Towards robust and effective trust management for security: A survey D Wang, T Muller, Y Liu, J Zhang 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 92 | 2014 |
On beta models with trust chains T Muller, P Schweitzer Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM …, 2013 | 31 | 2013 |
Using Information Theory to Improve the Robustness of Trust Systems. D Wang, T Muller, AA Irissappane, J Zhang, Y Liu AAMAS, 791-799, 2015 | 28 | 2015 |
Expressiveness modulo bisimilarity of regular expressions with parallel composition JCM Baeten, B Luttik, T Muller, P Van Tilburg Mathematical Structures in Computer Science 26 (6), 933-968, 2016 | 27 | 2016 |
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory D Wang, T Muller, J Zhang, Y Liu Proceedings of the 24th International Joint Conference on Artificial …, 2015 | 19 | 2015 |
Trust revision for conflicting sources A Jøsang, M Ivanovska, T Muller 2015 18th International Conference on Information Fusion (Fusion), 550-557, 2015 | 17 | 2015 |
On robustness of trust systems T Muller, Y Liu, S Mauw, J Zhang Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014 | 17 | 2014 |
Semantics of trust T Muller Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011 | 14 | 2011 |
The fallacy of endogenous discounting of trust recommendations T Muller, Y Liu, J Zhang Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015 | 9 | 2015 |
Information theory for subjective logic T Muller, D Wang, A Jøsang Modeling Decisions for Artificial Intelligence: 12th International …, 2015 | 8 | 2015 |
Is It Harmful When Advisors Only Pretend to Be Honest? D Wang, T Muller, J Zhang, Y Liu 30th AAAI Conference on Artificial Intelligence (AAAI), 2016 | 7 | 2016 |
A formal derivation of composite trust T Muller, P Schweitzer International Symposium on Foundations and Practice of Security, 132-148, 2012 | 7 | 2012 |
Information theoretical analysis of unfair rating attacks under subjectivity D Wang, T Muller, J Zhang, Y Liu IEEE Transactions on Information Forensics and Security 15, 816-828, 2019 | 6 | 2019 |
The reputation lag attack S Sirur, T Muller Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019 | 5 | 2019 |
An unforeseen equivalence between uncertainty and entropy T Muller Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019 | 4 | 2019 |
How to use information theory to mitigate unfair rating attacks T Muller, D Wang, Y Liu, J Zhang Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016 | 4 | 2016 |
The foul adversary: formal models N Dong, T Muller Formal Methods and Software Engineering: 20th International Conference on …, 2018 | 3 | 2018 |
Provably robust decisions based on potentially malicious sources of information T Muller, D Wang, J Sun 2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020 | 2 | 2020 |
A language for trust modelling T Muller, J Zhang, Y Liu Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary …, 2016 | 2 | 2016 |
Regulation, Policy and Cybersecurity: Hardware Security V Benson, S Furnell, D Masi, T Muller | 1 | 2021 |