2014
DOI: 10.1007/978-3-662-45523-4_1
|View full text |Cite
|
Sign up to set email alerts
|

Evolving a Trust Model for Peer-to-Peer Networks Using Genetic Programming

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
4
1

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 17 publications
0
3
0
Order By: Relevance
“…The amount of free‐rider was reduced, and the peers were enabled to share their own resource. Tahta et al investigated the usage of genetic programming approach and evaluated the trustworthiness of the peers without requiring a central authority. A trust management model was proposed based on the previous interactions and recommendations.…”
Section: Related Workmentioning
confidence: 99%
“…The amount of free‐rider was reduced, and the peers were enabled to share their own resource. Tahta et al investigated the usage of genetic programming approach and evaluated the trustworthiness of the peers without requiring a central authority. A trust management model was proposed based on the previous interactions and recommendations.…”
Section: Related Workmentioning
confidence: 99%
“…This paper proposes a genetic programming (GP) based trust management model (GenTrust), extending our previous work [4] with greater experimental verification and analysis on features. The proposed model helps to identify malicious peers and find trustworthy peers using the features derived from peer interactions and recommendations.…”
Section: Q3mentioning
confidence: 99%
“…While MEP (a technique that allows us to encode multiple expressions) is more successful in the identification of some attack types, LGP is better in the detection of other types. Tahta et al (2014) employ GP in order to differentiate malicious peers from benign ones in peer-to-peer (P2P) networks. They run P2P simulation for each individual to see how derived solutions are effective in preventing malicious peers from participating in the network.…”
Section: Intrusion Detection On Conventional Networkmentioning
confidence: 99%