Artículos de revistas sobre el tema "Trust models requirements"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Trust models requirements".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Lee, Hyo-Cheol y Seok-Won Lee. "Provenance-Based Trust-Aware Requirements Engineering Framework for Self-Adaptive Systems". Sensors 23, n.º 10 (10 de mayo de 2023): 4622. http://dx.doi.org/10.3390/s23104622.
Texto completoTikhvinskiy, Valery O., Grigory Bochechka y Andrey Gryazev. "QoS Requirements as Factor of Trust to 5G Network". Journal of Telecommunications and Information Technology, n.º 1 (30 de marzo de 2016): 3–8. http://dx.doi.org/10.26636/jtit.2016.1.697.
Texto completoHussein, Aya, Sondoss Elsawah y Hussein Abbass. "A System Dynamics Model for Human Trust in Automation under Speed and Accuracy Requirements". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 63, n.º 1 (noviembre de 2019): 822–26. http://dx.doi.org/10.1177/1071181319631167.
Texto completoWang, Jingpei y Jie Liu. "The Comparison of Distributed P2P Trust Models Based on Quantitative Parameters in the File Downloading Scenarios". Journal of Electrical and Computer Engineering 2016 (2016): 1–10. http://dx.doi.org/10.1155/2016/4361719.
Texto completoAyed, Samiha, Lamia Chaari y Amina Fares. "A Survey on Trust Management for WBAN: Investigations and Future Directions". Sensors 20, n.º 21 (23 de octubre de 2020): 6041. http://dx.doi.org/10.3390/s20216041.
Texto completoSun, Po-Ling y Cheng-Yuan Ku. "Review of threats on trust and reputation models". Industrial Management & Data Systems 114, n.º 3 (8 de abril de 2014): 472–83. http://dx.doi.org/10.1108/imds-11-2013-0470.
Texto completoSoni, Sonam. "Reliable Trust Computation model in Vehicular ad-hoc Network". American Journal of Advanced Computing 1, n.º 3 (1 de julio de 2020): 1–5. http://dx.doi.org/10.15864/ajac.1304.
Texto completoAsiri, Ahmad Yahya y Sultan S. Alshamrani. "Performance Evaluation of a B2C Model Based on Trust Requirements and Factors". Scientific Programming 2021 (26 de mayo de 2021): 1–10. http://dx.doi.org/10.1155/2021/9935849.
Texto completoKulaklıoğlu, Duru. "Explainable AI: Enhancing Interpretability of Machine Learning Models". Human Computer Interaction 8, n.º 1 (6 de diciembre de 2024): 91. https://doi.org/10.62802/z3pde490.
Texto completoKapse, Smita, Latesh Malik y Sanjay Kumar. "NTHCMB: DESIGN OF AN EFFICIENT NOVEL TRUST-BASED HYBRID CONSENSUS MODEL FOR SECURING BLOCKCHAIN DEPLOYMENTS". ASEAN Engineering Journal 14, n.º 2 (31 de mayo de 2024): 83–90. http://dx.doi.org/10.11113/aej.v14.20763.
Texto completoGupta, Punit y Deepika Agrawal. "Trusted Cloud Platform for Cloud Infrastructure". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 10, n.º 8 (30 de agosto de 2013): 1884–91. http://dx.doi.org/10.24297/ijct.v10i8.1473.
Texto completoSarkar, Sirshak, Gaurav Choudhary, Shishir Kumar Shandilya, Azath Hussain y Hwankuk Kim. "Security of Zero Trust Networks in Cloud Computing: A Comparative Review". Sustainability 14, n.º 18 (7 de septiembre de 2022): 11213. http://dx.doi.org/10.3390/su141811213.
Texto completoMohammad, Abdulghafour. "Distributed Authentication and Authorization Models in Cloud Computing Systems: A Literature Review". Journal of Cybersecurity and Privacy 2, n.º 1 (4 de marzo de 2022): 107–23. http://dx.doi.org/10.3390/jcp2010008.
Texto completoWang, Jiuru, Zhiyuan Wang, Jingcheng Song y Hongyuan Cheng. "Attribute and User Trust Score-Based Zero Trust Access Control Model in IoV". Electronics 12, n.º 23 (29 de noviembre de 2023): 4825. http://dx.doi.org/10.3390/electronics12234825.
Texto completoSenan Mahmod Attar Bashi, Zainab y Shayma Senan. "A Comprehensive Review of Zero Trust Network Architecture (ZTNA) and Deployment Frameworks". International Journal on Perceptive and Cognitive Computing 11, n.º 1 (30 de enero de 2025): 148–53. https://doi.org/10.31436/ijpcc.v11i1.494.
Texto completoBaslyman, Malak, Daniel Amyot y John Mylopoulos. "Reasoning about Confidence in Goal Satisfaction". Algorithms 15, n.º 10 (23 de septiembre de 2022): 343. http://dx.doi.org/10.3390/a15100343.
Texto completoBrazhuk, A. I. y E. V. Olizarovich. "Towards the computer systems design based on Zero Trust Architecture". Informatics 21, n.º 4 (30 de diciembre de 2024): 85–98. https://doi.org/10.37661/1816-0301-2024-21-4-85-98.
Texto completoKrul, Evan, Hye-young Paik, Sushmita Ruj y Salil S. Kanhere. "SoK: Trusting Self-Sovereign Identity". Proceedings on Privacy Enhancing Technologies 2024, n.º 3 (julio de 2024): 297–313. http://dx.doi.org/10.56553/popets-2024-0079.
Texto completoFarayola, Michael Mayowa, Irina Tal, Regina Connolly, Takfarinas Saber y Malika Bendechache. "Ethics and Trustworthiness of AI for Predicting the Risk of Recidivism: A Systematic Literature Review". Information 14, n.º 8 (27 de julio de 2023): 426. http://dx.doi.org/10.3390/info14080426.
Texto completoArora, Shakti y Surjeet Dalal. "Trust Evaluation Factors in Cloud Computing with Open Stack". Journal of Computational and Theoretical Nanoscience 16, n.º 12 (1 de diciembre de 2019): 5073–77. http://dx.doi.org/10.1166/jctn.2019.8566.
Texto completoKang, Hongzhaoning, Gang Liu, Quan Wang, Lei Meng y Jing Liu. "Theory and Application of Zero Trust Security: A Brief Survey". Entropy 25, n.º 12 (28 de noviembre de 2023): 1595. http://dx.doi.org/10.3390/e25121595.
Texto completoAluvalu, Rajanikanth, Krishna Keerthi Chennam, M. A.Jabbar y Shaik Sarfaraz Ahamed. "Risk aware Access Control model for Trust Based collaborative organizations in cloud". International Journal of Engineering & Technology 7, n.º 4.6 (25 de septiembre de 2018): 49. http://dx.doi.org/10.14419/ijet.v7i4.6.20235.
Texto completoDjamaluddin, Nursyamsi, Ayub I. Anwar, Burhanuddin Pasiga, Fuad H. Akbar, Rasmidar Samad, Hasanuddin H y Yu Ri-Kim. "The intersection of trust and satisfaction in Dentist-Patient interactions in Indonesia". Journal of Dentomaxillofacial Science 9, n.º 1 (1 de abril de 2024): 22–27. http://dx.doi.org/10.15562/jdmfs.v9i1.1689.
Texto completoAlrahhal, Hosam, Razan Jamous, Rabie Ramadan, Abdulaziz M. Alayba y Kusum Yadav. "Utilising Acknowledge for the Trust in Wireless Sensor Networks". Applied Sciences 12, n.º 4 (16 de febrero de 2022): 2045. http://dx.doi.org/10.3390/app12042045.
Texto completoQi, Ping, Fucheng Wang y Shu Hong. "A Novel Trust Model Based on Node Recovery Technique for WSN". Security and Communication Networks 2019 (3 de septiembre de 2019): 1–12. http://dx.doi.org/10.1155/2019/2545129.
Texto completoXin, Ruyue, Jingye Wang, Peng Chen y Zhiming Zhao. "Trustworthy AI-based Performance Diagnosis Systems for Cloud Applications: A Review". ACM Computing Surveys 57, n.º 5 (9 de enero de 2025): 1–37. https://doi.org/10.1145/3701740.
Texto completoSchnabel, Georg, Roberto Capote y Daniel L. Aldama. "Why trust nuclear data evaluations with Bayesian networks". EPJ Web of Conferences 284 (2023): 12004. http://dx.doi.org/10.1051/epjconf/202328412004.
Texto completoTrudy-Ann Campbell, Samson Eromonsei y Olusegun Afolabi. "Efficient compliance with GDPR through automating privacy policy captions in web and mobile application". World Journal of Advanced Engineering Technology and Sciences 12, n.º 2 (30 de julio de 2024): 446–67. http://dx.doi.org/10.30574/wjaets.2024.12.2.0317.
Texto completoStanešić, Josip, Zlatan Morić, Damir Regvart y Ivan Bencarić. "Digital signatures and their legal significance". Edelweiss Applied Science and Technology 9, n.º 1 (9 de enero de 2025): 431–40. https://doi.org/10.55214/25768484.v9i1.4154.
Texto completoKolomvatsos, Kostas, Maria Kalouda, Panagiota Papadopoulou y Stathes Hadjiefthymiades. "Fuzzy Trust Modelling for Pervasive Computing Applications". Journal of Data Intelligence 2, n.º 2 (junio de 2021): 101–15. http://dx.doi.org/10.26421/jdi2.2-1.
Texto completoGelei, Andrea y Imre Dobos. "Evolving trust in business relationships – A behavioural experiment". Acta Oeconomica 72, n.º 2 (23 de junio de 2022): 231–47. http://dx.doi.org/10.1556/032.2022.00013.
Texto completoAli, Ali Mohammed Omar. "Explainability in AI: Interpretable Models for Data Science". International Journal for Research in Applied Science and Engineering Technology 13, n.º 2 (28 de febrero de 2025): 766–71. https://doi.org/10.22214/ijraset.2025.66968.
Texto completoGharbi, Atef y Saleh M. Altowaijri. "A Multi-Robot-Based Architecture and a Trust Model for Intelligent Fault Management and Control Systems". Electronics 12, n.º 17 (31 de agosto de 2023): 3679. http://dx.doi.org/10.3390/electronics12173679.
Texto completoGeitz, Sarah, Brian Moon, Anita D'Amico, Robert R. Hoffman y Rob Page. "Beyond Requirements: Improving Software Tools for Intelligence Analysts". Proceedings of the Human Factors and Ergonomics Society Annual Meeting 49, n.º 10 (septiembre de 2005): 932–35. http://dx.doi.org/10.1177/154193120504901013.
Texto completoShah, Syed Alamdar Ali, Raditya Sukmana y Bayu Arie Fianto. "Duration model for maturity gap risk management in Islamic banks". Journal of Modelling in Management 15, n.º 3 (12 de febrero de 2020): 1167–86. http://dx.doi.org/10.1108/jm2-08-2019-0184.
Texto completoZelensky, A. A., T. K. Abdullin, M. M. Zhdanova, V. V. Voronin y A. A. Gribkov. "Challenge of the performance management of trust control systems with deep learning". Advanced Engineering Research 22, n.º 1 (30 de marzo de 2022): 57–66. http://dx.doi.org/10.23947/2687-1653-2022-22-1-57-66.
Texto completoHellani, Houssein, Layth Sliman, Abed Ellatif Samhat y Ernesto Exposito. "Overview on the Blockchain-Based Supply Chain Systematics and Their Scalability Tools". Emerging Science Journal 4 (23 de agosto de 2021): 45–69. http://dx.doi.org/10.28991/esj-2021-sp1-04.
Texto completoAraddhana Arvind Deshmukh,. "Explainable AI for Adversarial Machine Learning: Enhancing Transparency and Trust in Cyber Security". Journal of Electrical Systems 20, n.º 1s (28 de marzo de 2024): 11–27. http://dx.doi.org/10.52783/jes.749.
Texto completoBarugahara, Florence. "Financial Inclusion in Zimbabwe: Determinants, Challenges, and Opportunities". International Journal of Financial Research 12, n.º 3 (4 de febrero de 2021): 261. http://dx.doi.org/10.5430/ijfr.v12n3p261.
Texto completoWu, Kewei, Yiran Wang, Xiaogang He, Jinyu Yan, Yang Guo, Zhuqing Jiang, Xing Zhang et al. "Semi-Open Set Object Detection Algorithm Leveraged by Multi-Modal Large Language Models". Big Data and Cognitive Computing 8, n.º 12 (29 de noviembre de 2024): 175. https://doi.org/10.3390/bdcc8120175.
Texto completoWhaiduzzaman, Md, Mohammad Nazmul Haque, Md Rejaul Karim Chowdhury y Abdullah Gani. "A Study on Strategic Provisioning of Cloud Computing Services". Scientific World Journal 2014 (2014): 1–16. http://dx.doi.org/10.1155/2014/894362.
Texto completoNoardo, Francesca, Rob A. Atkinson, Alejandro Villar, Piotr Zaborowski y Ingo Simonis. "Profiling Standards to Improve Practical Interoperability". International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLVIII-4-2024 (21 de octubre de 2024): 359–66. http://dx.doi.org/10.5194/isprs-archives-xlviii-4-2024-359-2024.
Texto completoRahman, Ashiqur Md y Rashedur M. Rahman. "CAPM Indexed Hybrid E-Negotiation for Resource Allocation in Grid Computing". International Journal of Grid and High Performance Computing 5, n.º 2 (abril de 2013): 72–91. http://dx.doi.org/10.4018/jghpc.2013040105.
Texto completoBrazil, Debbie, Charlotte Moss y Karen Blinko. "Acute hospital preoperative assessment redesign: streamlining the patient pathway and reducing on-the-day surgery cancellations". BMJ Open Quality 10, n.º 3 (septiembre de 2021): e001338. http://dx.doi.org/10.1136/bmjoq-2021-001338.
Texto completoYuan, Ziyao, Houjun Fang, Binqiang Han y Zejiong Zhou. "A Comparative Study on Poverty Reduction Models of Rural Collective Economic Organizations from the Perspective of Relative Poverty". International Journal of Education and Humanities 5, n.º 3 (16 de noviembre de 2022): 177–84. http://dx.doi.org/10.54097/ijeh.v5i3.2798.
Texto completoEnglund, Cristofer, Eren Erdal Aksoy, Fernando Alonso-Fernandez, Martin Daniel Cooney, Sepideh Pashami y Björn Åstrand. "AI Perspectives in Smart Cities and Communities to Enable Road Vehicle Automation and Smart Traffic Control". Smart Cities 4, n.º 2 (18 de mayo de 2021): 783–802. http://dx.doi.org/10.3390/smartcities4020040.
Texto completoDrin, Svitlana y Fedir Serdiuk. "Expected credit loss modeling". Mohyla Mathematical Journal 6 (18 de abril de 2024): 14–19. http://dx.doi.org/10.18523/2617-70806202314-19.
Texto completoRehman, Abdul, Mohd Fadzil Hassan, Kwang Hooi Yew, Irving Paputungan y Duc Chung Tran. "State-of-the-art IoV trust management a meta-synthesis systematic literature review (SLR)". PeerJ Computer Science 6 (14 de diciembre de 2020): e334. http://dx.doi.org/10.7717/peerj-cs.334.
Texto completoZhang, Peng y Maged N. Kamel Boulos. "Generative AI in Medicine and Healthcare: Promises, Opportunities and Challenges". Future Internet 15, n.º 9 (24 de agosto de 2023): 286. http://dx.doi.org/10.3390/fi15090286.
Texto completoSmruti P. Patil. "Design of an Efficient QOS Aware Trust-Based Security Model with Bioinspired Sidechains for Healthcare Deployments". Communications on Applied Nonlinear Analysis 32, n.º 3 (11 de octubre de 2024): 181–96. http://dx.doi.org/10.52783/cana.v32.1938.
Texto completo