{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,20]],"date-time":"2025-08-20T12:39:17Z","timestamp":1755693557637,"version":"3.40.3"},"publisher-location":"Cham","reference-count":11,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591704"},{"type":"electronic","value":"9783319591711"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59171-1_8","type":"book-chapter","created":{"date-parts":[[2017,5,19]],"date-time":"2017-05-19T08:09:03Z","timestamp":1495181343000},"page":"94-109","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Towards Trust-Aware Collaborative Intrusion Detection: Challenges and Solutions"],"prefix":"10.1007","author":[{"given":"Emmanouil","family":"Vasilomanolakis","sequence":"first","affiliation":[]},{"given":"Sheikh Mahbub","family":"Habib","sequence":"additional","affiliation":[]},{"given":"Pavlos","family":"Milaszewicz","sequence":"additional","affiliation":[]},{"given":"Rabee Sohail","family":"Malik","sequence":"additional","affiliation":[]},{"given":"Max","family":"M\u00fchlh\u00e4user","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,20]]},"reference":[{"key":"8_CR1","unstructured":"Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: 17th International Workshop on Database and Expert Systems Applications, DEXA 2006, September 2006"},{"key":"8_CR2","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/s10922-010-9176-7","volume":"19","author":"C Fung","year":"2011","unstructured":"Fung, C., Zhang, J., Aib, I., Boutaba, R.: Trust management and admission control for host-based collaborative intrusion detection. J. Netw. Syst. Manag. 19, 257\u2013277 (2011)","journal-title":"J. Netw. Syst. Manag."},{"issue":"1","key":"8_CR3","first-page":"63","volume":"2","author":"C Fung","year":"2011","unstructured":"Fung, C.: Collaborative intrusion detection networks and insider attacks. J. Wireless Mob. Netw. Ubiquit. Comput. Dependable Appl. 2(1), 63\u201374 (2011)","journal-title":"J. Wireless Mob. Netw. Ubiquit. Comput. Dependable Appl."},{"issue":"2","key":"8_CR4","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1109\/TNSM.2011.050311.100028","volume":"8","author":"CJ Fung","year":"2011","unstructured":"Fung, C.J., Zhang, J., Aib, I., Boutaba, R.: Dirichlet-based trust management for effective collaborative intrusion detection networks. IEEE Trans. Netw. Serv. Manag. 8(2), 79\u201391 (2011)","journal-title":"IEEE Trans. Netw. Serv. Manag."},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Habib, S.M., Volk, F., Hauke, S., M\u00fchlh\u00e4user, M.: Computational trust methods for security quantification in the cloud ecosystem. In: The Cloud Security Ecosystem - Technical, Legal, Business and Management Issues, pp. 463\u2013493. Syngress (2015)","DOI":"10.1016\/B978-0-12-801595-7.00021-5"},{"issue":"4","key":"8_CR6","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2542049","volume":"46","author":"R Mitchell","year":"2014","unstructured":"Mitchell, R., Chen, I.R.: A survey of intrusion detection techniques for cyber-physical systems. ACM Comput. Surv. (CSUR) 46(4), 55 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"12","key":"8_CR7","doi-asserted-by":"publisher","first-page":"2884","DOI":"10.1016\/j.comnet.2012.05.002","volume":"56","author":"FJ Ortega","year":"2012","unstructured":"Ortega, F.J., Troyano, J.A., Cruz, F.L., Vallejo, C.G., Enr\u00edquez, F.: Propagation of trust and distrust for the detection of trolls in a social network. Comput. Netw. 56(12), 2884\u20132895 (2012)","journal-title":"Comput. Netw."},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"571","DOI":"10.1016\/j.jcss.2013.06.012","volume":"80","author":"MG P\u00e9rez","year":"2014","unstructured":"P\u00e9rez, M.G., M\u00e1rmol, F.G., P\u00e9rez, G.M., Skarmeta G\u00f3mez, A.F.: Building a reputation-based bootstrapping mechanism for newcomers in collaborative alert systems. J. Comput. Syst. Sci. 80, 571\u2013590 (2014)","journal-title":"J. Comput. Syst. Sci."},{"key":"8_CR9","doi-asserted-by":"publisher","first-page":"70","DOI":"10.1016\/j.comnet.2013.08.026","volume":"58","author":"MG P\u00e9rez","year":"2014","unstructured":"P\u00e9rez, M.G., Tapiador, J.E., Clark, J.A., P\u00e9rez, G.M., Skarmeta G\u00f3mez, A.F.: Trustworthy placements: Improving quality and resilience in collaborative attack detection. Comput. Netw. 58, 70\u201386 (2014)","journal-title":"Comput. Netw."},{"issue":"4","key":"8_CR10","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/2716260","volume":"47","author":"E Vasilomanolakis","year":"2015","unstructured":"Vasilomanolakis, E., Karuppayah, S., M\u00fchlh\u00e4user, M., Fischer, M.: Taxonomy and survey of collaborative intrusion detection. ACM Comput. Surv. 47(4), 33 (2015)","journal-title":"ACM Comput. Surv."},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Yu, B., Singh, M.: Detecting deception in reputation management. In: Proceedings of the Second International Joint Conference on Autonomous Agents and Multiagent Systems (2003)","DOI":"10.1145\/860575.860588"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management XI"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59171-1_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T12:42:23Z","timestamp":1709815343000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-59171-1_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591704","9783319591711"],"references-count":11,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59171-1_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2017]]},"assertion":[{"value":"20 May 2017","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IFIPTM","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Trust Management","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Gothenburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sweden","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 June 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ifiptm2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/s.ifiptm.org\/conf2017","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}