Author:
Lin Hui,Hu Jia,Tian Youliang,Yang Li,Xu Li
Funder
National Natural Science Foundation of China
Pilot Project of Fujian Province (formal industry key project)
Foundation of Science and Technology on Information Assurance Laboratory
Fujian Provincial Key Laboratory of Network Security and Cryptology
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference34 articles.
1. Security in cloud computing: opportunities and challenges;Ali;Inf. Sci.,2015
2. Addressing data veracity in big data applications;Aman,2014
3. Data security – challenges and research opportunities;Bertino,2014
4. Increasing the veracity of event detection on social media networks through user trust modeling;Bodnar,2014
5. κ -Fuzzytrust: efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph;Chen;Inf. Sci.,2015
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献