{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T12:10:08Z","timestamp":1738325408719,"version":"3.35.0"},"reference-count":16,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2008,8,12]],"date-time":"2008-08-12T00:00:00Z","timestamp":1218499200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Virol"],"published-print":{"date-parts":[[2009,11]]},"DOI":"10.1007\/s11416-008-0098-9","type":"journal-article","created":{"date-parts":[[2008,8,11]],"date-time":"2008-08-11T09:18:09Z","timestamp":1218446289000},"page":"345-355","source":"Crossref","is-referenced-by-count":2,"title":["Danger theory and collaborative filtering in MANETs"],"prefix":"10.1007","volume":"5","author":[{"given":"Katherine","family":"Hoffman","sequence":"first","affiliation":[]},{"given":"Attila","family":"Ondi","sequence":"additional","affiliation":[]},{"given":"Richard","family":"Ford","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Derek","family":"Brown","sequence":"additional","affiliation":[]},{"given":"William H.","family":"Allen","sequence":"additional","affiliation":[]},{"given":"Gerald A.","family":"Marin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2008,8,12]]},"reference":[{"key":"98_CR1","doi-asserted-by":"crossref","unstructured":"Aickelin, U., Bentley, P., Cayzer, S., Kim, J., McLeod, J.: Danger theory: the link between AIS and IDS? In: Timmis, J. Bentley, P. Hart, E. (eds.) 2nd International Conference in Artificial Immune Systems (ICARIS 2003), pp. 147\u2013155. Springer, Berlin (2003)","DOI":"10.1007\/978-3-540-45192-1_15"},{"key":"98_CR2","unstructured":"Buchegger, S., Le Boudec, J.Y.: The Effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: WiOpt \u201803: Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks, Sophia-Antipolis, France (2003)"},{"key":"98_CR3","doi-asserted-by":"crossref","unstructured":"Carvalho, M., Ford, R.A., Allen, W.H., Marin, G.: Securing MANETs with BITSI: danger theory and mission continuity, Accepted to SPIE 2008, Orlando (2008)","DOI":"10.1117\/12.777756"},{"key":"98_CR4","doi-asserted-by":"crossref","unstructured":"Clulow, J., Moore, T.: Suicide for the common good: a new strategy for credential revocation in self-organizing systems, In: SIGOPS Oper. Syst. Rev. 40(3),18-21,ISSN 0163\u20135980 (2006)","DOI":"10.1145\/1151374.1151381"},{"key":"98_CR5","doi-asserted-by":"crossref","unstructured":"Corson, S., Macker, J.: Mobile Ad hoc networking (MANET): routing protocol performance issues and evaluation considerations, IETF RFC2501 (1999)","DOI":"10.17487\/rfc2501"},{"key":"98_CR6","unstructured":"Forrest, S.A., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, pp. 120\u2013128. IEEE Computer Society Press, Los Alamitos. ISBN 0-8186-7417-2 (1996)"},{"key":"98_CR7","doi-asserted-by":"crossref","unstructured":"Huynh, T.D., Jennings, N.R., Shadbolt, N.R.: An integrated trust and reputation model for open multi-agent systems. J. Auton. Agent. and Multi-Agent Syst. 13 (2). pp. 119-154. ISSN 1387-2532 (2006)","DOI":"10.1007\/s10458-005-6825-4"},{"key":"98_CR8","unstructured":"Kephart, J.O., Sorkin, G., Swimmer, M., White, S.R.: Blueprint for a computer immune system. In: Proceedings of the International Virus Bulletin Conference, Virus Bulletin PLC, San Francisco (1997)"},{"key":"98_CR9","unstructured":"Liu, J., Issarny, V.: Enhanced reputation mechanism for mobile ad hoc networks. Lecture Notes in Computer Science, vol. 2995\/2004, pp. 48-62. Springer, Berlin, Book Trust Management, doi: 10.1007\/696545 , ISBN 978-3-540-21312-3, ISSN 0302-9743 (2004)"},{"key":"98_CR10","doi-asserted-by":"crossref","first-page":"991","DOI":"10.1146\/annurev.iy.12.040194.005015","volume":"12","author":"P. Matzinger","year":"1994","unstructured":"Matzinger P. (1994) Tolerance, danger and the extended family. Annu. Rev. Immunol. 12: 991\u20131045","journal-title":"Annu. Rev. Immunol."},{"key":"98_CR11","doi-asserted-by":"crossref","unstructured":"Matzinger, P.: Essay 1: the danger model in its historical context. Scand. J. Immunol. 54(1\/2):4\u20139 (2001)","DOI":"10.1046\/j.1365-3083.2001.00974.x"},{"key":"98_CR12","doi-asserted-by":"crossref","unstructured":"Repantis, T., Kalogeraki, V.: Decentralized trust management for ad-hoc peer-to-peer networks. In: MPAC \u201906: Proceedings of the 4th International Workshop on Middleware for Pervasive and Ad-Hoc Computing (MPAC 2006), p. 6. ACM Press, Melbourne (2006)","DOI":"10.1145\/1169075.1169081"},{"key":"98_CR13","doi-asserted-by":"crossref","unstructured":"Sarafijanovic, S., Le Boudec, J.: An artificial immune system approach with secondary response for misbehavior detection in mobile ad hoc networks. In: Neural Networks, IEEE Transactions on, vol. 16, no 5, pp. 1076\u20131087, ISSN 1045\u20139227 (2005)","DOI":"10.1109\/TNN.2005.853419"},{"key":"98_CR14","doi-asserted-by":"crossref","unstructured":"Sterne, D., Balasubramanyam, P., Carman, D., Wilson, B., Talpade, R., Ko, C., Balapari, R., Tseng, C.-Y., Bowen, T., Levitt, K., Rowe, J.: (2005) A general cooperative intrusion detection architecture for MANETs. In: Proceedings of the Third IEEE International Workshop on Information Assurance (IWIA\u201905), pp. 57\u201370, IEEE Computer Society, Washington","DOI":"10.1109\/IWIA.2005.1"},{"key":"98_CR15","volume-title":"Reinforcement learning: an introduction","author":"R. Sutton","year":"1998","unstructured":"Sutton R., Barto A. (1998) Reinforcement learning: an introduction. MIT Press, Cambridge. ISBN-13:978-0-262-19398-6"},{"key":"98_CR16","doi-asserted-by":"crossref","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, R.K.: (2006) Robust cooperative trust establishment for MANETs. In: SASN \u201906: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23-34, ACM Press, Alexandria","DOI":"10.1145\/1180345.1180349"}],"container-title":["Journal in Computer Virology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-008-0098-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11416-008-0098-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11416-008-0098-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T11:29:39Z","timestamp":1738322979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11416-008-0098-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,8,12]]},"references-count":16,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2009,11]]}},"alternative-id":["98"],"URL":"https:\/\/doi.org\/10.1007\/s11416-008-0098-9","relation":{},"ISSN":["1772-9890","1772-9904"],"issn-type":[{"type":"print","value":"1772-9890"},{"type":"electronic","value":"1772-9904"}],"subject":[],"published":{"date-parts":[[2008,8,12]]}}}