeng, QoS computation and policing in dynamic web service selection, Proceedings of the 13th International World Wide Web Conference on Alternate Track Papers & Posters, New York, USA, 2004, pp. 66–73.
  • E.M. Maximilien and M.P. Singh, Conceptual model of web service reputation, ACM Sigmod Record. 31 (2002), pp. 36–41. doi: 10.1145/637411.637417
  • E.M. Maximilien and M.P. Singh, Toward autonomic web services trust and selection, Proceedings of the 2nd International Conference on Service Oriented Computing, New York, USA, 2004, pp. 212–221.
  • E.M. Maximilien and M.P. Singh, Multiagent system for dynamic web services selection, Proceeding of the Workshop on Service-Oriented Computing and Agent-Based Engineering (SOCABE at AAMAS), Utrecht, The Netherlands, 2005, pp. 25–29.
  • MovieLens data. Available at http://grouplens.org/datasets/movielens/
  • H.T. Nguyen, W. Zhao, and J. Yang, A trust and reputation model based on Bayesian network for Web services, 2010 IEEE International Conference on Web Services (ICWS), Florida, USA, 2010, pp. 251–258.
  • R. Polikar, Ensemble based systems in decision making, Circuits Syst. Mag. IEEE. 6(3) (2006), pp. 21–45. doi: 10.1109/MCAS.2006.1688199
  • P. Resnick, and H.R. Varian, Recommender systems, Commun ACM. 40 (1997), pp. 56–58. doi: 10.1145/245108.245121
  • J. Seo, S. Choi, M. Kim, and S. Han, The method of trust and reputation model with ensemble combination, J Wireless Mobile Netw Ubiquitous Comput Dependable Appl 2013. 4 (2013), pp. 108–121.
  • M. Stephen, Formalising trust as a computational concept, Ph. D diss., University of Stirling, 1994.
  • M. Wang, F. Tao, Y. Zhang, and G. Li, An adaptive and robust reputation mechanism for P2P network, 2010 IEEE International Conference on Communications (ICC), Cape Town, South Africa, 2010, pp. 1–5.
  • Y. Wang and J. Vassileva, Toward trust and reputation based web service selection: A survey, Int. Trans. Syst. Sci. Appl. 3 (2007), pp. 118–132.
  • A. Whitby, A. Jøsang, and J. Indulska, Filtering out unfair ratings in Bayesian reputation systems, Proceedings of the 7th International Workshop on Trust in Agent Societies, New York, USA, 2004, pp. 106–117.
  • D.H. Wolpert and W.G. Macready, No free lunch theorems for optimization, IEEE Trans. Evol. Comput. 1 (1997), pp. 67–82. doi: 10.1109/4235.585893
  • Y. Yang, Y.L. Sun, S. Kay, and Q. Yang, Defending online reputation systems against collaborative unfair raters through signal modeling and trust, Proceedings of the 2009 ACM Symposium on Applied Computing, Hawaii, USA, 2009, pp. 1308–1315.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.