default search action
Tim Muller
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Dimah Almani, Tim Muller, Xavier Carpent, Takahito Yoshizawa, Steven Furnell:
Enabling Vehicle-to-Vehicle Trust in Rural Areas: An Evaluation of a Pre-Signature Scheme for Infrastructure-Limited Environments. Future Internet 16(3): 77 (2024) - [j3]Dongxia Wang, Tim Muller, Jun Sun:
Provably Secure Decisions Based on Potentially Malicious Information. IEEE Trans. Dependable Secur. Comput. 21(5): 4388-4403 (2024) - [c25]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. AAMAS 2024: 96-104 - [c24]Raymond Agyemang, Steven Furnell, Tim Muller:
A Profile-Based Cyber Security Readiness Assessment Framework at Country Level. HAISA (1) 2024: 93-106 - 2023
- [c23]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. AAMAS 2023: 2691-2693 - 2022
- [c22]Sean Sirur, Tim Muller:
Properties of Reputation Lag Attack Strategies. AAMAS 2022: 1210-1218 - [i1]Shaojie Bai, Dongxia Wang, Tim Muller, Peng Cheng, Jiming Chen:
Stability of Weighted Majority Voting under Estimated Weights. CoRR abs/2207.06118 (2022) - 2021
- [c21]Annabel Coates, Tim Muller, Sean Sirur:
Simulating the Impact of Personality on Fake News. TRUST@AAMAS 2021 - 2020
- [j2]Dongxia Wang, Tim Muller, Jie Zhang, Yang Liu:
Information Theoretical Analysis of Unfair Rating Attacks Under Subjectivity. IEEE Trans. Inf. Forensics Secur. 15: 816-828 (2020) - [c20]Tim Muller, Dongxia Wang, Jun Sun:
Provably Robust Decisions based on Potentially Malicious Sources of Information. CSF 2020: 411-424
2010 – 2019
- 2019
- [c19]Sean Sirur, Tim Muller:
The Reputation Lag Attack. IFIPTM 2019: 39-56 - [c18]Tim Muller:
An Unforeseen Equivalence Between Uncertainty and Entropy. IFIPTM 2019: 57-72 - 2018
- [c17]Naipeng Dong, Tim Muller:
The Foul Adversary: Formal Models. ICFEM 2018: 37-53 - 2016
- [j1]Jos C. M. Baeten, Bas Luttik, Tim Muller, Paul van Tilburg:
Expressiveness modulo bisimilarity of regular expressions with parallel composition. Math. Struct. Comput. Sci. 26(6): 933-968 (2016) - [c16]Dongxia Wang, Tim Muller, Jie Zhang, Yang Liu:
Is It Harmful When Advisors Only Pretend to Be Honest? AAAI 2016: 2551-2557 - [c15]Tim Muller, Jie Zhang, Yang Liu:
A Language for Trust Modelling. AAMAS Workshops (Visionary Papers) 2016: 1-12 - [c14]Tim Muller, Jie Zhang, Yang Liu:
A Language for Trust Modelling. TRUST@AAMAS 2016: 63-70 - [c13]Tim Muller, Dongxia Wang, Yang Liu, Jie Zhang:
How to Use Information Theory to Mitigate Unfair Rating Attacks. IFIPTM 2016: 17-32 - [c12]Tim Muller, Yang Liu, Jie Zhang:
Limitations on Robust Ratings and Predictions. IFIPTM 2016: 113-126 - 2015
- [c11]Tim Muller, Yang Liu, Jie Zhang:
The Fallacy of Endogenous Discounting of Trust Recommendations. AAMAS 2015: 563-572 - [c10]Dongxia Wang, Tim Muller, Athirai Aravazhi Irissappane, Jie Zhang, Yang Liu:
Using Information Theory to Improve the Robustness of Trust Systems. AAMAS 2015: 791-799 - [c9]Audun Jøsang, Magdalena Ivanovska, Tim Muller:
Trust revision for conflicting sources. FUSION 2015: 550-557 - [c8]Dongxia Wang, Tim Muller, Jie Zhang, Yang Liu:
Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory. IJCAI 2015: 111-117 - [c7]Tim Muller, Dongxia Wang, Audun Jøsang:
Information Theory for Subjective Logic. MDAI 2015: 230-242 - 2014
- [c6]Tim Muller, Yang Liu, Sjouke Mauw, Jie Zhang:
On Robustness of Trust Systems. IFIPTM 2014: 44-60 - [c5]Dongxia Wang, Tim Muller, Yang Liu, Jie Zhang:
Towards Robust and Effective Trust Management for Security: A Survey. TrustCom 2014: 511-518 - 2013
- [c4]Tim Muller, Patrick Schweitzer:
On Beta Models with Trust Chains. IFIPTM 2013: 49-65 - 2012
- [c3]Tim Muller, Patrick Schweitzer:
A Formal Derivation of Composite Trust. FPS 2012: 132-148 - 2010
- [c2]Tim Muller:
Semantics of Trust. Formal Aspects in Security and Trust 2010: 141-156 - [c1]Jos C. M. Baeten, Bas Luttik, Tim Muller, Paul van Tilburg:
Expressiveness modulo Bisimilarity of Regular Expressions with Parallel Composition (Extended Abstract). EXPRESS 2010: 1-15
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint