{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T11:11:40Z","timestamp":1742987500081,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031535543"},{"type":"electronic","value":"9783031535550"}],"license":[{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,1,1]],"date-time":"2024-01-01T00:00:00Z","timestamp":1704067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024]]},"DOI":"10.1007\/978-3-031-53555-0_5","type":"book-chapter","created":{"date-parts":[[2024,2,13]],"date-time":"2024-02-13T05:02:10Z","timestamp":1707800530000},"page":"43-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Implementation of\u00a0a\u00a0Fuzzy-Based System for\u00a0Assessment of\u00a0Logical Trust Considering Reliability as\u00a0a\u00a0New Parameter"],"prefix":"10.1007","author":[{"given":"Shunya","family":"Higashi","sequence":"first","affiliation":[]},{"given":"Phudit","family":"Ampririt","sequence":"additional","affiliation":[]},{"given":"Ermioni","family":"Qafzezi","sequence":"additional","affiliation":[]},{"given":"Makoto","family":"Ikeda","sequence":"additional","affiliation":[]},{"given":"Keita","family":"Matsuo","sequence":"additional","affiliation":[]},{"given":"Leonard","family":"Barolli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,2,14]]},"reference":[{"key":"5_CR1","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/ACCESS.2021.3","volume":"9","author":"HLJ Ting","year":"2021","unstructured":"Ting, H.L.J., Kang, X., Li, T., Wang, H., Chu, C.K.: On the trust and trust modeling for the future fully-connected digital world: a comprehensive study. IEEE Access 9, 106\u2013743 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3","journal-title":"IEEE Access"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Wang, D., Muller, T., Liu, Y., Zhang, J.: Towards robust and effective trust management for security: a survey. In: 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, pp. 511\u2013518 (2014)","DOI":"10.1109\/TrustCom.2014.65"},{"issue":"3","key":"5_CR3","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1109\/MNET.011.2000508","volume":"35","author":"C Benza\u00efd","year":"2021","unstructured":"Benza\u00efd, C., Taleb, T., Farooqi, M.Z.: Trust in 5G and beyond networks. IEEE Netw. 35(3), 212\u2013222 (2021)","journal-title":"IEEE Netw."},{"key":"5_CR4","doi-asserted-by":"publisher","first-page":"562","DOI":"10.1016\/j.future.2018.05.061","volume":"109","author":"FH Rahman","year":"2020","unstructured":"Rahman, F.H., Au, T.-W., Newaz, S.S., Suhaili, W.S., Lee, G.M.: Find my trustworthy fogs: a fuzzy-based trust evaluation framework. Futur. Gener. Comput. Syst. 109, 562\u2013572 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"24","key":"5_CR5","doi-asserted-by":"publisher","first-page":"9905","DOI":"10.3390\/s22249905","volume":"22","author":"S Uslu","year":"2022","unstructured":"Uslu, S., Kaur, D., Durresi, M., Durresi, A.: Trustability for resilient internet of things services on 5G multiple access edge cloud computing. Sensors 22(24), 9905 (2022)","journal-title":"Sensors"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Cai, H., Li, Z., Tian, J.: A new trust evaluation model based on cloud theory in e-commerce environment. In: 2011 2nd International Symposium on Intelligence Information Processing and Trusted Computing, pp. 139\u2013142 (2011)","DOI":"10.1109\/IPTC.2011.42"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: Proceedings IEEE\/WIC International Conference on Web Intelligence (WI 2003), pp. 372\u2013378 (2003)","DOI":"10.1109\/WI.2003.1241218"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Zhou, P., Gu, X., Zhang, J., Fei, M.: A priori trust inference with context-aware stereotypical deep learning. Knowl.-Based Syst. 88, 97\u2013106 (2015). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S095070511500307X","DOI":"10.1016\/j.knosys.2015.08.003"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yu, F.R., Yang, R.: A machine learning approach for software-defined vehicular ad hoc networks with trust management. In: 2018 IEEE Global Communications Conference (GLOBECOM), pp. 1\u20136 (2018)","DOI":"10.1109\/GLOCOM.2018.8647426"},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1109\/TSUSC.2018.2839623","volume":"4","author":"U Jayasinghe","year":"2019","unstructured":"Jayasinghe, U., Lee, G.M., Um, T.-W., Shi, Q.: Machine learning based trust computational model for IoT services. IEEE Trans. Sustain. Comput. 4(1), 39\u201352 (2019)","journal-title":"IEEE Trans. Sustain. Comput."},{"issue":"6","key":"5_CR11","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1109\/THMS.2018.2874188","volume":"49","author":"W-L Hu","year":"2019","unstructured":"Hu, W.-L., Akash, K., Reid, T., Jain, N.: Computational modeling of the dynamics of human trust during human-machine interactions. IEEE Trans. Hum.-Mach. Syst. 49(6), 485\u2013497 (2019)","journal-title":"IEEE Trans. Hum.-Mach. Syst."},{"key":"5_CR12","first-page":"833","volume":"3","author":"K Zolfaghar","year":"2011","unstructured":"Zolfaghar, K., Aghaie, A.: Evolution of trust networks in social web applications using supervised learning. Procedia CS 3, 833\u2013839 (2011)","journal-title":"Procedia CS"},{"key":"5_CR13","unstructured":"Kumar, S.,\u00a0Shah, N.: False information on web and social media: a survey (2018)"},{"issue":"5","key":"5_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3236008","volume":"51","author":"DDS Braga","year":"2018","unstructured":"Braga, D.D.S., Niemann, M., Hellingrath, B., Neto, F.B.D.L.: Survey on computational trust and reputation models. ACM Comput. Surv. 51(5), 1\u201340 (2018). https:\/\/doi.org\/10.1145\/3236008","journal-title":"ACM Comput. Surv."},{"issue":"2","key":"5_CR15","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2815595","volume":"48","author":"J-H Cho","year":"2015","unstructured":"Cho, J.-H., Chan, K., Adali, S.: A survey on trust modeling. ACM Comput. Surv. (CSUR) 48(2), 1\u201340 (2015)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR16","unstructured":"Jantzen, J.: Tutorial on fuzzy logic. Technical University of Denmark, Department of Automation, Technical Report (1998)"},{"issue":"4","key":"5_CR17","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1109\/2.53","volume":"21","author":"LA Zadeh","year":"1988","unstructured":"Zadeh, L.A.: Fuzzy logic. Computer 21(4), 83\u201393 (1988)","journal-title":"Computer"},{"issue":"2","key":"5_CR18","doi-asserted-by":"publisher","first-page":"404","DOI":"10.1109\/21.52551","volume":"20","author":"C-C Lee","year":"1990","unstructured":"Lee, C.-C.: Fuzzy logic in control systems: fuzzy logic controller. I. IEEE Trans. Syst. Man Cybern. 20(2), 404\u2013418 (1990)","journal-title":"IEEE Trans. Syst. Man Cybern."},{"issue":"3","key":"5_CR19","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/5.364485","volume":"83","author":"JM Mendel","year":"1995","unstructured":"Mendel, J.M.: Fuzzy logic systems for engineering: a tutorial. Proc. IEEE 83(3), 345\u2013377 (1995)","journal-title":"Proc. IEEE"}],"container-title":["Lecture Notes on Data Engineering and Communications Technologies","Advances in Internet, Data &amp; Web Technologies"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-53555-0_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,11]],"date-time":"2024-11-11T04:12:05Z","timestamp":1731298325000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-53555-0_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024]]},"ISBN":["9783031535543","9783031535550"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-53555-0_5","relation":{},"ISSN":["2367-4512","2367-4520"],"issn-type":[{"type":"print","value":"2367-4512"},{"type":"electronic","value":"2367-4520"}],"subject":[],"published":{"date-parts":[[2024]]},"assertion":[{"value":"14 February 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EIDWT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Emerging Internet, Data & Web Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Naples","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 February 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 February 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"eidwt12024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/voyager.ce.fit.ac.jp\/conf\/eidwt\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}