Author:
Sagar Subhash,Mahmood Adnan,Sheng Quan Z.
Publisher
Springer Nature Switzerland
Reference26 articles.
1. L. Atzori, A. Iera, G. Morabito, SIoT: Giving a social structure to the internet of things. IEEE Commun. Lett. 15, 1193–1195 (2011)
2. S.A. Hamad, Q.Z. Sheng, W.E. Zhang, S. Nepal, Realizing an internet of secure things: A survey on issues and enabling technologies. IEEE Commun. Surv. Tutorials 22(2), 1372–1391 (2020)
3. L. Nie, Y. Wu, X. Wang, L. Guo, G. Wang, X. Gao, S. Li, Intrusion detection for secure social internet of things based on collaborative edge computing: A generative adversarial network-based approach. IEEE Trans. Comput. Soc. Syst. 1–12 (2021)
4. C. Marche, M. Nitti, Trust-related attacks and their detection: A trust management model for the social IoT. IEEE Trans. Network Serv. Manage. 18(3), 3297–3308 (2021)
5. S. Aalibagi, H. Mahyar, A. Movaghar, H.E. Stanley, A matrix factorization model for hellinger-based trust management in social internet of things. IEEE Trans. Dependable Secure Comput. 1–1 (2021)