{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,18]],"date-time":"2026-03-18T14:12:19Z","timestamp":1773843139241,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642221996","type":"print"},{"value":"9783642222009","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22200-9_22","type":"book-chapter","created":{"date-parts":[[2011,6,25]],"date-time":"2011-06-25T19:52:53Z","timestamp":1309031573000},"page":"277-289","source":"Crossref","is-referenced-by-count":3,"title":["A Trust Management Framework for Detecting Malicious and Selfish Behaviour in Ad-Hoc Wireless Networks Using Fuzzy Sets and Grey Theory"],"prefix":"10.1007","author":[{"given":"Ji","family":"Guo","sequence":"first","affiliation":[]},{"given":"Alan","family":"Marshall","sequence":"additional","affiliation":[]},{"given":"Bosheng","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"22_CR1","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1109\/MCOM.2008.4689216","volume":"46","author":"J. Li","year":"2008","unstructured":"Li, J., Li, R., Kato, J.: Future Trust Management Framework for Mobile Ad Hoc Networks. IEEE Communications Magazine\u00a046(2), 108\u2013114 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"22_CR2","doi-asserted-by":"crossref","unstructured":"Hu, Y.-C., Perrig, A., Johnson, D.B.: Ariadne: A Secure On-Demand Routing Protocol for Ad Hoc Networks. In: Proc. MobiCom 2002 (September 2002)","DOI":"10.1145\/570645.570648"},{"key":"22_CR3","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1109\/MC.2007.76","volume":"40","author":"H. Li","year":"2007","unstructured":"Li, H., Singhal, M.: Trust Management in Distributed Systems. IEEE Computer Society\u00a040, 45\u201353 (2007)","journal-title":"IEEE Computer Society"},{"issue":"2","key":"22_CR4","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y.L. Sun","year":"2006","unstructured":"Sun, Y.L., Yu, W., Han, Z., Ray Liu, K.J.: Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks. IEEE Journal of Selected Areas in Communications (J-SAC)\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE Journal of Selected Areas in Communications (J-SAC)"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Tuan, T.A.: A Game-Theoretic Analysis of Trust Management in P2P Systems. In: First International Conference on ICCE 2006, pp. 130\u2013134 (October 2006)","DOI":"10.1109\/CCE.2006.350832"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Qin, Z., Jia, Z., Chen, X.: Fuzzy Dynamic Programming based Trusted Routing Decision in Mobile Ad Hoc Networks, Embedded Computing. In: Fifth IEEE International Symposium on Embedded Computing, SEC 2008, pp. 180\u2013185 (2008)","DOI":"10.1109\/SEC.2008.46"},{"key":"22_CR7","volume-title":"Introduction to Grey Theory","author":"D. Julong","year":"2002","unstructured":"Julong, D.: Introduction to Grey Theory. Huazhong University of Science & Technology Press, Wuhan (2002)"},{"key":"22_CR8","doi-asserted-by":"crossref","unstructured":"Cai, F., Fugui, T., Yongquan, C., Ming, L., Bing, P.: Grey Theory Based Nodes Risk Assessment in P2P Networks. In: IEEE International Symposium on Parallel and Distributed Processing with Applications, pp. 479\u2013483 (2009)","DOI":"10.1109\/ISPA.2009.45"},{"key":"22_CR9","volume-title":"A Course in Grey Systems","author":"J. Deng","year":"1990","unstructured":"Deng, J.: A Course in Grey Systems. Huazhong University of Science and Technology Press, Wuhan (1990)"},{"key":"22_CR10","doi-asserted-by":"crossref","unstructured":"Song, Q., Jamalipour, A.: Network Selection in An Integrated Wireless LAN and UMTS Environment Using Mathematical Modeling and Computing Techniques. IEEE Wireless Communication, 42\u201348 (June 2005)","DOI":"10.1109\/MWC.2005.1452853"},{"issue":"2","key":"22_CR11","doi-asserted-by":"publisher","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","volume":"46","author":"Y.L. Sun","year":"2008","unstructured":"Sun, Y.L., Han, Z., Liu, K.J.R.: Defense of Trust Management Vulnerabilities in Distributed networks. IEEE Communications Magazine\u00a046(2), 112\u2013119 (2008)","journal-title":"IEEE Communications Magazine"},{"key":"22_CR12","doi-asserted-by":"crossref","unstructured":"Hong, L., Chen, W., Gao, L., Zhang, G., Fu, C.: Grey theory based reputation system for Secure Neighbor Discovery in Wireless Ad Hoc Networks. In: 2nd International Conference on Future Computer and Communication (ICFCC), vol.\u00a02, pp. 749\u2013754 (2010)","DOI":"10.1109\/ICFCC.2010.5497609"},{"key":"22_CR13","volume-title":"Grey Information: Theory and Practical Applications","author":"S. Liu","year":"2006","unstructured":"Liu, S., Lin, Y.: Grey Information: Theory and Practical Applications. Springer, London (2006)"}],"container-title":["IFIP Advances in Information and Communication Technology","Trust Management V"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22200-9_22.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T22:06:47Z","timestamp":1606169207000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22200-9_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642221996","9783642222009"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22200-9_22","relation":{},"ISSN":["1868-4238","1861-2288"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1861-2288","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011]]}}}