


default search action
Audun Jøsang
Person information
- affiliation: University of Oslo, Norway
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j21]Zhen Guo, Zelin Wan
, Qisheng Zhang, Xujiang Zhao, Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong
, Feng Chen, Jin-Hee Cho
:
A survey on uncertainty reasoning and quantification in belief theory and its application to deep learning. Inf. Fusion 101: 101987 (2024) - [c123]Robert Andrew Chetwyn
, Martin Eian
, Audun Jøsang
:
Onto Hunt - A Semantic Reasoning Approach to Cyber Threat Hunting with Indicators of Behaviour. CSR 2024: 853-859 - [c122]Robert Andrew Chetwyn
, Martin Eian
, Audun Jøsang
:
Modelling Indicators of Behaviour for Cyber Threat Hunting via Sysmon. EICC 2024: 95-104 - [c121]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. ICLR 2024 - [i16]Lakshmi Rama Kiran Pasumarthy, Hisham Ali, William J. Buchanan, Jawad Ahmad, Audun Jøsang, Vasileios Mavroeidis, Mouad Lemoudden:
TIPS: Threat Sharing Information Platform for Enhanced Security. CoRR abs/2403.05210 (2024) - [i15]Changbin Li, Kangshuo Li, Yuzhe Ou, Lance M. Kaplan, Audun Jøsang, Jin-Hee Cho, Dong Hyun Jeong, Feng Chen:
Hyper Evidential Deep Learning to Quantify Composite Classification Uncertainty. CoRR abs/2404.10980 (2024) - [i14]Qi Zhang, Lance M. Kaplan, Audun Jøsang, Dong Hyun Jeong, Feng Chen, Jin-Hee Cho:
Winning the Social Media Influence Battle: Uncertainty-Aware Opinions to Understand and Spread True Information via Competitive Influence Maximization. CoRR abs/2404.18826 (2024) - 2023
- [j20]Dong Hyun Jeong
, Jin-Hee Cho, Feng Chen, Lance M. Kaplan, Audun Jøsang, Soo-Yeon Ji
:
Interactive Web-Based Visual Analysis on Network Traffic Data. Inf. 14(1): 16 (2023) - [c120]Dinh Uy Tran
, Sigrid Haug Selnes
, Audun Jøsang
, Janne Merete Hagen:
An Opportunity-Based Approach to Information Security Risk. ESORICS Workshops (2) 2023: 7-25 - [c119]Dinh Uy Tran
, Audun Jøsang
:
Business Language for Information Security. HAISA 2023: 169-180 - [c118]Xujiang Zhao, Xuchao Zhang, Chen Zhao, Jin-Hee Cho, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang, Haifeng Chen, Feng Chen:
Multi-Label Temporal Evidential Neural Networks for Early Event Detection. ICASSP 2023: 1-5 - [c117]Zhen Guo, Qi Zhang, Qisheng Zhang, Lance M. Kaplan, Audun Jøsang, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Detecting Intents of Fake News Using Uncertainty-Aware Deep Reinforcement Learning. ICWS 2023: 722-724 - [i13]Zhen Guo, Qi Zhang, Xinwei An, Qisheng Zhang, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
Uncertainty-Aware Reward-based Deep Reinforcement Learning for Intent Analysis of Social Media Information. CoRR abs/2302.10195 (2023) - [i12]Dong Hyun Jeong, Jin-Hee Cho, Feng Chen, Audun Jøsang, Soo-Yeon Ji:
Active Learning on Neural Networks through Interactive Generation of Digit Patterns and Visual Representation. CoRR abs/2310.01580 (2023) - 2022
- [j19]Siri Bromander, Morton Swimmer, Lilly Pijnenburg Muller, Audun Jøsang, Martin Eian, Geir Skjøtskift, Fredrik Borg:
Investigating Sharing of Cyber Threat Intelligence and Proposing A New Data Model for Enabling Automation in Knowledge Representation and Exchange. DTRAP 3(1): 6:1-6:22 (2022) - [c116]Audun Jøsang, Jin-Hee Cho, Feng Chen:
Noninformative Prior Weights for Dirichlet PDFs*. MFI 2022: 1-6 - [i11]Zhen Guo
, Zelin Wan, Qisheng Zhang, Xujiang Zhao, Feng Chen, Jin-Hee Cho, Qi Zhang, Lance M. Kaplan, Dong Hyun Jeong, Audun Jøsang:
A Survey on Uncertainty Reasoning and Quantification for Decision Making: Belief Theory Meets Deep Learning. CoRR abs/2206.05675 (2022) - [i10]Qisheng Zhang, Zhen Guo
, Audun Jøsang, Lance M. Kaplan, Feng Chen, Dong Hyun Jeong, Jin-Hee Cho:
PPO-UE: Proximal Policy Optimization via Uncertainty-Aware Exploration. CoRR abs/2212.06343 (2022) - 2021
- [c115]Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang:
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. CyCon 2021: 327-352 - [e6]Audun Jøsang
, Lynn Futcher
, Janne Merete Hagen
:
ICT Systems Security and Privacy Protection - 36th IFIP TC 11 International Conference, SEC 2021, Oslo, Norway, June 22-24, 2021, Proceedings. IFIP Advances in Information and Communication Technology 625, Springer 2021, ISBN 978-3-030-78119-4 [contents] - [i9]Vasileios Mavroeidis, Ryan Hohimer, Tim Casey, Audun Jøsang:
Threat Actor Type Inference and Characterization within Cyber Threat Intelligence. CoRR abs/2103.02301 (2021) - [i8]Vasileios Mavroeidis, Audun Jøsang:
Data-Driven Threat Hunting Using Sysmon. CoRR abs/2103.15194 (2021) - 2020
- [c114]Audun Jøsang, Viktoria Stray, Hanne Rygge:
Threat Poker: Gamification of Secure Agile. WISE 2020: 142-155 - [i7]Fabio Massimo Zennaro, Audun Jøsang:
Using Subjective Logic to Estimate Uncertainty in Multi-Armed Bandit Problems. CoRR abs/2008.07386 (2020)
2010 – 2019
- 2019
- [j18]Fabio Massimo Zennaro
, Magdalena Ivanovska
, Audun Jøsang
:
An empirical evaluation of the approximation of subjective logic operators using Monte Carlo simulations. Int. J. Approx. Reason. 111: 56-77 (2019) - [c113]Audun Jøsang:
Belief Mosaics of Subjective Opinions. FUSION 2019: 1-8 - 2018
- [j17]Tore Pedersen
, Christian Johansen
, Audun Jøsang
:
Behavioural Computer Science: an agenda for combining modelling of human and system behaviours. Hum. centric Comput. Inf. Sci. 8: 7 (2018) - [c112]Vasileios Mavroeidis, Kamer Vishi
, Audun Jøsang
:
A Framework for Data-Driven Physical Security and Insider Threat Detection. ASONAM 2018: 1108-1115 - [c111]Francesco Santini
, Audun Jøsang
, Maria Silvia Pini:
Are My Arguments Trustworthy? Abstract Argumentation with Subjective Logic. FUSION 2018: 1982-1989 - [c110]Audun Jøsang
, Jin-Hee Cho, Feng Chen:
Uncertainty Characteristics of Subjective Opinions. FUSION 2018: 1998-2005 - [c109]Vasileios Mavroeidis, Audun Jøsang
:
Data-Driven Threat Hunting Using Sysmon. ICCSP 2018: 82-88 - [c108]Allen Parrish, John Impagliazzo, Rajendra K. Raj
, Henrique M. Dinis Santos
, Muhammad Rizwan Asghar
, Audun Jøsang
, Teresa Susana Mendes Pereira
, Eliana Stavrou:
Global perspectives on cybersecurity education for 2030: a case for a meta-discipline. ITiCSE (Companion) 2018: 36-54 - [c107]Allen Parrish, John Impagliazzo, Rajendra K. Raj
, Henrique M. Dinis Santos
, Muhammad Rizwan Asghar
, Audun Jøsang, Teresa Susana Mendes Pereira
, Vítor J. Sá
, Eliana Stavrou:
Global perspectives on cybersecurity education. ITiCSE 2018: 340-341 - [c106]Hanne Rygge, Audun Jøsang
:
Threat Poker: Solving Security and Privacy Threats in Agile Software Development. NordSec 2018: 468-483 - [i6]Vasileios Mavroeidis, Kamer Vishi, Mateusz D. Zych, Audun Jøsang:
The Impact of Quantum Computing on Present Cryptography. CoRR abs/1804.00200 (2018) - [i5]Vasileios Mavroeidis, Kamer Vishi, Audun Jøsang:
A Framework for Data-Driven Physical Security and Insider Threat Detection. CoRR abs/1809.09434 (2018) - 2017
- [c105]Audun Jøsang
, Dongxia Wang, Jie Zhang:
Multi-source fusion in subjective logic. FUSION 2017: 1-8 - [c104]Audun Jøsang
, Jie Zhang, Dongxia Wang:
Multi-source trust revision. FUSION 2017: 1-8 - [c103]Kamer Vishi
, Audun Jøsang
:
A new approach for multi-biometric fusion based on subjective logic. IML 2017: 68:1-68:9 - [c102]Magdalena Ivanovska, Audun Jøsang
, Jie Zhang, Shuo Chen:
Joint Subjective Opinions. MDAI 2017: 220-233 - [c101]Denis Migdal
, Christian Johansen
, Audun Jøsang
:
Offline Trusted Device and Proxy Architecture Based on a new TLS Switching Technique. SIoT 2017: 10-19 - [c100]Audun Jøsang
:
A Consistent Definition of Authorization. STM 2017: 134-144 - [c99]László Erdödi, Audun Jøsang
:
Exploit Prevention, Quo Vadis? STM 2017: 180-190 - 2016
- [b1]Audun Jøsang
:
Subjective Logic - A Formalism for Reasoning Under Uncertainty. Artificial Intelligence: Foundations, Theory, and Algorithms, Springer 2016, ISBN 978-3-319-42335-7, pp. 1-326 - [c98]Denis Migdal
, Christian Johansen
, Audun Jøsang
:
DEMO: OffPAD - Offline Personal Authenticating Device with Applications in Hospitals and e-Banking. CCS 2016: 1847-1849 - [c97]Audun Jøsang:
Decision making under vagueness and uncertainty. FUSION 2016: 496-503 - [c96]Audun Jøsang, Lance M. Kaplan:
Principles of subjective networks. FUSION 2016: 1292-1299 - [c95]Christian Johansen
, Tore Pedersen
, Audun Jøsang
:
Towards Behavioural Computer Science. IFIPTM 2016: 154-163 - [c94]Magdalena Ivanovska, Audun Jøsang, Francesco Sambo:
Bayesian Deduction with Subjective Opinions. KR 2016: 484-493 - [c93]Audun Jøsang
:
Generalising Bayes' theorem in subjective logic. MFI 2016: 462-469 - [c92]Magdalena Ivanovska, Audun Jøsang:
Predictive Reasoning in Subjective Bayesian Networks. NIP 2016 - [c91]Siri Bromander, Audun Jøsang, Martin Eian:
Semantic Cyberthreat Modelling. STIDS 2016: 74-78 - [i4]Mohd Anuar Mat Isa
, Ramlan Mahmod, Nur Izura Udzir, Jamalul-lail Ab Manan, Audun Jøsang, Ali Dehghan Tanha:
A Formal Calculus for International Relations Computation and Evaluation. CoRR abs/1606.02239 (2016) - 2015
- [j16]Ahmad Abdel-Hafez
, Yue Xu
, Audun Jøsang
:
A normal-distribution based rating aggregation method for generating product reputations. Web Intell. 13(1): 43-51 (2015) - [c90]Ahmad Abdel-Hafez, Yue Xu
, Audun Jøsang
:
An accurate rating aggregation method for generating item reputation. DSAA 2015: 1-8 - [c89]Lance M. Kaplan, Magdalena Ivanovska, Audun Jøsang, Francesco Sambo:
Towards subjective networks: Extending conditional reasoning in subjective logic. FUSION 2015: 319-326 - [c88]Audun Jøsang, Magdalena Ivanovska, Tim Muller:
Trust revision for conflicting sources. FUSION 2015: 550-557 - [c87]Magdalena Ivanovska, Audun Jøsang
, Lance M. Kaplan, Francesco Sambo:
Subjective Networks: Perspectives and Challenges. GKR 2015: 107-124 - [c86]Audun Jøsang
, Marte Ødegaard, Erlend Oftedal:
Cybersecurity Through Secure Software Development. World Conference on Information Security Education 2015: 53-63 - [c85]Md. Sadek Ferdous
, Gethin Norman
, Audun Jøsang
, Ron Poet:
Mathematical Modelling of Trust Issues in Federated Identity Management. IFIPTM 2015: 13-29 - [c84]Ijlal Loutfi, Audun Jøsang
:
1, 2, Pause: Lets Start by Meaningfully Navigating the Current Online Authentication Solutions Space. IFIPTM 2015: 165-176 - [c83]Tim Muller, Dongxia Wang, Audun Jøsang
:
Information Theory for Subjective Logic. MDAI 2015: 230-242 - [c82]Ijlal Loutfi, Audun Jøsang
:
FIDO Trust Requirements. NordSec 2015: 139-155 - 2014
- [j15]Audun Jøsang
:
Identity management and trusted interaction in internet and mobile computing. IET Inf. Secur. 8(2): 67-79 (2014) - [c81]Aude Plateaux, Patrick Lacharme, Audun Jøsang
, Christophe Rosenberger
:
One-Time Biometrics for Online Banking and Electronic Payment Authentication. CD-ARES 2014: 179-193 - [c80]Audun Jøsang
:
Assurance Requirements for Mutual User and Service Provider Authentication. DPM/SETOP/QASA 2014: 26-44 - [c79]Christian Johansen
, Audun Jøsang
:
Probabilistic Modelling of Humans in Security Ceremonies. DPM/SETOP/QASA 2014: 277-292 - [c78]Erik Blasch, Audun Jøsang, Jean Dezert, Paulo C. G. Costa, Anne-Laure Jousselme:
URREF self-confidence in information fusion trust. FUSION 2014: 1-8 - [c77]Audun Jøsang, Thorvald H. Munch-Moller:
Biometric data fusion based on subjective logic. FUSION 2014: 1-8 - [c76]Endang Djuana
, Yue Xu
, Yuefeng Li, Audun Jøsang
:
A Combined Method for Mitigating Sparsity Problem in Tag Recommendation. HICSS 2014: 906-915 - [c75]Ahmad Abdel-Hafez
, Yue Xu
, Audun Jøsang
:
A rating aggregation method for generating product reputations. HT 2014: 291-293 - [c74]Ahmad Abdel-Hafez
, Yue Xu
, Audun Jøsang
:
A Normal-Distribution Based Reputation Model. TrustBus 2014: 144-155 - [c73]Nan Tian, Yue Xu, Yuefeng Li, Ahmad Abdel-Hafez, Audun Jøsang:
Product Feature Taxonomy Learning based on User Reviews. WEBIST (2) 2014: 184-192 - [c72]Nan Tian, Yue Xu
, Yuefeng Li, Ahmad Abdel-Hafez
, Audun Jøsang
:
Generating Product Feature Hierarchy from Product Reviews. WEBIST (Revised Selected Papers) 2014: 264-278 - [e5]Ali Miri, Urs Hengartner, Nen-Fu Huang, Audun Jøsang, Joaquín García-Alfaro:
2014 Twelfth Annual International Conference on Privacy, Security and Trust, Toronto, ON, Canada, July 23-24, 2014. IEEE Computer Society 2014, ISBN 978-1-4799-3502-4 [contents] - 2013
- [c71]Audun Jøsang, Paulo Cesar G. da Costa, Erik Blasch:
Determining model correctness for situations of belief fusion. FUSION 2013: 1886-1893 - [c70]Endang Djuana
, Yue Xu, Yuefeng Li, Audun Jøsang, Clive Cox:
An Ontology-based Method for Sparsity Problem in Tag Recommendation. ICEIS (2) 2013: 467-474 - [c69]Henning Klevjer, Kent A. Varmedal, Audun Jøsang:
Extended HTTP Digest Access Authentication. IDMAN 2013: 83-96 - [c68]Hani Alzaid, Manal Alfaraj, Sebastian Ries, Audun Jøsang
, Muneera Albabtain, Alhanof Abuhaimed:
Reputation-Based Trust Systems for Wireless Sensor Networks: A Comprehensive Review. IFIPTM 2013: 66-82 - [c67]Audun Jøsang
, Guibing Guo, Maria Silvia Pini, Francesco Santini
, Yue Xu
:
Combining Recommender and Reputation Systems to Produce Better Online Advice. MDAI 2013: 126-138 - [c66]Kent Are Varmedal, Henning Klevjer, Joakim Hovlandsvåg, Audun Jøsang
, Johann Vincent, Laurent Miralabé:
The OffPAD: Requirements and Usage. NSS 2013: 80-93 - [e4]Audun Jøsang, Pierangela Samarati, Marinella Petrocchi:
Security and Trust Management - 8th International Workshop, STM 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers. Lecture Notes in Computer Science 7783, Springer 2013, ISBN 978-3-642-38003-7 [contents] - 2012
- [j14]Xujuan Zhou
, Yue Xu
, Yuefeng Li, Audun Jøsang
, Clive Cox:
The state-of-the-art in personalized recommender systems for social networking. Artif. Intell. Rev. 37(2): 119-132 (2012) - [j13]Audun Jøsang
, Simon Pope:
Dempster's Rule as Seen by Little Colored Balls. Comput. Intell. 28(4): 453-474 (2012) - [c65]Audun Jøsang, Robin Hankin:
Interpretation and fusion of hyper opinions in subjective logic. FUSION 2012: 1225-1232 - [c64]Audun Jøsang
, Tanja Azderska, Stephen Marsh:
Trust Transitivity and Conditional Belief Reasoning. IFIPTM 2012: 68-83 - [c63]Audun Jøsang
:
Robustness of Trust and Reputation Systems: Does It Matter? IFIPTM 2012: 253-262 - [c62]Audun Jøsang
, Kent A. Varmedal, Christophe Rosenberger
, Rajendra Kumar:
Service provider authentication assurance. PST 2012: 203-210 - [e3]Audun Jøsang
, Bengt Carlsson:
Secure IT Systems - 17th Nordic Conference, NordSec 2012, Karlskrona, Sweden, October 31 - November 2, 2012. Proceedings. Lecture Notes in Computer Science 7617, Springer 2012, ISBN 978-3-642-34209-7 [contents] - 2011
- [c61]Audun Jøsang, Zied Elouedi:
Redefining material implication with subjective logic. FUSION 2011: 1-6 - [c60]Endang Djuana
, Yue Xu
, Yuefeng Li, Audun Jøsang
:
Ontology Learning from User Tagging for Tag Recommendation Making. Web Intelligence/IAT Workshops 2011: 310-313 - [c59]Audun Jøsang
, Walter Quattrociocchi
, Dino Karabeg:
Taste and Trust. IFIPTM 2011: 312-322 - [c58]Christian Müller-Schloer, Wolfgang Reif, Audun Jøsang, Jan-Philipp Steghöfer:
Workshop Message. SASO Workshops 2011: 17 - [c57]Audun Jøsang
:
Trust Extortion on the Internet. STM 2011: 6-21 - 2010
- [j12]Audun Jøsang
, Javier Díaz, Maria Rifqi:
Cumulative and averaging fusion of beliefs. Inf. Fusion 11(2): 192-200 (2010) - [j11]Audun Jøsang
, Glenn Bewsell:
Guest Editors' Introduction: Trust and Trust Management. J. Theor. Appl. Electron. Commer. Res. 5(2) (2010) - [c56]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
:
SimTrust: A New Method of Trust Network Generation. EUC 2010: 718-722 - [c55]Audun Jøsang, Stephen O'Hara:
The base rate fallacy in belief reasoning. FUSION 2010: 1-8 - [c54]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
A Review of Trust in Online Social Networks to Explore New Research Agenda. International Conference on Internet Computing 2010: 123-128 - [c53]Touhid Bhuiyan, Yue Xu, Audun Jøsang:
The Potential Relationship Between Trust and Interest Similarity. International Conference on Internet Computing 2010: 203-208 - [c52]Mohammed Alzomai, Bander AlFayyadh, Audun Jøsang:
Display security for online transactions: SMS-based authentication scheme. ICITST 2010: 1-7 - [c51]Jonathan Scudder, Audun Jøsang
:
Personal Federation Control with the Identity Dashboard. IDMAN 2010: 85-99 - [c50]Audun Jøsang
, Stephen O'Hara:
Multiplication of Multinomial Subjective Opinions. IPMU (1) 2010: 248-257 - [c49]Mohammed Al Zomai, Audun Jøsang
:
The Mobile Phone as a Multi OTP Device Using Trusted Computing. NSS 2010: 75-82 - [c48]Audun Jøsang:
Robustness of Trust and Reputation Systems. SASO Workshops 2010: 159 - [c47]Audun Jøsang
, Lothar Fritsch, Tobias Mahler:
Privacy Policy Referencing. TrustBus 2010: 129-140 - [c46]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
, Huizhi Liang
, Clive Cox:
Developing Trust Networks Based on User Tagging Information for Recommendation Making. WISE 2010: 357-364 - [p1]Touhid Bhuiyan, Audun Jøsang, Yue Xu:
Managing Trust in Online Social Networks. Handbook of Social Network Technologies 2010: 471-496 - [e2]Masakatsu Nishigaki, Audun Jøsang
, Yuko Murayama, Stephen Marsh:
Trust Management IV - 4th IFIP WG 11.11 International Conference, IFIPTM 2010, Morioka, Japan, June 16-18, 2010. Proceedings. IFIP Advances in Information and Communication Technology 321, Springer 2010, ISBN 978-3-642-13445-6 [contents]
2000 – 2009
- 2009
- [j10]Suriadi Suriadi, Ernest Foo
, Audun Jøsang
:
A user-centric federated single sign-on system. J. Netw. Comput. Appl. 32(2): 388-401 (2009) - [j9]Bandar Alhaqbani, Audun Jøsang
, Colin J. Fidge
:
A Medical Data Reliability Assessment Model. J. Theor. Appl. Electron. Commer. Res. 4(2): 64-63 (2009) - [j8]Audun Jøsang:
Conditional Reasoning with Subjective Logic. J. Multiple Valued Log. Soft Comput. 15(1): 5-38 (2009) - [c45]Audun Jøsang:
Fission of opinions in subjective logic. FUSION 2009: 1911-1918 - [c44]Md. Sadek Ferdous
, Audun Jøsang
, Kuldeep Singh, Ravishankar Borgaonkar:
Security Usability of Petname Systems. NordSec 2009: 44-59 - [c43]Kuldeep Singh, Audun Jøsang, Md. Sadek Ferdous
, Ravishankar Borgaonkar:
Spam filter optimality based on signal detection theory. SIN 2009: 219-224 - [c42]Audun Jøsang
, Walter Quattrociocchi
:
Advanced Features in Bayesian Reputation Systems. TrustBus 2009: 105-114 - [e1]Audun Jøsang, Torleiv Maseng, Svein J. Knapskog:
Identity and Privacy in the Internet Age, 14th Nordic Conference on Secure IT Systems, NordSec 2009, Oslo, Norway, 14-16 October 2009. Proceedings. Lecture Notes in Computer Science 5838, Springer 2009, ISBN 978-3-642-04765-7 [contents] - 2008
- [c41]Audun Jøsang, Bander AlFayyadh:
Robust WYSIWYS: A Method for Ensuring that What You See Is What You Sign. AISC 2008: 53-58 - [c40]Mohammed Al Zomai, Bander AlFayyadh, Audun Jøsang, Adrian McCullagh:
An Experimental Investigation of the Usability of Transaction Authorization in Online Bank Security Systems. AISC 2008: 65-73 - [c39]Touhid Bhuiyan
, Yue Xu
, Audun Jøsang
:
Integrating Trust with Public Reputation in Location-Based Social Networks for Recommendation Making. Web Intelligence/IAT Workshops 2008: 107-110 - [c38]Audun Jøsang
, Xixi Luo, Xiaowu Chen:
Continuous Ratings in Discrete Bayesian Reputation Systems. IFIPTM 2008: 151-166 - [c37]