{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T23:10:01Z","timestamp":1745968201408,"version":"3.40.4"},"reference-count":12,"publisher":"Tech Science Press","issue":"8","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2011,1]]},"DOI":"10.1080\/10798587.2011.10643211","type":"journal-article","created":{"date-parts":[[2013,3,2]],"date-time":"2013-03-02T08:01:09Z","timestamp":1362211269000},"page":"1063-1074","source":"Crossref","is-referenced-by-count":4,"title":["A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks"],"prefix":"10.32604","volume":"17","author":[{"given":"Hongsong","family":"Chen","sequence":"first","affiliation":[]},{"given":"Fu","family":"Zhongchuan","sequence":"additional","affiliation":[]}],"member":"17807","reference":[{"key":"CIT0001","unstructured":"M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized trust management. In Proceedings of the 1996 IEEE Symposium on Security and Privacy: 164\u2013176"},{"key":"CIT0002","unstructured":"Z. Liu, A. W. Joy, and R. A. Thompson, A dynamic trust model for mobile ad hoc networks. IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS\u201904), (Suzhou, Chine), 15\u201323, 2004"},{"key":"CIT0003","doi-asserted-by":"crossref","unstructured":"Rangara, R.R. Jaipuria, R.S. Intelligent Secure Routing Model For MANET .2010 3rd IEEE International Conference on Computer Science and Information Technology (2010 ICCSIT):452\u2013456","DOI":"10.1109\/ICCSIT.2010.5563875"},{"key":"CIT0004","unstructured":"M. Virendra, M. Jadliwala, M. Chandrasekaran, and S. Upadhyaya. Quantifying trust in mobile ad-hoc networks. Proceedings of IEEE International Conference on Integration of Knowledge Intensive Multi-Agent Systems (KIMAS\u2019O5), (Waltham, USA), 211\u2013223, 2005"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Pedro B. Velloso. Analyzing aHuman-based Trust Model for MobileAd Hoc Networks. IEEE Symposium on Computers and Communications (ISCC\u20192008):102\u2013125","DOI":"10.1109\/ISCC.2008.4625736"},{"key":"CIT0006","doi-asserted-by":"crossref","unstructured":"Lacharite, Y and Dang Quan Nguyen. Atrust-based security architecture for tactical MANETS. IEEE Military Communications Conference. MILCOM 2008: 1\u20137, 2008","DOI":"10.1109\/MILCOM.2008.4753215"},{"key":"CIT0007","doi-asserted-by":"crossref","unstructured":"E. Ayday and F. Fekri. A protocol for data availability in Mobile Ad-Hoc Networks in the presence of insider attacks. Ad Hoc Networks, vol. 8, no. 2:181\u2013192, 2010","DOI":"10.1016\/j.adhoc.2009.07.001"},{"key":"CIT0008","doi-asserted-by":"crossref","unstructured":"Mingsheng Liu, Qingli Meng. The Ad Hoc Network Security Research Based on Trusted Computing and Semantic Remote Attestation. 2010 Second International Workshop on Education Technology and Computer Science (2010 ETCS):724\u2013727","DOI":"10.1109\/ETCS.2010.256"},{"key":"CIT0009","unstructured":"Huafei Zhu, Feng Bao. Quantifying Trust Metrics of Recommendation Systems in Ad-hoc Networks. IEEE Wireless Communications and Networking Conference, 2007 WCNC:2906\u20132911, 2007"},{"key":"CIT0010","doi-asserted-by":"crossref","unstructured":"Chen Hongsong, Ji Zhenzhou, Hu Mingzeng. Design and performance evaluation of a multi-agent-based dynamic lifetime security scheme for AODV routing protocol .Journal of Network and Computer Applications. 30(1):145\u2013166, 2007","DOI":"10.1016\/j.jnca.2005.09.006"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"M. Al-Sharman, S.M. Yoo, B. Kim, and S. Park. Two Distributive Key Management Schemes in Mobile Ad Hoc Networks. Intelligent Automation and Soft Computing, 16(4):591\u2013603, 2010","DOI":"10.1080\/10798587.2010.10643103"},{"key":"CIT0012","unstructured":"Y. L. Ren and A. Boukerche. ARMA: a scalable secure routing protocol with privacy protection for mobile ad hoc networks. WirelessCommunications & Mobile Computing, vol. 10, no. 5: 672\u2013687, 2010"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=10643211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T22:50:38Z","timestamp":1745967038000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=10643211"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":12,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1080\/10798587.2011.10643211"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2011.10643211","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"type":"print","value":"1079-8587"},{"type":"electronic","value":"2326-005X"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}