{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:14:14Z","timestamp":1760300054627,"version":"3.44.0"},"reference-count":77,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2018,11,1]],"date-time":"2018-11-01T00:00:00Z","timestamp":1541030400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2018,11]]},"DOI":"10.1016\/j.jss.2018.08.026","type":"journal-article","created":{"date-parts":[[2018,8,7]],"date-time":"2018-08-07T22:29:14Z","timestamp":1533680954000},"page":"112-124","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":12,"special_numbering":"C","title":["Estimating the reputation of newcomer web services using a regression-Based method"],"prefix":"10.1016","volume":"145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7779-1232","authenticated-orcid":false,"given":"Okba","family":"Tibermacine","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2063-0291","authenticated-orcid":false,"given":"Chouki","family":"Tibermacine","sequence":"additional","affiliation":[]},{"given":"Foudil","family":"Cherif","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2018.08.026_bib0001","series-title":"Proceedings of 16th International Conference on Computer Communications and Networks","first-page":"529","article-title":"Qos-based discovery and ranking of web services","author":"Al-Masri","year":"2007"},{"year":"2011","series-title":"Trust-Based Service Selection","author":"Aljazzaf","key":"10.1016\/j.jss.2018.08.026_bib0002"},{"key":"10.1016\/j.jss.2018.08.026_bib0003","series-title":"Efficient Learning Machines","first-page":"67","article-title":"Support vector regression","author":"Awad","year":"2015"},{"key":"10.1016\/j.jss.2018.08.026_bib0004","series-title":"Proceedings of the 14th International Conference on Autonomous Agents and Multiagent Systems","article-title":"Reputation-based provider incentivisation for provenance provision","author":"Barakat","year":"2016"},{"issue":"5","key":"10.1016\/j.jss.2018.08.026_bib0005","doi-asserted-by":"crossref","first-page":"1763","DOI":"10.1007\/s00500-015-1705-6","article-title":"Taciot: multidimensional trust-aware access control system for the internet of things","volume":"20","author":"Bernabe","year":"2016","journal-title":"Soft Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0006","series-title":"Proceedings of the 2015 1st IEEE Conference on Network Softwarization (NetSoft)","first-page":"1","article-title":"Trust support for SDN controllers and virtualized network applications","author":"Betge-Brezetz","year":"2015"},{"key":"10.1016\/j.jss.2018.08.026_bib0007","doi-asserted-by":"crossref","first-page":"274","DOI":"10.1016\/j.chb.2015.12.024","article-title":"Benchmarking reputation systems: a quantitative verification approach","volume":"57","author":"Bidgoly","year":"2016","journal-title":"Comput. Human Behav."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0008","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1145\/1961189.1961199","article-title":"Libsvm: a library for support vector machines","volume":"2","author":"Chang","year":"2011","journal-title":"ACM Trans. Intel. Syst. Technol."},{"key":"10.1016\/j.jss.2018.08.026_bib0009","series-title":"Proceedings of the IIHMSP\u201908","first-page":"1482","article-title":"Trust evaluation model for composite service based on subjective logic","author":"Chen","year":"2008"},{"key":"10.1016\/j.jss.2018.08.026_bib0010","doi-asserted-by":"crossref","first-page":"435","DOI":"10.1016\/j.asoc.2014.10.022","article-title":"Forecasting holiday daily tourist flow based on seasonal support vector regression with adaptive genetic algorithm","volume":"26","author":"Chen","year":"2015","journal-title":"Appl. Soft. Comput."},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0011","doi-asserted-by":"crossref","first-page":"562","DOI":"10.1109\/SURV.2011.092110.00088","article-title":"A survey on trust management for mobile ad hoc networks","volume":"13","author":"Cho","year":"2011","journal-title":"Commun. Surv. Tutor. IEEE"},{"key":"10.1016\/j.jss.2018.08.026_bib0012","series-title":"Intelligent Distributed Computing IX","first-page":"211","article-title":"A distributed reputation-based framework to support communication resources sharing","author":"Comi","year":"2016"},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0013","doi-asserted-by":"crossref","first-page":"143","DOI":"10.1145\/963770.963776","article-title":"Item-based top-n recommendation algorithms","volume":"22","author":"Deshpande","year":"2004","journal-title":"ACM Trans. Inform. Syst."},{"key":"10.1016\/j.jss.2018.08.026_bib0014","series-title":"Peer-to-Peer Systems","first-page":"251","article-title":"The Sybil attack","author":"Douceur","year":"2002"},{"key":"10.1016\/j.jss.2018.08.026_bib0015","series-title":"Proceedings of the CEC\u201905","first-page":"284","article-title":"The evolution of cooperation under cheap pseudonyms","author":"Feldman","year":"2005"},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0016","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1504\/IJWGS.2013.057469","article-title":"Service selection based on a practical interface assessment scheme","volume":"9","author":"Garriga","year":"2013","journal-title":"Int. J. Web Grid Serv."},{"key":"10.1016\/j.jss.2018.08.026_bib0017","series-title":"Proceedings of the 2016\u202fIEEE\/IFIP Network Operations and Management Symposium (NOMS)","first-page":"495","article-title":"A reputation-based collaborative schema for the mitigation of distributed attacks in sdn domains","author":"Giotis","year":"2016"},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0018","doi-asserted-by":"crossref","first-page":"835","DOI":"10.1007\/s10462-012-9358-7","article-title":"Monitoring web services quality of service: a literature review","volume":"42","author":"Hasan","year":"2014","journal-title":"Artif. Intell. Rev."},{"key":"10.1016\/j.jss.2018.08.026_bib0019","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1016\/j.jpdc.2014.08.004","article-title":"Reputation systems: a survey and taxonomy","volume":"75","author":"Hendrikx","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0020","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1016\/j.ins.2014.08.036","article-title":"Predicting electrical evoked potential in optic nerve visual prostheses by using support vector regression and case-based prediction","volume":"290","author":"Hu","year":"2015","journal-title":"Inf. Sci. (Ny)"},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0021","doi-asserted-by":"crossref","first-page":"329","DOI":"10.1016\/j.ipm.2015.02.002","article-title":"Research patterns and trends of recommendation system in china using co-word analysis","volume":"51","author":"Hu","year":"2015","journal-title":"Inf. Process. Manag."},{"key":"10.1016\/j.jss.2018.08.026_bib0022","series-title":"Service-Oriented Computing","first-page":"510","article-title":"A novel equitable trustworthy mechanism for service recommendation in the evolving service ecosystem","author":"Huang","year":"2014"},{"key":"10.1016\/j.jss.2018.08.026_bib0023","series-title":"Proceedings of the Fifth International Joint Conference on Autonomous Agents and Multiagent Systems","first-page":"1217","article-title":"Certified reputation: how an agent can trust a stranger","author":"Huynh","year":"2006"},{"key":"10.1016\/j.jss.2018.08.026_bib0024","series-title":"Proceedings of the 2014 Twelfth Annual International Conference on Privacy, Security and Trust","first-page":"420","article-title":"Trust CV: reputation-based trust for collectivist digital business ecosystems","author":"Isherwood","year":"2014"},{"key":"10.1016\/j.jss.2018.08.026_bib0025","series-title":"Security, Privacy and Trust in Cloud Systems","first-page":"375","article-title":"Reputation as a service: a system for ranking service providers in cloud systems","author":"Itani","year":"2014"},{"key":"10.1016\/j.jss.2018.08.026_bib0026","doi-asserted-by":"crossref","unstructured":"Jannach, D., Zanker, M., Felfernig, A., Friedrich, G., 2010. Recommender Systems: An Introductioncambridge University Press. New York, 2010. \u2013352 P.","DOI":"10.1017\/CBO9780511763113"},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0027","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1007\/BF02828609","article-title":"An adaptive trust model of web services","volume":"10","author":"Jin-dian","year":"2005","journal-title":"Wuhan Univ. J. Nat. Sci."},{"key":"10.1016\/j.jss.2018.08.026_bib0028","unstructured":"Kablan, M., Joe-Won, C., Ha, S., Jamjoom, H., Keller, E., 2015. The cloud needs a reputation system. arXiv preprint arXiv:1509.09057."},{"issue":"13","key":"10.1016\/j.jss.2018.08.026_bib0029","doi-asserted-by":"crossref","first-page":"6047","DOI":"10.1016\/j.eswa.2014.03.053","article-title":"A new hybrid modified firefly algorithm and support vector regression model for accurate short term load forecasting","volume":"41","author":"Kavousi-Fard","year":"2014","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0030","doi-asserted-by":"crossref","first-page":"2276","DOI":"10.1109\/TIE.2016.2623260","article-title":"Direct remaining useful life estimation based on support vector regression","volume":"64","author":"Khelif","year":"2017","journal-title":"IEEE Trans. Ind. Electron."},{"key":"10.1016\/j.jss.2018.08.026_bib0031","first-page":"220","article-title":"A comparison of web service interface similarity measures","volume":"142","author":"Kokash","year":"2006","journal-title":"Front. Artif. Intel. Appl."},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0032","doi-asserted-by":"crossref","first-page":"559","DOI":"10.1109\/TSE.2010.2","article-title":"Assessing software service quality and trustworthiness at selection time","volume":"36","author":"Limam","year":"2010","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0033","doi-asserted-by":"crossref","first-page":"e0151438","DOI":"10.1371\/journal.pone.0151438","article-title":"Irlt: integrating reputation and local trust for trustworthy service recommendation in service-oriented social networks","volume":"11","author":"Liu","year":"2016","journal-title":"PLoS ONE"},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0034","first-page":"381","article-title":"A multi-agent approach for trust-based service discovery and selection in social networks","volume":"16","author":"Louati","year":"2016","journal-title":"Scalable Comput. Pract. Exper."},{"key":"10.1016\/j.jss.2018.08.026_bib0035","series-title":"Proceedings of the 30th Annual international ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"39","article-title":"Effective missing data prediction for collaborative filtering","author":"Ma","year":"2007"},{"key":"10.1016\/j.jss.2018.08.026_sbref0034","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.procs.2015.07.171","article-title":"Business reputation of social networks of web services","volume":"56","author":"Maamar","year":"2015","journal-title":"Procedia Comput Sci"},{"key":"10.1016\/j.jss.2018.08.026_bib0037","first-page":"1","article-title":"A trust model for recommender agent systems","author":"Majd","year":"2016","journal-title":"Soft Comput."},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0038","doi-asserted-by":"crossref","first-page":"885","DOI":"10.1007\/s00778-009-0138-1","article-title":"Rateweb: reputation assessment for trust establishment among web services","volume":"18","author":"Malik","year":"2009","journal-title":"VLDB J."},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0039","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1109\/MIC.2009.17","article-title":"Reputation bootstrapping for trust establishment among web services","volume":"13","author":"Malik","year":"2009","journal-title":"Int. Comput. IEEE"},{"issue":"9","key":"10.1016\/j.jss.2018.08.026_bib0040","doi-asserted-by":"crossref","first-page":"2390","DOI":"10.1002\/cpe.3177","article-title":"Reputation-based web service orchestration in cloud computing: a survey","volume":"27","author":"M\u00e1rmol","year":"2015","journal-title":"Concurr. Comput. Pract. Exper."},{"issue":"99","key":"10.1016\/j.jss.2018.08.026_sbref0039","article-title":"Trust and reputation of web services through qos correlation lens","volume":"PP","author":"Mehdi","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0042","doi-asserted-by":"crossref","DOI":"10.1016\/j.jnca.2016.04.018","article-title":"A model-driven approach for engineering trust and reputation into software services","author":"Moyano","year":"2016","journal-title":"J. Netw. Comput. Appl."},{"key":"10.1016\/j.jss.2018.08.026_bib0043","doi-asserted-by":"crossref","unstructured":"Mughal, B. K., Hameed, S., Shaikh, G. M., 2017. A centralized reputation management scheme for isolating malicious controller (s) in distributed software-defined networks. arXiv preprint arXiv:1711.11005.","DOI":"10.14257\/ijfgcn.2018.11.5.02"},{"key":"10.1016\/j.jss.2018.08.026_bib0044","series-title":"Proceedings of the 2012\u202fIEEE 14th International Conference on Commerce and Enterprise Computing (CEC),","first-page":"41","article-title":"Bootstrapping trust and reputation for web services","author":"Nguyen","year":"2012"},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0045","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/2522968.2522980","article-title":"Trust management of services in cloud environments: obstacles and solutions","volume":"46","author":"Noor","year":"2013","journal-title":"ACM Comp. Surv."},{"key":"10.1016\/j.jss.2018.08.026_bib0046","doi-asserted-by":"crossref","first-page":"460","DOI":"10.1177\/002224378001700405","article-title":"A cognitive model of the antecedents and consequences of satisfaction decisions","author":"Oliver","year":"1980","journal-title":"J. Market. Res."},{"issue":"2","key":"10.1016\/j.jss.2018.08.026_bib0047","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1016\/j.ipm.2015.07.003","article-title":"Estimating reputation polarity on microblog posts","volume":"52","author":"Peetz","year":"2016","journal-title":"Inform. Process. Manag."},{"key":"10.1016\/j.jss.2018.08.026_bib0048","series-title":"Proceedings of the Innovations in Clouds, Internet and Networks (ICIN),","first-page":"87","article-title":"Incorporating trust in NFV: Addressing the challenges","author":"Ravidas","year":"2017"},{"key":"10.1016\/j.jss.2018.08.026_bib0049","series-title":"Proceedings of the 2011\u202fIEEE\/IFIP 41st International Conference on Dependable Systems and Networks Workshops (DSN-W)","first-page":"129","article-title":"Lucy in the sky without diamonds: Stealing confidential data in the cloud","author":"Rocha","year":"2011"},{"key":"10.1016\/j.jss.2018.08.026_bib0050","series-title":"The Adaptive Web","first-page":"291","article-title":"Collaborative filtering recommender systems","author":"Schafer","year":"2007"},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0051","doi-asserted-by":"crossref","first-page":"199","DOI":"10.1023\/B:STCO.0000035301.49549.88","article-title":"A tutorial on support vector regression","volume":"14","author":"Smola","year":"2004","journal-title":"Stat. Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0052","doi-asserted-by":"crossref","first-page":"116","DOI":"10.1016\/j.future.2018.03.018","article-title":"Low-latency orchestration for workflow-oriented service function chain in edge computing","volume":"85","author":"Sun","year":"2018","journal-title":"Fut. Gener. Comput. Syst."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0053","article-title":"A review of different reputation schemes to thwart the misbehaving nodes in mobile ad hoc network.","volume":"5","author":"Sutariya","year":"2014","journal-title":"Int. J. Comput. Sci. Inform. Technol."},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0054","doi-asserted-by":"crossref","first-page":"4","DOI":"10.3390\/info7010004","article-title":"Closed-loop feedback computation model of dynamical reputation based on the local trust evaluation in business-to-consumer e-commerce","volume":"7","author":"Tian","year":"2016","journal-title":"Information"},{"key":"10.1016\/j.jss.2018.08.026_bib0055","series-title":"Proceedings of the French-speaking Conference on Software Architectures (CAL\u201913)","article-title":"Wssim: a tool for the measurement of web service interface similarity","author":"Tibermacine","year":"2013"},{"key":"10.1016\/j.jss.2018.08.026_bib0056","series-title":"Proceedings of the 6th French-speaking Conference on Software Architectures, RNTI-L-7","first-page":"03","article-title":"A practical approach to the measurement of similarity between WSDL-based web services","author":"Tibermacine","year":"2014"},{"key":"10.1016\/j.jss.2018.08.026_bib0057","series-title":"Proceedings of the 2015\u202fIEEE International Conference on Web Services (ICWS)","first-page":"377","article-title":"Regression-based bootstrapping of web service reputation measurement","author":"Tibermacine","year":"2015"},{"key":"10.1016\/j.jss.2018.08.026_bib0058","doi-asserted-by":"crossref","unstructured":"Vaquero, L. M., Cuadrado, F., Elkhatib, Y., Bernal-Bernabe, J., Srirama, S. N., Zhani, M. F., 2018. Research challenges in nextgen service orchestration. arXiv preprint arXiv:1806.00764.","DOI":"10.1016\/j.future.2018.07.039"},{"key":"10.1016\/j.jss.2018.08.026_bib0059","doi-asserted-by":"crossref","first-page":"569","DOI":"10.1016\/j.renene.2016.12.095","article-title":"Machine learning methods for solar radiation forecasting: a review","volume":"105","author":"Voyant","year":"2017","journal-title":"Renew Energy"},{"key":"10.1016\/j.jss.2018.08.026_bib0060","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1016\/j.dss.2015.04.009","article-title":"A survey on trust and reputation models for web services: single, composite, and communities","volume":"74","author":"Wahab","year":"2015","journal-title":"Decis. Support Syst."},{"issue":"5","key":"10.1016\/j.jss.2018.08.026_bib0061","doi-asserted-by":"crossref","first-page":"755","DOI":"10.1109\/TSC.2014.2320262","article-title":"Reputation measurement and malicious feedback rating prevention in web service recommendation systems","volume":"8","author":"Wang","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0062","series-title":"Proceedings of the 2010 IEEE Global Telecommunications Conference (GLOBECOM 2010)","first-page":"1","article-title":"Provenance-based information trustworthiness evaluation in multi-hop networks","author":"Wang","year":"2010"},{"key":"10.1016\/j.jss.2018.08.026_bib0063","series-title":"Proceedings of the 2015\u202fIEEE 29th International Conference on Advanced Information Networking and Applications Workshops (WAINA)","first-page":"242","article-title":"Secure two-party computation in social cloud based on reputation","author":"Wang","year":"2015"},{"key":"10.1016\/j.jss.2018.08.026_bib0064","series-title":"Proceedings of the 7th International Workshop on Trust in Agent Societies","article-title":"Filtering out unfair ratings in bayesian reputation systems","volume":"6","author":"Whitby","year":"2004"},{"issue":"7","key":"10.1016\/j.jss.2018.08.026_bib0065","doi-asserted-by":"crossref","first-page":"768","DOI":"10.1080\/17517575.2013.845913","article-title":"A neural network based reputation bootstrapping approach for service selection","volume":"9","author":"Wu","year":"2015","journal-title":"Enter. Inform. Syst."},{"issue":"6","key":"10.1016\/j.jss.2018.08.026_bib0066","doi-asserted-by":"crossref","first-page":"828","DOI":"10.1007\/s11036-015-0591-6","article-title":"Controlling cloud data access based on reputation","volume":"20","author":"Yan","year":"2015","journal-title":"Mobile Netw. Appl."},{"issue":"16","key":"10.1016\/j.jss.2018.08.026_bib0067","doi-asserted-by":"crossref","first-page":"3059","DOI":"10.1002\/sec.1243","article-title":"A security and trust framework for virtualized networks and software-defined networking","volume":"9","author":"Yan","year":"2016","journal-title":"Secur. Commun. Netw."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0068","doi-asserted-by":"crossref","first-page":"439","DOI":"10.1109\/TSC.2014.2364029","article-title":"Reputationnet: reputation-based service recommendation for e-science","volume":"8","author":"Yao","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"4","key":"10.1016\/j.jss.2018.08.026_bib0069","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1016\/S0167-9236(00)00084-1","article-title":"Collaborative reputation mechanisms for electronic marketplaces","volume":"29","author":"Zacharia","year":"2000","journal-title":"Decis. Support Sys.t"},{"key":"10.1016\/j.jss.2018.08.026_bib0070","article-title":"A fuzzy collusive attack detection mechanism for reputation aggregation in mobile social networks: a trust relationship based perspective","volume":"2016","author":"Zhang","year":"2016","journal-title":"Mobile Inform. Syst."},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0071","doi-asserted-by":"crossref","first-page":"805","DOI":"10.1007\/s11227-011-0576-6","article-title":"Vectortrust: trust vector aggregation scheme for trust management in peer-to-peer networks","volume":"64","author":"Zhao","year":"2013","journal-title":"J. Supercomput."},{"key":"10.1016\/j.jss.2018.08.026_bib0072","doi-asserted-by":"crossref","first-page":"792","DOI":"10.1016\/j.asoc.2015.02.026","article-title":"System reliability prediction by support vector regression with analytic selection and genetic algorithm parameters selection","volume":"30","author":"Zhao","year":"2015","journal-title":"Appl. Soft Comput."},{"issue":"2","key":"10.1016\/j.jss.2018.08.026_bib0073","doi-asserted-by":"crossref","first-page":"37","DOI":"10.4018\/IRMJ.2016040103","article-title":"A consumer decision-making model in m-commerce: the role of reputation systems in mobile app purchases","volume":"29","author":"Zheng","year":"2016","journal-title":"Inform. Resour. Manage. J."},{"key":"10.1016\/j.jss.2018.08.026_bib0074","doi-asserted-by":"crossref","first-page":"5171","DOI":"10.1109\/ACCESS.2017.2695657","article-title":"Qos recommendation in cloud services","volume":"5","author":"Zheng","year":"2017","journal-title":"IEEE Access"},{"issue":"3","key":"10.1016\/j.jss.2018.08.026_bib0075","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSC.2011.59","article-title":"Collaborative web service qos prediction via neighborhood integrated matrix factorization","volume":"6","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jss.2018.08.026_bib0076","series-title":"Proceedings of the ICWS\u201910","first-page":"83","article-title":"Distributed qos evaluation for real-world web services","author":"Zheng","year":"2010"},{"issue":"1","key":"10.1016\/j.jss.2018.08.026_bib0077","doi-asserted-by":"crossref","first-page":"118","DOI":"10.1109\/TIFS.2014.2364679","article-title":"An authenticated trust and reputation calculation and management system for cloud and sensor networks integration","volume":"10","author":"Zhu","year":"2015","journal-title":"IEEE Trans. Inform. Foren. Secur."}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121218301626?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121218301626?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:19:33Z","timestamp":1759015173000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121218301626"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,11]]},"references-count":77,"alternative-id":["S0164121218301626"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2018.08.026","relation":{},"ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"subject":[],"published":{"date-parts":[[2018,11]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Estimating the reputation of newcomer web services using a regression-Based method","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2018.08.026","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2018 Elsevier Inc. All rights reserved.","name":"copyright","label":"Copyright"}]}}