{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T21:41:26Z","timestamp":1776289286474,"version":"3.50.1"},"reference-count":85,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T00:00:00Z","timestamp":1653264000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2023,4]]},"DOI":"10.1007\/s10586-022-03614-2","type":"journal-article","created":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T15:03:05Z","timestamp":1653318185000},"page":"903-925","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["TrIDS: an intelligent behavioural trust based IDS for smart healthcare system"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5974-0415","authenticated-orcid":false,"given":"Ashish","family":"Singh","sequence":"first","affiliation":[]},{"given":"Kakali","family":"Chatterjee","sequence":"additional","affiliation":[]},{"given":"Suresh Chandra","family":"Satapathy","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,5,23]]},"reference":[{"issue":"1","key":"3614_CR1","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1089\/tmj.2009.0153","volume":"16","author":"MJ Ackerman","year":"2010","unstructured":"Ackerman, M.J., Filart, R., Burgess, L.P., Lee, I., Poropatich, R.K.: Developing next-generation telehealth tools and technologies: patients, systems, and data perspectives. Telemed. e-Health 16(1), 93\u201395 (2010)","journal-title":"Telemed. e-Health"},{"issue":"1","key":"3614_CR2","first-page":"126","volume":"17","author":"A Skorobogatjko","year":"2014","unstructured":"Skorobogatjko, A., Romanovs, A., Kunicina, N.: State of the art in the healthcare cyber-physical systems. Inform. Technol. Manag. Sci. 17(1), 126\u2013131 (2014)","journal-title":"Inform. Technol. Manag. Sci."},{"key":"3614_CR3","doi-asserted-by":"crossref","unstructured":"Lee, I., Sokolsky, O.: Medical cyber physical systems. In: Design Automation Conference, pp.\u00a0743\u2013748. IEEE (2010)","DOI":"10.1145\/1837274.1837463"},{"issue":"4","key":"3614_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2014\/217415","volume":"10","author":"SA Haque","year":"2014","unstructured":"Haque, S.A., Aziz, S.M., Rahman, M.: Review of cyber-physical system in healthcare. Int. J. Distrib. Sensor Netw. 10(4), 1\u201320217415 (2014)","journal-title":"Int. J. Distrib. Sensor Netw."},{"key":"3614_CR5","doi-asserted-by":"crossref","unstructured":"Agu, E., Pedersen, P., Strong, D., Tulu, B., He, Q., Wang, L., Li, Y.: The Smartphone as a Medical Device: Assessing enablers, benefits and challenges. In 2013 IEEE International Workshop of Internet-of-Things Networking and Control (IoT-NC), pp.\u00a048\u201352. IEEE (2013)","DOI":"10.1109\/IoT-NC.2013.6694053"},{"issue":"4","key":"3614_CR6","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/s10916-018-0921-x","volume":"42","author":"N Dey","year":"2018","unstructured":"Dey, N., Ashour, A.S., Shi, F., Fong, S.J., Tavares, J.M.R.: Medical cyber-physical systems: a survey. J. Med. Syst. 42(4), 74 (2018)","journal-title":"J. Med. Syst."},{"issue":"11","key":"3614_CR7","doi-asserted-by":"publisher","first-page":"4547","DOI":"10.1007\/s12652-018-1138-z","volume":"10","author":"A Singh","year":"2019","unstructured":"Singh, A., Chatterjee, K.: Trust based access control model for securing electronic healthcare system. J. Ambient. Intell. Humaniz. Comput. 10(11), 4547\u20134565 (2019)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"key":"3614_CR8","doi-asserted-by":"publisher","first-page":"2117","DOI":"10.1007\/s12652-019-01240-2","volume":"11","author":"A Singh","year":"2020","unstructured":"Singh, A., Chatterjee, K.: An adaptive mutual trust based access control model for electronic healthcare system. J. Ambient. Intell. Humaniz. Comput. 11, 2117\u20132136 (2020)","journal-title":"J. Ambient. Intell. Humaniz. Comput."},{"issue":"4","key":"3614_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3203245","volume":"51","author":"J Giraldo","year":"2018","unstructured":"Giraldo, J., Urbina, D., Cardenas, A., Valente, J., Faisal, M., Ruths, J., Tippenhauer, N.O., Sandberg, H., Candell, R.: A survey of physics-based attack detection in cyber-physical systems. ACM Comput. Surv. (CSUR) 51(4), 1\u201336 (2018)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"3614_CR10","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1002\/sys.21509","volume":"23","author":"NH Carreras Guzman","year":"2020","unstructured":"Carreras Guzman, N.H., Wied, M., Kozine, I., Lundteigen, M.A.: Conceptualizing the key features of cyber-physical systems in a multi-layered representation for safety and security analysis. Syst. Eng. 23(2), 189\u2013210 (2020)","journal-title":"Syst. Eng."},{"key":"3614_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.micpro.2020.103201","volume":"77","author":"J-PA Yaacoub","year":"2020","unstructured":"Yaacoub, J.-P.A., Salman, O., Noura, H.N., Kaaniche, N., Chehab, A., Malli, M.: Cyber-physical systems security: Limitations, issues and future trends. Microprocess. Microsyst. 77, 103201 (2020)","journal-title":"Microprocess. Microsyst."},{"key":"3614_CR12","first-page":"18","volume":"44","author":"T Chin","year":"2001","unstructured":"Chin, T.: Security breach: Hacker gets medical records. Am. Med. News 44, 18\u201319 (2001)","journal-title":"Am. Med. News"},{"key":"3614_CR13","unstructured":"2008 cyberattack on United States, Accessed 20 Dec 2020. https:\/\/en.wikipedia.org\/wiki\/2008_cyberattack_on_United_States"},{"key":"3614_CR14","first-page":"27","volume":"12","author":"J Markoff","year":"2008","unstructured":"Markoff, J.: Before the gunfire, cyberattacks. N.Y. Times 12, 27\u201328 (2008)","journal-title":"N.Y. Times"},{"key":"3614_CR15","unstructured":"INTELLIGENCE, T.: SamSam: targeted ransomware attacks continue. Accessed 22 Dec 2020. https:\/\/symantec-enterprise-blogs.security.com\/blogs\/threat-intelligence\/samsam-targeted-ransomware-attacks"},{"issue":"4","key":"3614_CR16","first-page":"771","volume":"2","author":"A Singh","year":"2018","unstructured":"Singh, A., Chatterjee, K.: USTrust: a user and service trust evaluation model for cloud computing environment. Int. J. Comput. Intell. IoT 2(4), 771\u2013776 (2018)","journal-title":"Int. J. Comput. Intell. IoT"},{"key":"3614_CR17","doi-asserted-by":"crossref","unstructured":"Singh, A., Chatterjee, K.: A mutual trust based access control framework for securing electronic healthcare system. In: 2017 14th IEEE India Council International Conference (INDICON). pp.\u00a01\u20136. IEEE (2017)","DOI":"10.1109\/INDICON.2017.8487658"},{"issue":"13\u201314","key":"3614_CR18","doi-asserted-by":"publisher","first-page":"2521","DOI":"10.1016\/j.comcom.2006.02.011","volume":"29","author":"A Milenkovi\u0107","year":"2006","unstructured":"Milenkovi\u0107, A., Otto, C., Jovanov, E.: Wireless sensor networks for personal health monitoring: issues and an implementation. Comput. Commun. 29(13\u201314), 2521\u20132533 (2006)","journal-title":"Comput. Commun."},{"issue":"1","key":"3614_CR19","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MC.2013.31","volume":"46","author":"G Schirner","year":"2013","unstructured":"Schirner, G., Erdogmus, D., Chowdhury, K., Padir, T.: The Future of Human-in-the-loop cyber-physical systems. Computer 46(1), 36\u201345 (2013)","journal-title":"Computer"},{"key":"3614_CR20","doi-asserted-by":"crossref","unstructured":"Hu, L., Xie, N., Kuang, Z., Zhao, K.: Review of cyber-physical system architecture. In 2012 IEEE 15th International Symposium on Object\/Component\/Service-Oriented Real-Time Distributed Computing Workshops, pp.\u00a025\u201330. IEEE (2012)","DOI":"10.1109\/ISORCW.2012.15"},{"issue":"12","key":"3614_CR21","doi-asserted-by":"publisher","first-page":"10837","DOI":"10.3390\/s101210837","volume":"10","author":"T Yilmaz","year":"2010","unstructured":"Yilmaz, T., Foster, R., Hao, Y.: Detecting vital signs with wearable wireless sensors. Sensors 10(12), 10837\u201310862 (2010)","journal-title":"Sensors"},{"issue":"2","key":"3614_CR22","first-page":"515","volume":"2","author":"S Chaudhary","year":"2019","unstructured":"Chaudhary, S., Singh, A., Chatterjee, K.: Wireless body sensor network (WBSN) security and privacy issues: a survey. Int. J. Comput. Intell. IoT 2(2), 515\u2013521 (2019)","journal-title":"Int. J. Comput. Intell. IoT"},{"issue":"8","key":"3614_CR23","doi-asserted-by":"publisher","first-page":"1834","DOI":"10.1109\/JPROC.2012.2235131","volume":"101","author":"K Sampigethaya","year":"2013","unstructured":"Sampigethaya, K., Poovendran, R.: Aviation cyber-physical systems: foundations for future aircraft and air transport. Proc. IEEE 101(8), 1834\u20131855 (2013)","journal-title":"Proc. IEEE"},{"issue":"1\u20132","key":"3614_CR24","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1504\/IJCC.2016.075101","volume":"5","author":"I Kocsis","year":"2016","unstructured":"Kocsis, I., T\u00f3th, \u00c1.R, Szatm\u00e1ri, Z., Dab\u00f3czi, T., Pataricza, A., Guta, G.: Towards cyber-physical system technologies over Apache VCL. Int. J. Cloud Comput. 5(1\u20132), 91\u2013111 (2016)","journal-title":"Int. J. Cloud Comput."},{"key":"3614_CR25","first-page":"1","volume":"33","author":"BN Chun","year":"2003","unstructured":"Chun, B.N., Lee, J., Weatherspoon, H., Chun, B.N.: Netbait: a distributed worm detection service. Intel Res Berkeley Tech Rep IRB-TR-03 33, 1\u201311 (2003)","journal-title":"Intel Res Berkeley Tech Rep IRB-TR-03"},{"key":"3614_CR26","unstructured":"Huebsch, R., Chun, B., Hellerstein, J., Loo, B., Maniatis, P., Roscoe, T., Shenker, S., Stoica, I., Yumerefendi, A.: The architecture of PIER: an internet-scale query processor. In: Proceedings of the 2005 Conference on Innovative Data Systems Research (CIDR), p.\u00a028-43 (2005)"},{"key":"3614_CR27","doi-asserted-by":"crossref","unstructured":"Porras, P.\u00a0A., Neumann, P.\u00a0G.: EMERALD: event monitoring enabling responses to anomalous live disturbances . In: 1997 National Information Systems Security Conference, pp.\u00a01\u201315 (1997)","DOI":"10.1145\/250021.250024"},{"key":"3614_CR28","unstructured":"Snapp, S.\u00a0R., Brentano, J., Dias, G., Goan, T.\u00a0L., Heberlein, L.\u00a0T., Ho, C.-L., Levitt, K.\u00a0N.: DIDS (distributed intrusion detection system)-motivation, architecture, and an early prototype. In: Proceedings of the 14th National Computer Security Conference, p.\u00a0167-176 (1991)"},{"key":"3614_CR29","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, Y., Beach, A.: Towards scalable and robust distributed intrusion alert fusion with good load balancing. LSAD '06, pp.\u00a0115-122. ACM (2006)","DOI":"10.1145\/1162666.1162669"},{"key":"3614_CR30","doi-asserted-by":"publisher","first-page":"7234","DOI":"10.1109\/ACCESS.2017.2772294","volume":"6","author":"W Meng","year":"2018","unstructured":"Meng, W., Li, W., Su, C., Zhou, J., Lu, R.: Enhancing trust management for wireless intrusion detection via traffic sampling in the era of big data. IEEE Access 6, 7234\u20137243 (2018)","journal-title":"IEEE Access"},{"issue":"1","key":"3614_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11277-018-6005-x","volume":"104","author":"DK Anguraj","year":"2019","unstructured":"Anguraj, D.K., Smys, S.: Trust-based intrusion detection and clustering approach for wireless body area networks. Wireless Pers. Commun. 104(1), 1\u201320 (2019)","journal-title":"Wireless Pers. Commun."},{"key":"3614_CR32","first-page":"138","volume":"19","author":"AH Celdr\u00e1n","year":"2018","unstructured":"Celdr\u00e1n, A.H., P\u00e9rez, M.G., Clemente, F.J.G., P\u00e9rez, G.M.: Sustainable securing of medical cyber-physical systems for the healthcare of the future. Sustain. Comput.: Inform. Syst. 19, 138\u2013146 (2018)","journal-title":"Sustain. Comput.: Inform. Syst."},{"issue":"1","key":"3614_CR33","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1109\/TSIPN.2017.2749976","volume":"4","author":"H Sadreazami","year":"2017","unstructured":"Sadreazami, H., Mohammadi, A., Asif, A., Plataniotis, K.N.: Distributed-graph-based statistical approach for intrusion detection in cyber-physical systems. IEEE Transact. Signal Inform. Process Over Netw 4(1), 137\u2013147 (2017)","journal-title":"IEEE Transact. Signal Inform. Process Over Netw"},{"key":"3614_CR34","doi-asserted-by":"publisher","first-page":"3491","DOI":"10.1109\/ACCESS.2017.2782159","volume":"6","author":"G Loukas","year":"2017","unstructured":"Loukas, G., Vuong, T., Heartfield, R., Sakellari, G., Yoon, Y., Gan, D.: Cloud-based cyber-physical intrusion detection for vehicles using deep learning. IEEE Access 6, 3491\u20133508 (2017)","journal-title":"IEEE Access"},{"issue":"1","key":"3614_CR35","first-page":"1","volume":"16","author":"K Wang","year":"2016","unstructured":"Wang, K., Du, M., Yang, D., Zhu, C., Shen, J., Zhang, Y.: Game-theory-based active defense for intrusion detection in cyber-physical embedded systems. ACM Trans. Embedded Comput. Syst. (TECS) 16(1), 1\u201321 (2016)","journal-title":"ACM Trans. Embedded Comput. Syst. (TECS)"},{"issue":"4","key":"3614_CR36","doi-asserted-by":"publisher","first-page":"1993","DOI":"10.1007\/s11277-016-3349-y","volume":"94","author":"G Rajeshkumar","year":"2017","unstructured":"Rajeshkumar, G., Valluvan, K.: An energy aware trust based intrusion detection system with adaptive acknowledgement for wireless sensor network. Wireless Pers. Commun. 94(4), 1993\u20132007 (2017)","journal-title":"Wireless Pers. Commun."},{"key":"3614_CR37","doi-asserted-by":"crossref","unstructured":"Li, W., Meng, W. et\u00a0al.: Design of intrusion sensitivity-based trust management model for collaborative intrusion detection networks. In: IFIP International Conference on Trust Management, pp.\u00a061\u201376. Springer (2014)","DOI":"10.1007\/978-3-662-43813-8_5"},{"key":"3614_CR38","unstructured":"Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A trust-aware, P2P-based overlay for intrusion detection. In: 17th International Workshop on Database and Expert Systems Applications (DEXA\u201906)"},{"issue":"11","key":"3614_CR39","doi-asserted-by":"publisher","first-page":"1698","DOI":"10.1109\/TPDS.2008.258","volume":"20","author":"RA Shaikh","year":"2009","unstructured":"Shaikh, R.A., Jameel, H., d\u2019Auriol, B.J., Lee, H., Lee, S., Song, Y.-J.: Group-based trust management scheme for clustered wireless sensor networks. IEEE Trans. Parallel Distrib. Syst. 20(11), 1698\u20131712 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"3614_CR40","doi-asserted-by":"crossref","unstructured":"Zhang, J., Shankaran, R., Orgun, M.\u00a0A., Varadharajan, V., Sattar, A.: A dynamic trust establishment and management framework for wireless sensor networks. In: 2010 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, pp.\u00a0484\u2013491 (2010)","DOI":"10.1109\/EUC.2010.80"},{"issue":"4","key":"3614_CR41","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1080\/18756891.2013.802114","volume":"6","author":"Y Meng","year":"2013","unstructured":"Meng, Y., Kwok, L.-F.: Enhancing false alarm reduction using voted ensemble selection in intrusion detection. Int. J. Comput. Intell. Syst. 6(4), 626\u2013638 (2013)","journal-title":"Int. J. Comput. Intell. Syst."},{"key":"3614_CR42","doi-asserted-by":"publisher","first-page":"162","DOI":"10.1016\/j.jnca.2016.11.012","volume":"78","author":"W Meng","year":"2017","unstructured":"Meng, W., Li, W., Xiang, Y., Choo, K.-K.R.: A bayesian inference-based detection mechanism to defend medical smartphone networks against insider attacks. J. Netw. Comput. Appl. 78, 162\u2013169 (2017)","journal-title":"J. Netw. Comput. Appl."},{"key":"3614_CR43","doi-asserted-by":"publisher","first-page":"1258","DOI":"10.1016\/j.future.2018.06.007","volume":"108","author":"W Meng","year":"2020","unstructured":"Meng, W., Li, W., Wang, Y., Au, M.H.: Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Futur. Gener. Comput. Syst. 108, 1258\u20131266 (2020)","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"1","key":"3614_CR44","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1109\/TIFS.2015.2482465","volume":"11","author":"X Ruan","year":"2015","unstructured":"Ruan, X., Wu, Z., Wang, H., Jajodia, S.: Profiling online social behaviors for compromised account detection. IEEE Trans. Inf. Forensics Secur. 11(1), 176\u2013187 (2015)","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"3614_CR45","doi-asserted-by":"crossref","unstructured":"Guo, J., Marshall, A., Zhou, B.: A new trust management framework for detecting malicious and selfish behaviour for mobile ad hoc networks. In: 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications, pp.\u00a0142\u2013149 (2011)","DOI":"10.1109\/TrustCom.2011.21"},{"key":"3614_CR46","doi-asserted-by":"crossref","unstructured":"Daabaj, K., Dixon, M., Koziniec, T., Lee, K.: Trusted routing for resource-constrained wireless sensor networks. In: 2010 IEEE\/IFIP International Conference on Embedded and Ubiquitous Computing, pp.\u00a0666\u2013671 (2010)","DOI":"10.1109\/EUC.2010.106"},{"key":"3614_CR47","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1016\/j.vehcom.2016.11.010","volume":"9","author":"CA Kerrache","year":"2017","unstructured":"Kerrache, C.A., Lagraa, N., Calafate, C.T., Lakas, A.: TFDD: a trust-based framework for reliable data delivery and DoS defense in VANETs. Vehicular Commun. 9, 254\u2013267 (2017)","journal-title":"Vehicular Commun."},{"key":"3614_CR48","doi-asserted-by":"crossref","unstructured":"Kshirsagar, D., Kumar, S.: Towards an intrusion detection system for detecting web attacks based on an ensemble of filter feature selection techniques. Cyber-Phys. Syst. pp.\u00a01\u201316 (2022)","DOI":"10.1080\/23335777.2021.2023651"},{"key":"3614_CR49","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1016\/j.future.2021.02.001","volume":"119","author":"SS Jagtap","year":"2021","unstructured":"Jagtap, S.S., Subramaniyaswamy, S.: A hypergraph based Kohonen map for detecting intrusions over cyber-physical systems traffic. Future Generat. Comput. Syst. 119, 84\u2013109 (2021)","journal-title":"Future Generat. Comput. Syst."},{"key":"3614_CR50","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2021.107044","volume":"91","author":"S Thakur","year":"2021","unstructured":"Thakur, S., Chakraborty, A., De, R., Kumar, N., Sarkar, R.: Intrusion detection in cyber-physical systems using a generic and domain specific deep autoencoder model. Comput. Electr. Eng. 91, 107044 (2021)","journal-title":"Comput. Electr. Eng."},{"key":"3614_CR51","doi-asserted-by":"publisher","DOI":"10.1016\/j.measurement.2021.110145","volume":"186","author":"MM Althobaiti","year":"2021","unstructured":"Althobaiti, M.M., Kumar, K.P.M., Gupta, D., Kumar, S., Mansour, R.F.: An intelligent cognitive computing based intrusion detection for industrial cyber-physical systems. Measurement 186, 110145 (2021)","journal-title":"Measurement"},{"key":"3614_CR52","doi-asserted-by":"crossref","unstructured":"Alohali, M. A, Al-Wesabi, F. N., Hilal, A. M., Goel, S., Gupta, D., Khanna, A.: Artificial intelligence enabled intrusion detection systems for cognitive cyber-physical systems in industry 4.0 environment,\u201d Cognitive Neurodynamics, pp.\u00a01\u201313 (2022)","DOI":"10.1007\/s11571-022-09780-8"},{"key":"3614_CR53","doi-asserted-by":"crossref","unstructured":"Semwal, P., Handa, A.: Cyber-attack detection in cyber-physical systems using supervised machine learning. In: Handbook of Big Data Analytics and Forensics, pp.\u00a0131\u2013140. Springer (2022)","DOI":"10.1007\/978-3-030-74753-4_9"},{"key":"3614_CR54","doi-asserted-by":"crossref","unstructured":"Sunagar, P.\u00a0C., Kanavalli, A. et al.: Intrusion detection system using deep learning. In: Deep Learning Applications for Cyber-Physical Systems, pp.\u00a0160\u2013181. IGI Global (2022)","DOI":"10.4018\/978-1-7998-8161-2.ch009"},{"key":"3614_CR55","doi-asserted-by":"crossref","unstructured":"Aishwarya, R., Ajitha, M., Sheryl\u00a0Oliver, A.: Model for intrusion detection in cyber-physical system to address network simulation. In: ICT Systems and Sustainability. pp.\u00a065\u201373. Springer (2022)","DOI":"10.1007\/978-981-16-5987-4_7"},{"key":"3614_CR56","doi-asserted-by":"crossref","unstructured":"Dutta, A.\u00a0K., Negi, R., Shukla, S.\u00a0K.: Robust multivariate anomaly-based intrusion detection system for cyber-physical systems. In: International Symposium on Cyber Security Cryptography and Machine Learning, pp.\u00a086\u201393, Springer (2021)","DOI":"10.1007\/978-3-030-78086-9_6"},{"issue":"2","key":"3614_CR57","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/ICJECE.2021.3053231","volume":"44","author":"M Sharma","year":"2021","unstructured":"Sharma, M., Elmiligi, H., Gebali, F.: A novel intrusion detection system for rpl-based cyber-physical systems. IEEE Can. J. Electr. Comput. Eng. 44(2), 246\u2013252 (2021)","journal-title":"IEEE Can. J. Electr. Comput. Eng."},{"key":"3614_CR58","unstructured":"Eltanbouly, S. S.: Multimodal intrusion detection system for cyber physical systems.\u2019 Master\u2019s thesis (2021)"},{"key":"3614_CR59","doi-asserted-by":"crossref","unstructured":"Zimmer, C., Bhat, B., Mueller, F., Mohan, S.: Time-based intrusion detection in cyber-physical systems. In: Proceedings of the 1st ACM\/IEEE International Conference on Cyber-Physical Systems, pp.\u00a0109\u2013118 (2010)","DOI":"10.1145\/1795194.1795210"},{"key":"3614_CR60","doi-asserted-by":"crossref","unstructured":"Sabater, J., Sierra, C.: REGRET: reputation in gregarious societies. In: Proceedings of the fifth international conference on Autonomous agents, pp.\u00a0194\u2013195 (2001)","DOI":"10.1145\/375735.376110"},{"issue":"4","key":"3614_CR61","doi-asserted-by":"publisher","first-page":"796","DOI":"10.1109\/TSG.2011.2159818","volume":"2","author":"Y Zhang","year":"2011","unstructured":"Zhang, Y., Wang, L., Sun, W., Green, R.C., II., Alam, M.: Distributed intrusion detection system in a multi-layer network architecture of smart grids. IEEE Trans. Smart Grid 2(4), 796\u2013808 (2011)","journal-title":"IEEE Trans. Smart Grid"},{"key":"3614_CR62","doi-asserted-by":"crossref","unstructured":"Bao, F., Chen, R., Chang, M., Cho, J.-H.: Trust-based intrusion detection in wireless sensor networks. In: 2011 IEEE International Conference on Communications (ICC), pp.\u00a01\u20136. IEEE (2011)","DOI":"10.1109\/icc.2011.5963250"},{"key":"3614_CR63","doi-asserted-by":"crossref","unstructured":"Hawrylak, P.\u00a0J., Haney, M., Papa, M., Hale, J.: Using hybrid attack graphs to model cyber-physical attacks in the Smart Grid. In: 2012 5th International Symposium on Resilient Control Systems, pp.\u00a0161\u2013164. IEEE (2012)","DOI":"10.1109\/ISRCS.2012.6309311"},{"issue":"4","key":"3614_CR64","first-page":"71","volume":"4","author":"SA Idowu","year":"2015","unstructured":"Idowu, S.A., Omotosho, O.J., Ojesanmi, O.A., Maitanmi, S.O.: Cyber-physical systems: a framework for prediction of error in smart medical devices. Am. J. Softw. Eng. Appl. 4(4), 71\u20139 (2015)","journal-title":"Am. J. Softw. Eng. Appl."},{"issue":"4","key":"3614_CR65","first-page":"489","volume":"10","author":"U Ghugar","year":"2018","unstructured":"Ghugar, U., Pradhan, J., Bhoi, S.K., Sahoo, R.R., Panda, S.K.: PL-IDS: physical layer trust based intrusion detection system for wireless sensor networks. Int. J. Inf. Technol. 10(4), 489\u2013494 (2018)","journal-title":"Int. J. Inf. Technol."},{"key":"3614_CR66","doi-asserted-by":"crossref","unstructured":"Ghugar, U., Pradhan, J., Bhoi, S.\u00a0K., Sahoo, R.\u00a0R.: LB-IDS: securing wireless sensor network using protocol layer trust-based intrusion detection system. J. Comput. Netw. Commun. 2019 (2019)","DOI":"10.1155\/2019\/2054298"},{"issue":"3","key":"3614_CR67","first-page":"1","volume":"1","author":"A Lamba","year":"2014","unstructured":"Lamba, A.: A through analysis on protecting cyber threats and attacks on cps embedded subsystems. Int. J. Curr. Eng. Sci. Res. (IJCESR) 1(3), 1\u20138 (2014)","journal-title":"Int. J. Curr. Eng. Sci. Res. (IJCESR)"},{"key":"3614_CR68","doi-asserted-by":"crossref","unstructured":"Luo, Y., Xiao, Y., Cheng, L., Peng, G., Yao, D.\u00a0D.: Deep Learning-Based Anomaly Detection in Cyber-Physical Systems: Progress and Opportunities. arXiv preprint arXiv:2003.13213 (2020)","DOI":"10.1145\/3453155"},{"issue":"1","key":"3614_CR69","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2906151","volume":"49","author":"W Jiang","year":"2016","unstructured":"Jiang, W., Wang, G., Bhuiyan, M.Z.A., Wu, J.: Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput. Surv. (CSUR) 49(1), 1\u201335 (2016)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"3614_CR70","doi-asserted-by":"crossref","unstructured":"Vasani, V., Chudasama, V.: A trust rating model using fuzzy logic in cloud. In: International Conference on Innovative Computing and Communications, pp.\u00a0339\u2013348. Springer (2019)","DOI":"10.1007\/978-981-13-2354-6_36"},{"issue":"4","key":"3614_CR71","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1049\/iet-wss.2011.0042","volume":"1","author":"H Xia","year":"2011","unstructured":"Xia, H., Jia, Z., Ju, L., Zhu, Y.: Trust management model for mobile ad hoc network based on analytic hierarchy process and fuzzy theory. IET Wireless Sensor Syst. 1(4), 248\u2013266 (2011)","journal-title":"IET Wireless Sensor Syst."},{"key":"3614_CR72","doi-asserted-by":"crossref","unstructured":"Raghebi, Z., Hashemi, M.\u00a0R.: A new trust evaluation method based on reliability of customer feedback for cloud computing. In: 2013 10th International ISC conference on information security and cryptology (ISCISC), pp.\u00a01\u20136, IEEE (2013)","DOI":"10.1109\/ISCISC.2013.6767353"},{"key":"3614_CR73","unstructured":"Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proceedings of the 35th Annual Hawaii International Conference on System Sciences, pp.\u00a02431\u20132439. IEEE (2002)"},{"issue":"2","key":"3614_CR74","first-page":"291","volume":"20","author":"S Deshpande","year":"2018","unstructured":"Deshpande, S., Ingle, R.: Evidence based trust estimation model for cloud computing services. Int. J. Netw. Sec. 20(2), 291\u2013303 (2018)","journal-title":"Int. J. Netw. Sec."},{"issue":"1","key":"3614_CR75","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s10479-013-1380-x","volume":"233","author":"P Manuel","year":"2015","unstructured":"Manuel, P.: A trust model of cloud computing based on quality of service. Ann. Oper. Res. 233(1), 281\u2013292 (2015)","journal-title":"Ann. Oper. Res."},{"key":"3614_CR76","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1016\/j.jnca.2015.06.013","volume":"59","author":"W Fang","year":"2016","unstructured":"Fang, W., Zhang, C., Shi, Z., Zhao, Q., Shan, L.: BTRES: beta-based trust and reputation evaluation system for wireless sensor networks. J. Netw. Comput. Appl. 59, 88\u201394 (2016)","journal-title":"J. Netw. Comput. Appl."},{"key":"3614_CR77","unstructured":"J\u00f8sang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference, vol.\u00a05, pp.\u00a02502\u20132511 (2002)"},{"issue":"1","key":"3614_CR78","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1007\/s12083-015-0425-0","volume":"10","author":"H Hu","year":"2017","unstructured":"Hu, H., Lu, R., Zhang, Z.: TPSQ: trust-based platoon service query via vehicular communications. Peer-to-Peer Network. Appl. 10(1), 262\u2013277 (2017)","journal-title":"Peer-to-Peer Network. Appl."},{"key":"3614_CR79","doi-asserted-by":"crossref","unstructured":"Jing, S., Tang, Y., Yan, J.: The application of fuzzy VIKOR for the design scheme selection in lean management. Mathem Probl. Eng. 2018 (2018)","DOI":"10.1155\/2018\/9253643"},{"issue":"1","key":"3614_CR80","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/s00500-014-1516-1","volume":"20","author":"M Ashtiani","year":"2016","unstructured":"Ashtiani, M., Azgomi, M.A.: Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft. Comput. 20(1), 399\u2013421 (2016)","journal-title":"Soft. Comput."},{"issue":"1","key":"3614_CR81","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1007\/s11277-019-06403-0","volume":"108","author":"K Chatterjee","year":"2019","unstructured":"Chatterjee, K., Neha: Continuous user authentication system: a risk analysis based approach. Wireless Person. Commun. 108(1), 281\u2013295 (2019)","journal-title":"Wireless Person. Commun."},{"key":"3614_CR82","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1016\/j.procs.2016.08.056","volume":"94","author":"K Lu","year":"2016","unstructured":"Lu, K., Wang, J., Xie, L., Zhen, Q., Li, M.: An eigentrust-based hybrid trust model in P2P file sharing networks. Proc. Comput. Sci. 94, 366\u2013371 (2016)","journal-title":"Proc. Comput. Sci."},{"issue":"1","key":"3614_CR83","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3354\/cr030079","volume":"30","author":"CJ Willmott","year":"2005","unstructured":"Willmott, C.J., Matsuura, K.: Advantages of the mean absolute error (MAE) over the root mean square error (RMSE) in assessing average model performance. Climate Res. 30(1), 79\u201382 (2005)","journal-title":"Climate Res."},{"issue":"19","key":"3614_CR84","doi-asserted-by":"publisher","first-page":"28309","DOI":"10.1007\/s11042-019-07923-4","volume":"78","author":"A Singh","year":"2019","unstructured":"Singh, A., Chatterjee, K.: ITrust: identity and trust based access control model for healthcare system security. Multim. Tools Appl. 78(19), 28309\u201328330 (2019)","journal-title":"Multim. Tools Appl."},{"issue":"8","key":"3614_CR85","doi-asserted-by":"publisher","first-page":"1352","DOI":"10.1057\/jors.2014.103","volume":"66","author":"C Tofallis","year":"2015","unstructured":"Tofallis, C.: A better measure of relative prediction accuracy for model selection and model estimation. J. Operat. Res. Soc. 66(8), 1352\u20131362 (2015)","journal-title":"J. Operat. Res. Soc."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03614-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10586-022-03614-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-022-03614-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,25]],"date-time":"2024-09-25T19:35:33Z","timestamp":1727292933000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10586-022-03614-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,23]]},"references-count":85,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4]]}},"alternative-id":["3614"],"URL":"https:\/\/doi.org\/10.1007\/s10586-022-03614-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,5,23]]},"assertion":[{"value":"18 December 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2022","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2022","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 May 2022","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"There is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"We did not use animals and human participants in the study reported in this work","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}},{"value":"For this type of study informed consent is not required.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Informed consent"}},{"value":"For this type of study consent for publication is not required.","order":5,"name":"Ethics","group":{"name":"EthicsHeading","label":"Consent for publication"}}]}}