A problem shared is a problem halved: A survey on the dimensions of collective cyber defense through security information sharing

F Skopik, G Settanni, R Fiedler - Computers & Security, 2016 - Elsevier
The Internet threat landscape is fundamentally changing. A major shift away from hobby
hacking toward well-organized cyber crime can be observed. These attacks are typically …

Crowdsourcing: a comprehensive literature review

M Hossain, I Kauranen - Strategic Outsourcing: An International …, 2015 - emerald.com
Purpose–The purpose of this paper is to explore the development of crowdsourcing
literature. Design/methodology/approach–This study is a comprehensive review of 346 …

A survey on trust and reputation models for Web services: Single, composite, and communities

OA Wahab, J Bentahar, H Otrok, A Mourad - Decision Support Systems, 2015 - Elsevier
Web service selection constitutes nowadays a major challenge that is still attracting the
research community to work on and investigate. The problem arises since decision makers …

A systematic literature review of crowdsourcing research from a human resource management perspective

R Buettner - 2015 48th hawaii international conference on …, 2015 - ieeexplore.ieee.org
A Systematic Literature Review of Crowdsourcing Research from a Human Resource
Management Perspective Page 1 A Systematic Literature Review of Crowdsourcing Research …

Generating trusted graphs for trust evaluation in online social networks

W Jiang, G Wang, J Wu - Future generation computer systems, 2014 - Elsevier
We propose a novel trust framework to address the issue of “Can Alice trust Bob on a
service?” in large online social networks (OSNs). Many models have been proposed for …

Smart cities

S Dustdar, S Nastić, O Šćekić - The Internet of Things, People and …, 2017 - Springer
The contemporary view of the Smart City is very much static and infrastructurecentric,
focusing on installation and subsequent management of Edge devices and analytics of data …

SpringerBriefs in Computer Science

S Zdonik, P Ning, S Shekhar, J Katz, X Wu, LC Jain… - 2012 - Springer
This is an introduction to multicast routing, which is the study of methods for routing from one
source to many destinations, or from many sources to many destinations. Multicast is …

A collaborative cyber incident management system for European interconnected critical infrastructures

G Settanni, F Skopik, Y Shovgenya, R Fiedler… - Journal of Information …, 2017 - Elsevier
Abstract Today's Industrial Control Systems (ICSs) operating in critical infrastructures (CIs)
are becoming increasingly complex; moreover, they are extensively interconnected with …

The role played by trust and its effect on the competiveness of logistics service providers in Hungary

J Oláh, A Bai, G Karmazin, P Balogh, J Popp - Sustainability, 2017 - mdpi.com
This research focuses on the role of trust and the impact of its level on the revenue, earnings
before tax and the degree of flexibility of logistics service providers (LSPs). More specifically …

The social compute unit

S Dustdar, K Bhattacharya - IEEE Internet Computing, 2011 - ieeexplore.ieee.org
Social computing is perceived mainly as a vehicle for establishing and maintaining private
relationships and thus lacks mainstream adoption in enterprises. Collaborative computing …