Tim Muller
Tim Muller
University of Oxford
Verified email at - Homepage
Cited by
Cited by
Towards robust and effective trust management for security: A survey
D Wang, T Muller, Y Liu, J Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
On beta models with trust chains
T Muller, P Schweitzer
Trust Management VII: 7th IFIP WG 11.11 International Conference, IFIPTM …, 2013
Using Information Theory to Improve the Robustness of Trust Systems.
D Wang, T Muller, AA Irissappane, J Zhang, Y Liu
AAMAS, 791-799, 2015
Expressiveness modulo bisimilarity of regular expressions with parallel composition
JCM Baeten, B Luttik, T Muller, P Van Tilburg
Mathematical Structures in Computer Science 26 (6), 933-968, 2016
Quantifying robustness of trust systems against collusive unfair rating attacks using information theory
D Wang, T Muller, J Zhang, Y Liu
Proceedings of the 24th International Joint Conference on Artificial …, 2015
On robustness of trust systems
T Muller, Y Liu, S Mauw, J Zhang
Trust Management VIII: 8th IFIP WG 11.11 International Conference, IFIPTM …, 2014
Trust revision for conflicting sources
A Jøsang, M Ivanovska, T Muller
2015 18th International Conference on Information Fusion (Fusion), 550-557, 2015
Semantics of trust
T Muller
Formal Aspects of Security and Trust: 7th International Workshop, FAST 2010 …, 2011
The fallacy of endogenous discounting of trust recommendations
T Muller, Y Liu, J Zhang
Proceedings of the 2015 International Conference on Autonomous Agents and …, 2015
Information theory for subjective logic
T Muller, D Wang, A Jøsang
Modeling Decisions for Artificial Intelligence: 12th International …, 2015
A formal derivation of composite trust
T Muller, P Schweitzer
International Symposium on Foundations and Practice of Security, 132-148, 2012
Information theoretical analysis of unfair rating attacks under subjectivity
D Wang, T Muller, J Zhang, Y Liu
IEEE Transactions on Information Forensics and Security 15, 816-828, 2019
Is It Harmful When Advisors Only Pretend to Be Honest?
D Wang, T Muller, J Zhang, Y Liu
30th AAAI Conference on Artificial Intelligence (AAAI), 2016
The reputation lag attack
S Sirur, T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
An unforeseen equivalence between uncertainty and entropy
T Muller
Trust Management XIII: 13th IFIP WG 11.11 International Conference, IFIPTM …, 2019
The foul adversary: formal models
N Dong, T Muller
Formal Methods and Software Engineering: 20th International Conference on …, 2018
How to use information theory to mitigate unfair rating attacks
T Muller, D Wang, Y Liu, J Zhang
Trust Management X: 10th IFIP WG 11.11 International Conference, IFIPTM 2016 …, 2016
Provably robust decisions based on potentially malicious sources of information
T Muller, D Wang, J Sun
2020 IEEE 33rd Computer Security Foundations Symposium (CSF), 411-424, 2020
A language for trust modelling
T Muller, J Zhang, Y Liu
Autonomous Agents and Multiagent Systems: AAMAS 2016 Workshops, Visionary …, 2016
Regulation, Policy and Cybersecurity: Hardware Security
V Benson, S Furnell, D Masi, T Muller
The system can't perform the operation now. Try again later.
Articles 1–20