{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:44:44Z","timestamp":1725533084066},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642020551"},{"type":"electronic","value":"9783642020568"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-02056-8_18","type":"book-chapter","created":{"date-parts":[[2009,6,5]],"date-time":"2009-06-05T18:43:27Z","timestamp":1244227407000},"page":"283-297","source":"Crossref","is-referenced-by-count":7,"title":["Comparison of the Beta and the Hidden Markov Models of Trust in Dynamic Environments"],"prefix":"10.1007","author":[{"given":"Marie E. G.","family":"Moe","sequence":"first","affiliation":[]},{"given":"Bjarne E.","family":"Helvik","sequence":"additional","affiliation":[]},{"given":"Svein J.","family":"Knapskog","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/ICON.2007.4444083","volume-title":"ICON 2007: 15th IEEE International Conference on Networks","author":"V. Balakrishnan","year":"2007","unstructured":"Balakrishnan, V., Varadharajan, V., Tupakula, U., Lucs, P.: TEAM: Trust Enhanced Security Architecture for Mobile Ad-hoc Networks. In: ICON 2007: 15th IEEE International Conference on Networks, pp. 182\u2013187. IEEE, Los Alamitos (2007)"},{"key":"18_CR2","unstructured":"Buchegger, S., Le Boudec, J.: A Robust Reputation System for P2P and Mobile Ad-hoc Networks. In: Proceedings of the Second Workshop on the Economics of Peer-to-Peer Systems (2004)"},{"key":"18_CR3","volume-title":"ICPADS 2004: Proceedings of the Tenth International Conference on Parallel and Distributed Systems","author":"P. Dewan","year":"2004","unstructured":"Dewan, P., Dasgupta, P., Bhattacharya, A.: On using reputations in ad hoc networks to counter malicious nodes. In: ICPADS 2004: Proceedings of the Tenth International Conference on Parallel and Distributed Systems. IEEE, Los Alamitos (2004)"},{"key":"18_CR4","volume-title":"Peer-to-Peer: Harnessing the Power of Disruptive Technologies","author":"R. Dingledine","year":"2001","unstructured":"Dingledine, R., Freedman, M., Molnar, D.: Accountability. In: Oram, A. (ed.) Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O\u2019Reilly, Sebastopol (2001)"},{"key":"18_CR5","volume-title":"Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008)","author":"K. Haslum","year":"2008","unstructured":"Haslum, K., Moe, M.E.G., Knapskog, S.: Real-time Intrusion Prevention and Security Analysis of Networks using HMMs. In: Proceedings of the Fourth IEEE LCN Workshop on Network Security (WNS 2008). IEEE, Los Alamitos (2008)"},{"key":"18_CR6","volume-title":"Proceedings of the Second IEEE International Conference on Availability, Reliability and Security (ARES 2007)","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Haller, J.: Dirichlet Reputation Systems. In: Proceedings of the Second IEEE International Conference on Availability, Reliability and Security (ARES 2007). IEEE, Los Alamitos (2007)"},{"key":"18_CR7","unstructured":"J\u00f8sang, A., Ismail, R.: The Beta Reputation System. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)"},{"issue":"2","key":"18_CR8","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A. J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems\u00a043(2), 618\u2013644 (2007)","journal-title":"Decision Support Systems"},{"key":"18_CR9","first-page":"255","volume-title":"MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking","author":"S. Marti","year":"2000","unstructured":"Marti, S., Giuli, T.J., Lai, K., Baker, M.: Mitigating routing misbehavior in mobile ad hoc networks. In: MobiCom 2000: Proceedings of the 6th annual international conference on Mobile computing and networking, pp. 255\u2013265. ACM, New York (2000)"},{"key":"18_CR10","volume-title":"Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008)","author":"M.E.G. Moe","year":"2008","unstructured":"Moe, M.E.G., Helvik, B.E., Knapskog, S.J.: TSR: Trust-based Secure MANET Routing using HMMs. In: Proceedings of the 4th ACM International Symposium on QoS and Security for Wireless and Mobile Networks (Q2SWinet 2008). ACM, New York (2008)"},{"key":"18_CR11","unstructured":"Moe, M.E.G., Tavakolifard, M., Knapskog, S.J.: Learning Trust in Dynamic Multiagent Environments using HMMs. In: Proceedings of the 13th Nordic Workshop on Secure IT Systems (NordSec 2008) (2008)"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A Computational Model of Trust and Reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp. 2431\u20132439 (2002)","DOI":"10.1109\/HICSS.2002.994181"},{"key":"18_CR13","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1016\/j.entcs.2007.02.017","volume":"172","author":"M. Nielsen","year":"2007","unstructured":"Nielsen, M., Krukow, K., Sassone, V.: A Bayesian Model for Event-based Trust. Electronic Notes on Theoretical Computer Science (ENTCS)\u00a0172, 499\u2013521 (2007)","journal-title":"Electronic Notes on Theoretical Computer Science (ENTCS)"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Rabiner, L.R.: A tutorial on hidden markov models and selected applications in speech recognition. In: Readings in speech recognition, pp. 267\u2013296 (1990)","DOI":"10.1016\/B978-0-08-051584-7.50027-9"},{"key":"18_CR15","volume-title":"Proceedings of the 1996 Workshop on New Security Paradigms (NSPW 1996)","author":"L. Rasmusson","year":"1996","unstructured":"Rasmusson, L., Jansson, S.: Simulated Social Control for Secure Internet Commerce. In: Proceedings of the 1996 Workshop on New Security Paradigms (NSPW 1996). ACM, New York (1996)"},{"key":"18_CR16","first-page":"349","volume-title":"Introduction to Probability Models","author":"S.M. Ross","year":"2003","unstructured":"Ross, S.M.: Continuous-Time Markov Chains. In: Introduction to Probability Models, 8th edn., pp. 349\u2013390. Academic Press, London (2003)","edition":"8"},{"issue":"1","key":"18_CR17","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J. Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artificial Intelligence Review\u00a024(1), 33\u201360 (2005)","journal-title":"Artificial Intelligence Review"},{"key":"18_CR18","volume-title":"Reinforcement Learning: An Introduction","author":"R. Sutton","year":"1998","unstructured":"Sutton, R., Barto, A.G.: Reinforcement Learning: An Introduction. MIT Press, Cambridge (1998)"},{"key":"18_CR19","unstructured":"Whitby, A., J\u00f8sang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems. In: Proceedings of the 7th International Workshop on Trust in Agent Societies (2004)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management III"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-02056-8_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,8]],"date-time":"2019-03-08T13:04:45Z","timestamp":1552050285000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-02056-8_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642020551","9783642020568"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-02056-8_18","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2009]]}}}