{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T09:47:13Z","timestamp":1773654433811,"version":"3.50.1"},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319103525","type":"print"},{"value":"9783319103532","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-10353-2_10","type":"book-chapter","created":{"date-parts":[[2014,8,1]],"date-time":"2014-08-01T12:19:46Z","timestamp":1406895586000},"page":"106-120","source":"Crossref","is-referenced-by-count":17,"title":["Trust and Reputation Mechanisms for Multi-agent Robotic Systems"],"prefix":"10.1007","author":[{"given":"Igor A.","family":"Zikratov","sequence":"first","affiliation":[]},{"given":"Ilya S.","family":"Lebedev","sequence":"additional","affiliation":[]},{"given":"Andrei V.","family":"Gurtov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Wooldridge, M.: An Introduction to MultiAgent Systems, 366 p. John Wiley & Sons Ltd., paperback (2002) ISBN 0-471-49691-X"},{"issue":"2&3","key":"10_CR2","first-page":"288","volume":"2","author":"F. Higgins","year":"2009","unstructured":"Higgins, F., Tomlinson, A., Martin, K.M.: Threats to the Swarm: Security Considerations for Swarm Robotics. International Journal on Advances in Security\u00a02(2&3), 288\u2013297 (2009)","journal-title":"International Journal on Advances in Security"},{"issue":"87","key":"10_CR3","first-page":"149","volume":"5","author":"I.A. Zikratov","year":"2013","unstructured":"Zikratov, I.A., Kozlova, E.V., Zikratova, T.V.: Analysis of vulnerability of robotic complexes with swarm intellect. Scientific and Technical Journal of Information Technologies, Mechanics and Optics\u00a05(87), 149\u2013154 (2013)","journal-title":"Scientific and Technical Journal of Information Technologies, Mechanics and Optics"},{"key":"10_CR4","unstructured":"Neeran, K.M., Tripathi, A.R.: Security in the Ajanta MobileAgent system. Technical Report. Department of Computer Science, University of Minnesota (May 1999)"},{"key":"10_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1007\/3-540-68671-1_4","volume-title":"Mobile Agents and Security","author":"T. Sander","year":"1998","unstructured":"Sander, T., Tschudin, C.F.: Protecting Mobile Agents against malicious hosts. In: Vigna, G. (ed.) Mobile Agents and Security. LNCS, vol.\u00a01419, pp. 44\u201360. Springer, Heidelberg (1998)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Xudong, G., Yiling, Y., Yinyuan, Y.: POM-a mobile agent security model against malicious hosts. In: Proceedings of High Performance Computing in the Asia-Pacific Region, vol.\u00a02, pp. 1165\u20131166 (2000)","DOI":"10.1109\/HPC.2000.843621"},{"key":"10_CR7","unstructured":"Page, J., Zaslavsky, A., Indrawan, M.: A Buddy model of security for mobile agent communities operating in pervasive scenarios. In: Proceeding of the 2nd ACM Intl. Workshop on Australian Information Security & Data Mining, vol.\u00a054 (2004)"},{"key":"10_CR8","unstructured":"Page, Zaslavsky, A., Indrawan, M.: Ountering security vulnerabilities using a shared security buddy model schema in mobile agent communities. In: Proc. of the First International Workshop on Safety and Security in Multi-Agent Systems (SASEMAS 2004), pp. 85\u2013101 (2004)"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1080\/08839510050127579","volume":"14","author":"M. Schillo","year":"2000","unstructured":"Schillo, M., Funk, P., Rovatsos, M.: Using trust for detecting deceitful agents in artificial societies. Applied Artificial Intelligence\u00a014, 825\u2013848 (2000)","journal-title":"Applied Artificial Intelligence"},{"key":"10_CR10","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1007\/978-3-540-45217-1_18","volume-title":"Cooperative Information Agents VII","author":"J. Golbeck","year":"2003","unstructured":"Golbeck, J., Parsia, B., Hendler, J.: Trust Networks on the Semantic Web. In: Klusch, M., Omicini, A., Ossowski, S., Laamanen, H. (eds.) CIA 2003. LNCS (LNAI), vol.\u00a02782, pp. 238\u2013249. Springer, Heidelberg (2003)"},{"issue":"12","key":"10_CR11","doi-asserted-by":"publisher","first-page":"1284","DOI":"10.1016\/j.comcom.2013.04.007","volume":"36","author":"O. Garcia-Morchon","year":"2013","unstructured":"Garcia-Morchon, O., Kuptsov, D., Gurtov, A., Wehrle, K.: Cooperative security in distributed networks. Computer Communications (COMCOM)\u00a036(12), 1284\u20131297 (2013)","journal-title":"Computer Communications (COMCOM)"},{"issue":"1","key":"10_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1017\/S0269888904000116","volume":"19","author":"S.D. Ramchurn","year":"2004","unstructured":"Ramchurn, S.D., Huynh, D., Jennings, N.R.: Trust in multi-agent systems. The Knowledge Engineering Review\u00a019(1), 1\u201325 (2004)","journal-title":"The Knowledge Engineering Review"},{"key":"10_CR13","unstructured":"Kalyaev, I.A., Gayduk, A.R., Kapustyan, S.G.: Models and algorithms of collective control in groups of robots, 280 p. Physmathlit, Moscow (2009)"},{"issue":"90","key":"10_CR14","first-page":"47","volume":"2","author":"I.A. Zikratov","year":"2014","unstructured":"Zikratov, I.A., Zikratova, T.V., Lebedev, I.S.: Confidential model of information security of multi-agent robotic systems with decentralized control. Scientific and Technical Journal of Information Technologies, Mechanics and Optics\u00a02(90), 47\u201352 (2014)","journal-title":"Scientific and Technical Journal of Information Technologies, Mechanics and Optics"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Carter, J.: Reputation Formalization for an Information-Sharing Multi-Agent System. Computational Intelligence\u00a018(2), 515\u2013534","DOI":"10.1111\/1467-8640.t01-1-00201"},{"issue":"5","key":"10_CR16","first-page":"104","volume":"322","author":"A. Beshta","year":"2013","unstructured":"Beshta, A., Kipto, M.: Creation of model of trust to objects of an automated information system for preventing of destructive impact on system. News of Tomsk Polytechnic University\u00a0322(5), 104\u2013108 (2013)","journal-title":"News of Tomsk Polytechnic University"}],"container-title":["Lecture Notes in Computer Science","Internet of Things, Smart Spaces, and Next Generation Networks and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-10353-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T09:20:00Z","timestamp":1558948800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-10353-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319103525","9783319103532"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-10353-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}