The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Virtual trees for the byzantine generals algorithm
Proceedings of the 35th SIGCSE technical symposium on Computer science education
On Intelligence
Detecting Attacks That Exploit Application-Logic Errors Through Application-Level Auditing
ACSAC '04 Proceedings of the 20th Annual Computer Security Applications Conference
The Software Vulnerability Guide (Programming Series) (Programming Series)
The Software Vulnerability Guide (Programming Series) (Programming Series)
A Dynamic Trust Metric for P2P Systems
GCCW '06 Proceedings of the Fifth International Conference on Grid and Cooperative Computing Workshops
Security Issues in Wireless Sensor Networks
ICSNC '06 Proceedings of the International Conference on Systems and Networks Communication
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
Selecting a distributed agreement algorithm
Proceedings of the 2007 ACM symposium on Applied computing
IEEE Intelligent Systems
Random testing for security: blackbox vs. whitebox fuzzing
Proceedings of the 2nd international workshop on Random testing: co-located with the 22nd IEEE/ACM International Conference on Automated Software Engineering (ASE 2007)
Cognitive Networks: Towards Self-Aware Networks
Cognitive Networks: Towards Self-Aware Networks
PRESENCE: A Human-Inspired Architecture for Speech-Based Human-Machine Interaction
IEEE Transactions on Computers
ICCIMA '07 Proceedings of the International Conference on Computational Intelligence and Multimedia Applications (ICCIMA 2007) - Volume 01
Secure anonymous routing in ad hoc networks
COMPUTE '08 Proceedings of the 1st Bangalore Annual Compute Conference
A Game Theoretical Attack-Defense Model Oriented to Network Security Risk Assessment
CSSE '08 Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 06
A Network Security Risk Assessment Framework Based on Game Theory
FGCN '08 Proceedings of the 2008 Second International Conference on Future Generation Communication and Networking - Volume 02
An Attack Scenario Based Approach for Software Security Testing at Design Stage
ISCSCT '08 Proceedings of the 2008 International Symposium on Computer Science and Computational Technology - Volume 01
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Automated risk assessment: a hierarchical temporal memory approach
DNCOCO'10 Proceedings of the 9th WSEAS international conference on Data networks, communications, computers
Hi-index | 0.00 |
Dynamic trust models and replication approaches that adequately address the security needs of wireless cognitive ad hoc networks (MANET) have proven quite difficult to develop. The inherent decentralized nature of ad hoc networks and their collaborative services give rise to a series of vulnerabilities that can be exploited by malicious entities. This problem is exacerbated by the fact that risk assessment models show high levels of complexity, which suggest significant domain constraints and lack of true human-like reasoning. Recent work in the area of HTM demonstrates the ability to mimic higher level cognitive skills. This paper discusses the potential of using HTM to improve human-like reasoning in the replication of trust information in cognitive MANETs.