{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:41:36Z","timestamp":1765622496746,"version":"3.48.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T00:00:00Z","timestamp":1762646400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Reliable Intell Environ"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s40860-025-00257-z","type":"journal-article","created":{"date-parts":[[2025,11,9]],"date-time":"2025-11-09T01:48:58Z","timestamp":1762652938000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing security and trustworthiness in the social internet of things through incremental trust modeling"],"prefix":"10.1007","volume":"11","author":[{"given":"Elham","family":"Moeinaddini","sequence":"first","affiliation":[]},{"given":"Eslam","family":"Nazemi","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Shahraki","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,11,9]]},"reference":[{"issue":"15","key":"257_CR1","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori L, Iera A, Morabito G (2010) The internet of things: a survey. Comput Netw 54(15):2787\u20132805. https:\/\/doi.org\/10.1016\/j.comnet.2010.05.010","journal-title":"Comput Netw"},{"issue":"6","key":"257_CR2","doi-asserted-by":"publisher","first-page":"4775","DOI":"10.1109\/JIOT.2020.3028380","volume":"8","author":"L Wei","year":"2020","unstructured":"Wei L, Wu J, Long C, Li B (2020) On designing context-aware trust model and service delegation for social internet of things. IEEE Internet Things J 8(6):4775\u20134787","journal-title":"IEEE Internet Things J"},{"key":"257_CR3","doi-asserted-by":"crossref","unstructured":"Abdelghani W, Zayani CA, Amous I, S\u00e8des F (2016) Trust management in social internet of things: a survey. In: 16th international conference on E-business engineering, Swansea, UK. Springer, pp 430\u2013441","DOI":"10.1007\/978-3-319-45234-0_39"},{"key":"257_CR4","doi-asserted-by":"publisher","first-page":"3297","DOI":"10.1109\/TNSM.2020.3046906","volume":"18","author":"C Marche","year":"2020","unstructured":"Marche C, Nitti M (2020) Trust-related attacks and their detection: a trust management model for the social IoT. IEEE Trans Netw Serv Manag 18:3297\u20133308","journal-title":"IEEE Trans Netw Serv Manag"},{"issue":"12","key":"257_CR5","first-page":"2346","volume":"31","author":"J Lu","year":"2018","unstructured":"Lu J, Liu A, Dong F, Gu F, Gama J, Zhang G (2018) Learning under concept drift: a review. IEEE Trans Knowl Data Eng 31(12):2346\u20132363","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"257_CR6","doi-asserted-by":"publisher","first-page":"43","DOI":"10.31803\/tg-20210204180217","volume":"15","author":"S Babar","year":"2021","unstructured":"Babar S, Mahalle P (2021) Trust management approach for detection of malicious devices in siot. Tehni\u010dki glasnik 15:43\u201350","journal-title":"Tehni\u010dki glasnik"},{"key":"257_CR7","doi-asserted-by":"crossref","unstructured":"Sagar S, Mahmood A, Sheng M, Zaib M, Zhang W (2020) Towards a machine learning-driven trust evaluation model for social internet of things: a time-aware approach. In: MobiQuitous 2020-17th EAI international conference on mobile and ubiquitous systems: computing, networking and services, Darmstadt, Germany. ACM, pp 283\u2013290","DOI":"10.1145\/3448891.3448927"},{"key":"257_CR8","doi-asserted-by":"publisher","unstructured":"Magdich R, Jemal H, Nakti C, Ben Ayed M (2021) An efficient trust related attack detection model based on machine learning for social internet of things. In: 2021 international wireless communications and mobile computing (IWCMC), Harbin City, China. IEEE, pp 1465\u20131470. https:\/\/doi.org\/10.1109\/IWCMC51323.2021.9498808","DOI":"10.1109\/IWCMC51323.2021.9498808"},{"key":"257_CR9","doi-asserted-by":"publisher","first-page":"21961","DOI":"10.1007\/s00521-022-07656-w","volume":"34","author":"R Magdich","year":"2022","unstructured":"Magdich R, Jemal H, Ayed MB (2022) Context-awareness trust management model for trustworthy communications in the social internet of things. Neural Comput Appl 34:21961\u201321986. https:\/\/doi.org\/10.1007\/s00521-022-07656-w","journal-title":"Neural Comput Appl"},{"issue":"6","key":"257_CR10","doi-asserted-by":"publisher","first-page":"8137","DOI":"10.1007\/s11227-021-04205-5","volume":"78","author":"W Abdelghani","year":"2022","unstructured":"Abdelghani W, Amous I, Zayani CA, S\u00e8des F, Roman-Jimenez G (2022) Dynamic and scalable multi-level trust management model for social internet of things. J Supercomput 78(6):8137\u20138193","journal-title":"J Supercomput"},{"key":"257_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107254","volume":"178","author":"B Jafarian","year":"2020","unstructured":"Jafarian B, Yazdani N, Haghighi MS (2020) Discrimination-aware trust management for social internet of things. Comput Netw 178:107254","journal-title":"Comput Netw"},{"key":"257_CR12","doi-asserted-by":"crossref","unstructured":"Masmoudi M, Abdelghani W, Amous I, S\u00e8des F (2020) Deep learning for trust-related attacks detection in social internet of things. In: Advances in e-business engineering for ubiquitous computing: proceedings of the 16th international conference on e-business engineering (ICEBE 2019), Shanghai, China. Springer, pp. 389\u2013404","DOI":"10.1007\/978-3-030-34986-8_28"},{"key":"257_CR13","doi-asserted-by":"crossref","unstructured":"Abdelghani W, Zayani CA, Amous I, S\u00e8des F (2019) Trust evaluation model for attack detection in social internet of things. In: Risks and security of internet and systems: 13th international conference, CRiSIS 2018, Arcachon, France. Springer, pp 48\u201364","DOI":"10.1007\/978-3-030-12143-3_5"},{"key":"257_CR14","doi-asserted-by":"crossref","unstructured":"Wen Y, Xu Z, Zhi R, Chen J (2021) Trust prediction model based on deep learning in social internet of things. In: IoT as a service: 6th EAI international conference, IoTaaS 2020, Xi\u2019an, China, November 19\u201320, 2020, proceedings 6, Xi\u2019an, China. Springer, pp 557\u2013570","DOI":"10.1007\/978-3-030-67514-1_44"},{"key":"257_CR15","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1016\/j.comcom.2019.03.009","volume":"139","author":"MS Roopa","year":"2019","unstructured":"Roopa MS, Pattar S, Buyya R, Venugopal KR, Iyengar SS, Patnaik LM (2019) Social internet of things (SIoT): foundations, thrust areas, systematic review and future directions. Comput Commun 139:32\u201357. https:\/\/doi.org\/10.1016\/j.comcom.2019.03.009","journal-title":"Comput Commun"},{"issue":"5","key":"257_CR16","doi-asserted-by":"publisher","first-page":"5513","DOI":"10.1109\/TPAMI.2022.3213473","volume":"45","author":"M Masana","year":"2022","unstructured":"Masana M, Liu X, Twardowski B, Menta M, Bagdanov AD, Van De Weijer J (2022) Class-incremental learning: survey and performance evaluation on image classification. IEEE Trans Pattern Anal Mach Intell 45(5):5513\u20135533","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"7","key":"257_CR17","first-page":"3366","volume":"44","author":"M De Lange","year":"2021","unstructured":"De Lange M, Aljundi R, Masana M, Parisot S, Jia X, Leonardis A, Slabaugh G, Tuytelaars T (2021) A continual learning survey: defying forgetting in classification tasks. IEEE Trans Pattern Anal Mach Intell 44(7):3366\u20133385","journal-title":"IEEE Trans Pattern Anal Mach Intell"},{"issue":"12","key":"257_CR18","first-page":"2346","volume":"31","author":"J Lu","year":"2018","unstructured":"Lu J, Liu A, Dong F, Gu F, Gama J, Zhang G (2018) Learning under concept drift: a review. IEEE Trans Knowl Data Eng 31(12):2346\u20132363","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"257_CR19","doi-asserted-by":"publisher","first-page":"29180","DOI":"10.1109\/ACCESS.2021.3059251","volume":"9","author":"S Dube","year":"2021","unstructured":"Dube S, Wan WY, Nugroho H (2021) A novel approach of IoT stream sampling and model update on the IoT edge device for class incremental learning in an edge-cloud system. IEEE Access 9:29180\u201329199. https:\/\/doi.org\/10.1109\/ACCESS.2021.3059251","journal-title":"IEEE Access"},{"issue":"14\u201315","key":"257_CR20","doi-asserted-by":"publisher","first-page":"2627","DOI":"10.1016\/S1352-2310(97)00447-0","volume":"32","author":"MW Gardner","year":"1998","unstructured":"Gardner MW, Dorling SR (1998) Artificial neural networks (the multilayer perceptron)\u2014a review of applications in the atmospheric sciences. Atmos Environ 32(14\u201315):2627\u20132636","journal-title":"Atmos Environ"},{"issue":"1","key":"257_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TNN.2002.806953","volume":"14","author":"D Chakraborty","year":"2003","unstructured":"Chakraborty D, Pal NR (2003) A novel training scheme for multilayered perceptrons to realize proper generalization and incremental learning. IEEE Trans Neural Netw 14(1):1\u201314. https:\/\/doi.org\/10.1109\/TNN.2002.806953","journal-title":"IEEE Trans Neural Netw"},{"key":"257_CR22","volume-title":"Machine learning for data streams: with practical examples in MOA","author":"A Bifet","year":"2023","unstructured":"Bifet A, Gavalda R, Holmes G, Pfahringer B (2023) Machine learning for data streams: with practical examples in MOA. MIT Press, Cambridge"},{"issue":"3","key":"257_CR23","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"LA Zadeh","year":"1965","unstructured":"Zadeh LA (1965) Fuzzy sets. Inf Control 8(3):338\u2013353. https:\/\/doi.org\/10.1016\/S0019-9958(65)90241-X","journal-title":"Inf Control"},{"key":"257_CR24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-14203-6","volume-title":"Fuzzy logic","author":"E Trillas","year":"2015","unstructured":"Trillas E, Eciolaza L (2015) Fuzzy logic. Springer, Berlin"},{"issue":"5","key":"257_CR25","first-page":"1795","volume":"8","author":"P Gupta","year":"2017","unstructured":"Gupta P (2017) Applications of fuzzy logic in daily life. Int J Adv Res Comput Sci 8(5):1795\u20131800","journal-title":"Int J Adv Res Comput Sci"},{"issue":"4","key":"257_CR26","doi-asserted-by":"publisher","first-page":"2274","DOI":"10.1109\/TDSC.2021.3052953","volume":"19","author":"S Aalibagi","year":"2021","unstructured":"Aalibagi S, Mahyar H, Movaghar A, Stanley HE (2021) A matrix factorization model for Hellinger-based trust management in social internet of things. IEEE Trans Dependable Secure Comput 19(4):2274\u20132285","journal-title":"IEEE Trans Dependable Secure Comput"},{"issue":"5","key":"257_CR27","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1109\/MITP.2017.3680960","volume":"19","author":"H Kim","year":"2017","unstructured":"Kim H, Lee EA (2017) Authentication and authorization for the internet of things. IT Prof 19(5):27\u201333","journal-title":"IT Prof"},{"key":"257_CR28","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.adhoc.2011.12.002","volume":"12","author":"KL Huang","year":"2014","unstructured":"Huang KL, Kanhere SS, Hu W (2014) On the need for a reputation system in mobile phone based sensing. Ad Hoc Netw 12:130\u2013149","journal-title":"Ad Hoc Netw"},{"key":"257_CR29","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TKDE.2013.105","volume":"26","author":"M Nitti","year":"2013","unstructured":"Nitti M, Girau R, Atzori L (2013) Trustworthiness management in the social internet of things. IEEE Trans Knowl Data Eng 26:1253\u20131266","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"257_CR30","doi-asserted-by":"crossref","unstructured":"Marche C, Atzori L, Nitti, M (2018) A dataset for performance analysis of the social internet of things. In: 2018 IEEE 29th annual international symposium on personal, indoor and mobile radio communications (PIMRC), Bologna, Italy. IEEE, pp 1\u20135","DOI":"10.1109\/PIMRC.2018.8580830"},{"key":"257_CR31","unstructured":"Claudio M, Atzori L, Nitti M (2018) Social IoT Dataset. http:\/\/www.social-iot.org\/index.php?p=downloads. Accessed 24 Sept 2022"},{"key":"257_CR32","doi-asserted-by":"publisher","unstructured":"Lera I, Guerrero C, Juiz C (2019) YAFS: a simulator for IoT scenarios in fog computing. IEEE Access 7:91745\u201391758. https:\/\/doi.org\/10.1109\/ACCESS.2019.2927895","DOI":"10.1109\/ACCESS.2019.2927895"},{"issue":"1","key":"257_CR33","first-page":"4945","volume":"22","author":"J Montiel","year":"2021","unstructured":"Montiel J, Halford M, Mastelini SM, Bolmier G, Sourty R, Vaysse R, Zouitine A, Gomes HM, Read J, Abdessalem T (2021) River: machine learning for streaming data in python. J Mach Learn Res 22(1):4945\u20134952","journal-title":"J Mach Learn Res"}],"container-title":["Journal of Reliable Intelligent Environments"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00257-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40860-025-00257-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40860-025-00257-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,12,13]],"date-time":"2025-12-13T10:37:02Z","timestamp":1765622222000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40860-025-00257-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,11,9]]},"references-count":33,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["257"],"URL":"https:\/\/doi.org\/10.1007\/s40860-025-00257-z","relation":{},"ISSN":["2199-4668","2199-4676"],"issn-type":[{"type":"print","value":"2199-4668"},{"type":"electronic","value":"2199-4676"}],"subject":[],"published":{"date-parts":[[2025,11,9]]},"assertion":[{"value":"29 October 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 October 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 November 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no potential conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"18"}}