{"id":"https://openalex.org/W2100546740","doi":"https://doi.org/10.1109/glocom.2008.ecp.408","title":"A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior","display_name":"A Machine Learning Based Reputation System for Defending Against Malicious Node Behavior","publication_year":2008,"publication_date":"2008-01-01","ids":{"openalex":"https://openalex.org/W2100546740","doi":"https://doi.org/10.1109/glocom.2008.ecp.408","mag":"2100546740"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5056924090","display_name":"Rehan Akbani","orcid":"https://orcid.org/0000-0003-2686-7721"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Rehan Akbani","raw_affiliation_strings":["Department of Computer Science, University of Texas, San Antonio, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, San Antonio, TX","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011209223","display_name":"Turgay Korkmaz","orcid":"https://orcid.org/0000-0002-5529-673X"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Turgay Korkmaz","raw_affiliation_strings":["Department of Computer Science, University of Texas, San Antonio, TX"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Texas, San Antonio, TX","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5112556377","display_name":"G.V.S. Raju","orcid":null},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"G. V. S. Raju","raw_affiliation_strings":["Dept. of Electr. Eng., Univ. of Texas, San Antonio, TX"],"affiliations":[{"raw_affiliation_string":"Dept. of Electr. Eng., Univ. of Texas, San Antonio, TX","institution_ids":["https://openalex.org/I45438204"]}]}],"institution_assertions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":19,"citation_normalized_percentile":{"value":0.888215,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":87,"max":88},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/rss","display_name":"RSS","score":0.73235226},{"id":"https://openalex.org/keywords/reputation-system","display_name":"Reputation system","score":0.48348123}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8277738},{"id":"https://openalex.org/C2385561","wikidata":"https://www.wikidata.org/wiki/Q45432","display_name":"RSS","level":2,"score":0.73235226},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.7249136},{"id":"https://openalex.org/C12267149","wikidata":"https://www.wikidata.org/wiki/Q282453","display_name":"Support vector machine","level":2,"score":0.72001964},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.71525156},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.58381844},{"id":"https://openalex.org/C2781218421","wikidata":"https://www.wikidata.org/wiki/Q2892532","display_name":"Reputation system","level":3,"score":0.48348123},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.46966684},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.46179083},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4521603},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.410019},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.13926509},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.09625095},{"id":"https://openalex.org/C36289849","wikidata":"https://www.wikidata.org/wiki/Q34749","display_name":"Social science","level":1,"score":0.0},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/glocom.2008.ecp.408","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.7,"display_name":"Peace, justice, and strong institutions"}],"grants":[],"datasets":[],"versions":[],"referenced_works_count":11,"referenced_works":["https://openalex.org/W11319819","https://openalex.org/W1600852954","https://openalex.org/W1604936042","https://openalex.org/W1946238955","https://openalex.org/W2097726984","https://openalex.org/W2120068008","https://openalex.org/W2129124450","https://openalex.org/W2131640330","https://openalex.org/W2141703670","https://openalex.org/W2156523427","https://openalex.org/W4254761308"],"related_works":["https://openalex.org/W808860418","https://openalex.org/W2952470056","https://openalex.org/W2780022989","https://openalex.org/W2768561819","https://openalex.org/W2517839752","https://openalex.org/W2294042815","https://openalex.org/W2157328853","https://openalex.org/W2142891234","https://openalex.org/W1986034399","https://openalex.org/W126629215"],"abstract_inverted_index":{"Reputation":[0],"systems":[1],"(RS)":[2],"are":[3],"designed":[4,52],"to":[5,43,64],"detect":[6],"malicious":[7,165,175],"nodes":[8,166,176],"in":[9,145,177],"a":[10,38,76],"network":[11,179],"and":[12,40,90,104,127,130,150,164],"thwart":[13],"their":[14],"attacks,":[15],"such":[16],"as":[17,110],"the":[18,83,87,99,111,114,118,123,136,146,172,178],"spreading":[19],"of":[20,37,69,85,95,101,113,138,174],"viruses":[21],"or":[22,24,58],"worms,":[23],"attacking":[25],"known":[26],"vulnerabilities.":[27],"They":[28],"do":[29],"this":[30,72,102],"by":[31,53],"collecting":[32],"information":[33],"about":[34],"past":[35],"transactions":[36],"node":[39],"utilizing":[41],"that":[42,60,81,152],"predict":[44],"its":[45],"future":[46],"behavior.":[47],"Traditionally,":[48],"RSs":[49],"have":[50],"been":[51],"manually":[54],"devising":[55,86],"specific":[56],"models":[57],"equations":[59],"use":[61],"historical":[62],"data":[63],"defend":[65],"against":[66,92],"certain":[67],"types":[68],"attacks.":[70,96],"In":[71],"paper,":[73],"we":[74],"propose":[75,105],"machine":[77],"learning":[78],"based":[79,125],"RS":[80,88,126,140,143,154,159],"automates":[82],"process":[84],"model":[89],"defends":[91],"many":[93],"patterns":[94],"We":[97,116,134],"discuss":[98],"merits":[100],"approach":[103],"using":[106],"support":[107],"vector":[108],"machines":[109],"basis":[112],"RS.":[115],"delineated":[117],"factors":[119],"associated":[120],"with":[121,141,167],"building":[122],"SVM":[124],"then":[128],"proposed":[129],"evaluated":[131],"our":[132,139,153],"technique.":[133],"compared":[135],"performance":[137],"another":[142],"found":[144],"literature,":[147],"called":[148],"TrustGuard,":[149],"showed":[151],"significantly":[155],"outperforms":[156],"TrustGuard.":[157],"Our":[158],"correctly":[160],"distinguishes":[161],"between":[162],"good":[163],"high":[168],"accuracy,":[169],"even":[170],"when":[171],"proportion":[173],"is":[180],"very":[181],"high.":[182]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2100546740","counts_by_year":[{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2015,"cited_by_count":2},{"year":2014,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2024-12-21T21:41:13.901297","created_date":"2016-06-24"}