HCI Bibliography : Search Results skip to search form | skip to results |
Database updated: 2016-05-10 Searches since 2006-12-01: 32,815,462
director@hcibib.org
Hosted by ACM SIGCHI
The HCI Bibliogaphy was moved to a new server 2015-05-12 and again 2016-01-05, substantially degrading the environment for making updates.
There are no plans to add to the database.
Please send questions or comments to director@hcibib.org.
Query: kantola_r* Results: 2 Sorted by: Date  Comments?
Help Dates
Limit:   
[1] A generic solution for unwanted traffic control through trust management Cyber, Physical and Social Computing / Yan, Zheng / Kantola, Raimo / Shen, Yue New Review of Hypermedia and Multimedia 2014-01-02 v.20 n.1 p.25-51
Link to Article at Taylor & Francis
Summary: The Internet has dramatically changed our daily life. But it is also bogged down by unwanted traffic, which is malicious, harmful or unexpected for its receivers. In order to control the unwanted traffic over the Internet, especially the mobile Internet, in this paper, we propose a generic unwanted traffic control (UTC) solution through trust management. It can control unwanted traffic from its source to destinations in a personalized manner according to trust evaluation at a Global Trust Operator, traffic and behavior analysis at hosts and traffic observation in the Internet. Thus, it can conduct UTC by integrating distributed and centralized functions and supporting both defensive and offensive approaches. Simulation based evaluation shows that the solution is effective with regard to accuracy and efficiency for botnet intrusion and DDoS intrusion via reflectors. It is also robust against a number of malicious system attacks, such as hide evidence attack, bad mouthing attack, on-off attack, malicious attack by an Internet Service Provider and combinations of the above, playing in conjunction with traffic intrusions. Meanwhile, the solution can provide a personalized UTC based on unwanted traffic detection behaviors.

[2] EDITED BOOK Mobile Social Networking: An Innovative Approach Computational Social Sciences / Chin, Alvin / Zhang, Daqing 2014 p.243 Springer
ISBN: 978-1-4614-8578-0 (Print) 978-1-4614-8579-7 (Online)
Link to Digital Content at Springer
Introduction (1-7)
	+ Chin, Alvin
	+ Zhang, Daqing
Socially Aware Computing: Concepts, Technologies, and Practices (9-23)
	+ Yu, Zhiwen
	+ Zhou, Xingshe
Ephemeral Social Networks (25-64)
	+ Chin, Alvin
Social Behavior in Mobile Social Networks: Characterizing Links, Roles, and Communities (65-78)
	+ Atzmueller, Martin
Mobile Social Service Design for Special Context (79-107)
	+ Liu, Huanglingzi
	+ Wang, Wei
	+ Liu, Dong
	+ Wang, Hao
	+ Liu, Ying
Exploiting Personal and Community Context in Mobile Social Networks (109-138)
	+ Zhang, Daqing
	+ Yu, Zhiyong
	+ Guo, Bin
	+ Wang, Zhu
Enhancing Mobile Social Networks with Ambient Intelligence (139-163)
	+ Doolin, Kevin
	+ Taylor, Nick
	+ Crotty, Micheal
	+ Roddy, Mark
	+ Jennings, Edel
	+ Roussaki, Ioanna
	+ McKitterick, David
Data Analysis on Location-Based Social Networks (165-194)
	+ Gao, Huiji
	+ Liu, Huan
Towards Trustworthy Mobile Social Networking (195-235)
	+ Yan, Zheng
	+ Niemi, Valtteri
	+ Chen, Yu
	+ Zhang, Peng
	+ Kantola, Raimo
Conclusions (237-243)
	+ Chin, Alvin
	+ Zhang, Daqing