Volume 5, Issue 2
مرور بر اساس
ارسال های اخیر
-
STLR: a novel danger theory based structural TLR algorithm
(Iranian Society of Cryptology, 2013-07-01)Artificial Immune Systems (AIS) have long been used in the field of computer security and especially in Intrusion Detection systems. Intrusion detection based on AISs falls into two main categories. The first generation ...
-
A computational model and convergence theorem for rumor dissemination in social networks
(Iranian Society of Cryptology, 2013-07-01)The spread of rumors, which are known as unverified statements of uncertain origin, may threaten the society and it's controlling, is important for national security councils of countries. If it would be possible to identify ...
-
GTrust: a group based trust model
(Iranian Society of Cryptology, 2013-07-01)Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is ...
-
Prediction of user's trustworthiness in web-based social networks via text mining
(Iranian Society of Cryptology, 2013-07-01)In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate ...
-
A semantic-aware role-based access control model for pervasive computing environments
(Iranian Society of Cryptology, 2013-07-01)Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access ...



