{"id":"https://openalex.org/W3033138826","doi":"https://doi.org/10.1109/csnet47905.2019.9108945","title":"Trust-based collaborative defences in multi network alliances","display_name":"Trust-based collaborative defences in multi network alliances","publication_year":2019,"publication_date":"2019-10-01","ids":{"openalex":"https://openalex.org/W3033138826","doi":"https://doi.org/10.1109/csnet47905.2019.9108945","mag":"3033138826"},"language":"en","primary_location":{"id":"doi:10.1109/csnet47905.2019.9108945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet47905.2019.9108945","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 3rd Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://pure.uva.nl/ws/files/58759267/09108945.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5010931830","display_name":"Ralph Koning","orcid":"https://orcid.org/0000-0002-3870-4455"},"institutions":[{"id":"https://openalex.org/I55106644","display_name":"Amsterdam University of Applied Sciences","ror":"https://ror.org/00y2z2s03","country_code":"NL","type":"education","lineage":["https://openalex.org/I55106644"]},{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Ralph Koning","raw_affiliation_strings":["University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","institution_ids":["https://openalex.org/I55106644"]},{"raw_affiliation_string":"System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5082776416","display_name":"Ameneh Deljoo","orcid":null},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]},{"id":"https://openalex.org/I55106644","display_name":"Amsterdam University of Applied Sciences","ror":"https://ror.org/00y2z2s03","country_code":"NL","type":"education","lineage":["https://openalex.org/I55106644"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Ameneh Deljoo","raw_affiliation_strings":["University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","institution_ids":["https://openalex.org/I55106644"]},{"raw_affiliation_string":"System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085977260","display_name":"Lydia Meijer","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Lydia Meijer","raw_affiliation_strings":["TNO,Groningen,The Netherlands","TNO, Groningen, The Netherlands"],"affiliations":[{"raw_affiliation_string":"TNO,Groningen,The Netherlands","institution_ids":[]},{"raw_affiliation_string":"TNO, Groningen, The Netherlands","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5039787606","display_name":"Cees de Laat","orcid":"https://orcid.org/0009-0009-3025-2974"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]},{"id":"https://openalex.org/I55106644","display_name":"Amsterdam University of Applied Sciences","ror":"https://ror.org/00y2z2s03","country_code":"NL","type":"education","lineage":["https://openalex.org/I55106644"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Cees de Laat","raw_affiliation_strings":["University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","institution_ids":["https://openalex.org/I55106644"]},{"raw_affiliation_string":"System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5007029875","display_name":"Paola Grosso","orcid":"https://orcid.org/0000-0003-4600-9812"},"institutions":[{"id":"https://openalex.org/I887064364","display_name":"University of Amsterdam","ror":"https://ror.org/04dkp9463","country_code":"NL","type":"education","lineage":["https://openalex.org/I887064364"]},{"id":"https://openalex.org/I55106644","display_name":"Amsterdam University of Applied Sciences","ror":"https://ror.org/00y2z2s03","country_code":"NL","type":"education","lineage":["https://openalex.org/I55106644"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Paola Grosso","raw_affiliation_strings":["University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands"],"affiliations":[{"raw_affiliation_string":"University of Amsterdam,System and Network Engineering Lab,Amsterdam,The Netherlands","institution_ids":["https://openalex.org/I55106644"]},{"raw_affiliation_string":"System and Network Engineering Lab, University of Amsterdam, Amsterdam, The Netherlands","institution_ids":["https://openalex.org/I887064364"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5010931830"],"corresponding_institution_ids":["https://openalex.org/I55106644","https://openalex.org/I887064364"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":1,"citation_normalized_percentile":{"value":0.38114904,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":95},"biblio":{"volume":null,"issue":null,"first_page":"42","last_page":"49"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9990000128746033,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10742","display_name":"Peer-to-Peer Network Technologies","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.983299970626831,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7310926914215088},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6292961835861206},{"id":"https://openalex.org/keywords/alliance","display_name":"Alliance","score":0.6257318258285522},{"id":"https://openalex.org/keywords/task","display_name":"Task (project management)","score":0.6167749166488647},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.58905029296875},{"id":"https://openalex.org/keywords/computational-trust","display_name":"Computational trust","score":0.5073105692863464},{"id":"https://openalex.org/keywords/trusted-computing","display_name":"Trusted Computing","score":0.4628666043281555},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4110443890094757},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.40061426162719727},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.1990591287612915},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.19002094864845276},{"id":"https://openalex.org/keywords/reputation","display_name":"Reputation","score":0.1856873333454132},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.1292250156402588},{"id":"https://openalex.org/keywords/law","display_name":"Law","score":0.07037466764450073},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.06929585337638855}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7310926914215088},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6292961835861206},{"id":"https://openalex.org/C2778431023","wikidata":"https://www.wikidata.org/wiki/Q878249","display_name":"Alliance","level":2,"score":0.6257318258285522},{"id":"https://openalex.org/C2780451532","wikidata":"https://www.wikidata.org/wiki/Q759676","display_name":"Task (project management)","level":2,"score":0.6167749166488647},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.58905029296875},{"id":"https://openalex.org/C160521178","wikidata":"https://www.wikidata.org/wiki/Q5157345","display_name":"Computational trust","level":3,"score":0.5073105692863464},{"id":"https://openalex.org/C2776831232","wikidata":"https://www.wikidata.org/wiki/Q966812","display_name":"Trusted Computing","level":2,"score":0.4628666043281555},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4110443890094757},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.40061426162719727},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.1990591287612915},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.19002094864845276},{"id":"https://openalex.org/C48798503","wikidata":"https://www.wikidata.org/wiki/Q877546","display_name":"Reputation","level":2,"score":0.1856873333454132},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.1292250156402588},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.07037466764450073},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.06929585337638855},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C201995342","wikidata":"https://www.wikidata.org/wiki/Q682496","display_name":"Systems engineering","level":1,"score":0.0},{"id":"https://openalex.org/C162853370","wikidata":"https://www.wikidata.org/wiki/Q39809","display_name":"Marketing","level":1,"score":0.0}],"mesh":[],"locations_count":6,"locations":[{"id":"doi:10.1109/csnet47905.2019.9108945","is_oa":false,"landing_page_url":"https://doi.org/10.1109/csnet47905.2019.9108945","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 3rd Cyber Security in Networking Conference (CSNet)","raw_type":"proceedings-article"},{"id":"pmh:oai:dare.uva.nl:openaire_cris_publications/0ea65991-a9b5-411a-88da-6111026f685c","is_oa":true,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/trustbased-collaborative-defences-in-multi-network-alliances(0ea65991-a9b5-411a-88da-6111026f685c).html","pdf_url":"https://pure.uva.nl/ws/files/58759267/09108945.pdf","source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, Deljoo, A, Meijer, L, de Laat, C & Grosso, P 2019, Trust-based collaborative defences in multi network alliances. in 2019 3rd Cyber Security in Networking Conference (CSNet 2019) : Quito, Ecuador, 23-25 October 2019. Piscataway, NJ, pp. 42-49, 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, 23/10/19. https://doi.org/10.1109/CSNet47905.2019.9108945","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dare.uva.nl:openaire/0ea65991-a9b5-411a-88da-6111026f685c","is_oa":true,"landing_page_url":"https://hdl.handle.net/11245.1/0ea65991-a9b5-411a-88da-6111026f685c","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, Deljoo, A, Meijer, L, de Laat, C & Grosso, P 2019, Trust-based collaborative defences in multi network alliances. in 2019 3rd Cyber Security in Networking Conference (CSNet 2019) : Quito, Ecuador, 23-25 October 2019. Piscataway, NJ, pp. 42-49, 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, 23/10/19. https://doi.org/10.1109/CSNet47905.2019.9108945","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:dare.uva.nl:publications/0ea65991-a9b5-411a-88da-6111026f685c","is_oa":false,"landing_page_url":"http://www.proceedings.com/54806.html","pdf_url":null,"source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""},{"id":"pmh:oai:oai-pmh.tno.nl:52645","is_oa":false,"landing_page_url":"https://resolver.tno.nl/uuid:54d45b68-6305-4232-a4b3-401ab2c79c59","pdf_url":null,"source":{"id":"https://openalex.org/S7407055233","display_name":"TNO Repository","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"info:eu-repo/semantics/conferencePaper"},{"id":"pmh:uvapub:oai:dare.uva.nl:publications/0ea65991-a9b5-411a-88da-6111026f685c","is_oa":true,"landing_page_url":"https://dare.uva.nl/personal/pure/en/publications/trustbased-collaborative-defences-in-multi-network-alliances(0ea65991-a9b5-411a-88da-6111026f685c).html","pdf_url":null,"source":{"id":"https://openalex.org/S4306401843","display_name":"Data Archiving and Networked Services (DANS)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1322597698","host_organization_name":"Royal Netherlands Academy of Arts and Sciences","host_organization_lineage":["https://openalex.org/I1322597698"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"2019 3rd Cyber Security in Networking Conference (CSNet 2019): Quito, Ecuador, 23-25 October 2019, 42 - 49","raw_type":"info:eu-repo/semantics/conferencepaper"}],"best_oa_location":{"id":"pmh:oai:dare.uva.nl:openaire_cris_publications/0ea65991-a9b5-411a-88da-6111026f685c","is_oa":true,"landing_page_url":"https://handle.uba.uva.nl/personal/pure/en/publications/trustbased-collaborative-defences-in-multi-network-alliances(0ea65991-a9b5-411a-88da-6111026f685c).html","pdf_url":"https://pure.uva.nl/ws/files/58759267/09108945.pdf","source":{"id":"https://openalex.org/S4306400088","display_name":"UvA-DARE (University of Amsterdam)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I887064364","host_organization_name":"University of Amsterdam","host_organization_lineage":["https://openalex.org/I887064364"],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Koning, R, Deljoo, A, Meijer, L, de Laat, C & Grosso, P 2019, Trust-based collaborative defences in multi network alliances. in 2019 3rd Cyber Security in Networking Conference (CSNet 2019) : Quito, Ecuador, 23-25 October 2019. Piscataway, NJ, pp. 42-49, 3rd Cyber Security in Networking Conference, CSNet 2019, Quito, Ecuador, 23/10/19. https://doi.org/10.1109/CSNet47905.2019.9108945","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/9","display_name":"Industry, innovation and infrastructure","score":0.5199999809265137}],"awards":[{"id":"https://openalex.org/G8948191093","display_name":null,"funder_award_id":"COMMIT","funder_id":"https://openalex.org/F4320321800","funder_display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek"}],"funders":[{"id":"https://openalex.org/F4320321800","display_name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","ror":"https://ror.org/04jsz6e67"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3033138826.pdf","grobid_xml":"https://content.openalex.org/works/W3033138826.grobid-xml"},"referenced_works_count":17,"referenced_works":["https://openalex.org/W1556179796","https://openalex.org/W1984482899","https://openalex.org/W2003688171","https://openalex.org/W2026386101","https://openalex.org/W2028282576","https://openalex.org/W2170810185","https://openalex.org/W2171684564","https://openalex.org/W2504219809","https://openalex.org/W2888568240","https://openalex.org/W2891774802","https://openalex.org/W2917069071","https://openalex.org/W2937325535","https://openalex.org/W2977791238","https://openalex.org/W6724838276","https://openalex.org/W6754186334","https://openalex.org/W6761173626","https://openalex.org/W7024603386"],"related_works":["https://openalex.org/W3125302265","https://openalex.org/W4242931393","https://openalex.org/W2114295463","https://openalex.org/W2129567949","https://openalex.org/W1981078071","https://openalex.org/W1976113535","https://openalex.org/W1518382739","https://openalex.org/W2054923753","https://openalex.org/W1996449313","https://openalex.org/W1520053956"],"abstract_inverted_index":{"Collaborative":[0],"defences":[1,49,75,93],"against,":[2],"for":[3],"example,":[4],"Distributed":[5],"Denial":[6],"of":[7,20,32,59,103],"Service":[8],"attacks":[9,51],"require":[10],"trust":[11,40,61,96],"between":[12],"the":[13,30,57,77,83,90,95,101,104],"collaborators.":[14],"Even":[15],"in":[16,47,64,76],"a":[17,33,45,60],"trusted":[18,26],"alliance":[19],"collaborators,":[21],"some":[22],"members":[23],"are":[24],"more":[25],"than":[27],"others":[28],"with":[29],"execution":[31],"specific":[34],"task.":[35],"This":[36],"paper":[37],"shows":[38],"that":[39,82],"can":[41],"be":[42],"used":[43],"as":[44],"criterion":[46],"collaborative":[48,74,92],"against":[50],"on":[52],"computer":[53],"infrastructures.":[54],"We":[55],"evaluate":[56],"implementation":[58],"based":[62],"defence":[63,85],"an":[65],"overlay":[66],"network":[67],"and":[68],"compare":[69],"its'":[70],"performance":[71],"to":[72,89,99],"other":[73,91],"same":[78],"environment.":[79],"Results":[80],"show":[81],"trust-based":[84],"has":[86],"comparable":[87],"results":[88],"after":[94],"values":[97],"converge":[98],"reflect":[100],"behaviour":[102],"nodes.":[105]},"counts_by_year":[{"year":2025,"cited_by_count":1}],"updated_date":"2026-04-10T15:06:20.359241","created_date":"2025-10-10T00:00:00"}
