{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T11:05:22Z","timestamp":1761563122888,"version":"3.40.3"},"publisher-location":"Cham","reference-count":13,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030627423"},{"type":"electronic","value":"9783030627430"}],"license":[{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,11,4]],"date-time":"2020-11-04T00:00:00Z","timestamp":1604448000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-62743-0_32","type":"book-chapter","created":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:02:58Z","timestamp":1604383378000},"page":"226-232","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Safety Situation Assessment of Underwater Nodes Based on BP Neural Network"],"prefix":"10.1007","author":[{"given":"Haijie","family":"Huang","sequence":"first","affiliation":[]},{"given":"Kun","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Xiangdang","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Qiuling","family":"Yang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,4]]},"reference":[{"key":"32_CR1","doi-asserted-by":"crossref","unstructured":"Zhang,Y.: Research on safe location algorithm of Underwater Sensor Network based on Malicious Anchor Node detection. Tianjin University (2013)","DOI":"10.3724\/SP.J.1087.2013.01208"},{"key":"32_CR2","doi-asserted-by":"crossref","unstructured":"Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open network. In: Proceedings of the European Symposium on Research in Security, pp. 3\u201318. Springer, Brighton (1994)","DOI":"10.1007\/3-540-58618-0_53"},{"issue":"8","key":"32_CR3","first-page":"1401","volume":"14","author":"W Tang","year":"2003","unstructured":"Tang, W., Chen, Z.: Research on subjective trust management model based on fuzzy set theory. J. Software 14(8), 1401\u20131408 (2003)","journal-title":"J. Software"},{"key":"32_CR4","unstructured":"Wng, J.P.: Research on key technologies of trust management and model evaluation in distributed scenarios. Beijing University of Posts and Telecommunications (2013)"},{"key":"32_CR5","unstructured":"Ye, A.Y.: Node localization security in wireless sensor networks. Xi\u2019an University of Electronic Science and Technology (2009)"},{"key":"32_CR6","doi-asserted-by":"crossref","unstructured":"Xiao, P., Xian, M.: Network security situation prediction method based on MEA-BP. In: IEEE International Conference on Computational Intelligence and Communication Technology (2017)","DOI":"10.1109\/CIACT.2017.7977327"},{"key":"32_CR7","unstructured":"Zhu, G.M.: Research on target tracking algorithm of asynchronous underwater sensor network. Zhejiang University, pp. 2\u201310 (2015)"},{"issue":"12","key":"32_CR8","first-page":"430","volume":"3719","author":"BV Dasarathy","year":"1999","unstructured":"Dasarathy, B.V.: Revisions to the JDL data fusion model. Proc. SPIE Int. Soc. Opt. Eng. 3719(12), 430\u2013441 (1999)","journal-title":"Proc. SPIE Int. Soc. Opt. Eng."},{"key":"32_CR9","doi-asserted-by":"crossref","unstructured":"Endsley, M.R.: Design and evaluation for situation awareness enhancement. In: Human Factors & Ergonomics Society Annual Meeting Proceedings, vol. 32, no. 1, pp. 97\u2013101 (1988)","DOI":"10.1177\/154193128803200221"},{"key":"32_CR10","doi-asserted-by":"publisher","first-page":"480","DOI":"10.1007\/11559221_48","volume-title":"Multi-Agent Systems and Applications IV","author":"D Melaye","year":"2005","unstructured":"Melaye, D., Demazeau, Y.: Bayesian dynamic trust model. In: P\u011bchou\u010dek, M., Petta, P., Varga, L.Z. (eds.) Multi-Agent Systems and Applications IV, pp. 480\u2013489. Springer, Heidelberg (2005)"},{"key":"32_CR11","unstructured":"Li, J.Y.: Research on distributed cooperative situational awareness based on trust in wireless networks. Chongqing University of Posts and Telecommunications (2017)"},{"key":"32_CR12","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.knosys.2013.07.016","volume":"52","author":"D Jelenc","year":"2013","unstructured":"Jelenc, D., Hermoso, R., Sabater-Mir, J., et al.: Decision making matters: a better way to evaluate trust models. Knowl.-Based Syst. 52, 147\u2013164 (2013)","journal-title":"Knowl.-Based Syst."},{"key":"32_CR13","doi-asserted-by":"publisher","first-page":"7367","DOI":"10.1016\/j.eswa.2013.07.026","volume":"40","author":"G Yin","year":"2013","unstructured":"Yin, G., Wang, Y., Dong, Y., et al.: Wright\u2013fisher multi-strategy trust evolution model with white noise for Internetware. Expert Syst. Appl. 40, 7367\u20137380 (2013)","journal-title":"Expert Syst. Appl."}],"container-title":["Advances in Intelligent Systems and Computing","The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-62743-0_32","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,3]],"date-time":"2020-11-03T06:29:36Z","timestamp":1604384976000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-62743-0_32"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,4]]},"ISBN":["9783030627423","9783030627430"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-62743-0_32","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,11,4]]},"assertion":[{"value":"4 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SPIOT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shanghai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 November 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spiot2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/spiot2020.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}