{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,1]],"date-time":"2022-04-01T12:59:55Z","timestamp":1648817995711},"reference-count":36,"publisher":"Computers, Materials and Continua (Tech Science Press)","issue":"4","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["Intelligent Automation &amp; Soft Computing"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1080\/10798587.2016.1152761","type":"journal-article","created":{"date-parts":[[2016,7,5]],"date-time":"2016-07-05T07:56:09Z","timestamp":1467705369000},"page":"621-629","update-policy":"http:\/\/dx.doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":2,"title":["A kind of dynamic software behavior trust model based on improved subjective logic"],"prefix":"10.32604","volume":"22","author":[{"given":"Tian","family":"Junfeng","sequence":"first","affiliation":[]},{"given":"Jiao","family":"Hongqiang","sequence":"additional","affiliation":[]}],"member":"17807","published-online":{"date-parts":[[2016,7,5]]},"reference":[{"key":"CIT0001","doi-asserted-by":"publisher","DOI":"10.1016\/j.pmcj.2009.06.002"},{"key":"CIT0002","doi-asserted-by":"publisher","DOI":"10.1145\/2330667"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2011.10643211"},{"key":"CIT0004","first-page":"1933","volume":"31","author":"Chen H. W.","year":"2003","journal-title":"Acta Electronica Sinica"},{"key":"CIT0005","first-page":"1676","volume":"32","author":"Chen J. G.","year":"2009","journal-title":"Chinese Jour-nal of Computers"},{"key":"CIT0006","first-page":"1621","volume":"14","author":"Deng A. L.","year":"2003","journal-title":"Journal of Software"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2011.03813"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-011-0442-0"},{"key":"CIT0009","first-page":"571","volume":"15","author":"Dou W.","year":"2004","journal-title":"Journal of software"},{"key":"CIT0010","first-page":"151","volume":"37","author":"Fen T.","year":"2010","journal-title":"Computer Science"},{"key":"CIT0012","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03789"},{"key":"CIT0013","first-page":"016","volume":"5","author":"Guannan S.","year":"2012","journal-title":"Journal of Computer Research and Development"},{"key":"CIT0014","first-page":"34","volume":"48","author":"J\u00f8sang A.","year":"1997","journal-title":"Proceedings of the Second Australian Workshop on Commonsense Reasoning"},{"key":"CIT0015","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"CIT0016","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00259-X"},{"key":"CIT0017","first-page":"5","volume":"15","author":"J\u00f8sang A","year":"2008","journal-title":"Journal of Multiple-Valued Logic and Soft Computing"},{"key":"CIT0019","author":"J\u00f8sang A.","year":"2011","journal-title":"Book Draft"},{"key":"CIT0021","volume-title":"Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009)","author":"J\u00f8sang A.","year":"2009"},{"key":"CIT0022","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_11"},{"key":"CIT0024","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2009.05.005"},{"key":"CIT0025","first-page":"751","volume":"28","author":"Lin C.","year":"2005","journal-title":"Jisuanji Xuebao(Chinese Journal of Computers)"},{"key":"CIT0026","first-page":"179","volume":"39","author":"Liu Y.","year":"2012","journal-title":"Journal of Xidian University"},{"key":"CIT0027","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16576-4_16"},{"key":"CIT0028","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCA.2006.871628"},{"key":"CIT0030","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1001.2010.03782"},{"key":"CIT0031","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1117\/12.449977","author":"Saroiu S.","year":"2001","journal-title":"Electronic Imaging 2002"},{"key":"CIT0032","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-010-0069-x"},{"key":"CIT0033","first-page":"2165","volume":"34","author":"Wang Y.","year":"2011","journal-title":"Jisuanji Xuebao(Chinese Journal of Computers)"},{"key":"CIT0034","first-page":"589","volume":"21","author":"Wang X.","year":"2012","journal-title":"Chinese Journal of Electronics"},{"key":"CIT0035","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-007-0021-x"},{"key":"CIT0036","first-page":"635","volume":"32","author":"Xu M.","year":"2009","journal-title":"J Comput"},{"key":"CIT0037","doi-asserted-by":"publisher","DOI":"10.1080\/10798587.2013.786969"},{"key":"CIT0039","first-page":"52","volume":"3","author":"Yanwen Q.","year":"2004","journal-title":"Publishing House of Electronics Industry, Beijing, China"},{"key":"CIT0040","first-page":"069","volume":"5","author":"Zhang Z.X.","year":"2008","journal-title":"Journal of Computer Applications"},{"key":"CIT0041","first-page":"890","volume":"33","author":"Zhao H.Q.","year":"2010","journal-title":"Jisuanji Xuebao(Chinese Journal of Computers)"},{"key":"CIT0042","first-page":"2410","volume":"31","author":"Zhou X.Z.","year":"2011","journal-title":"Systems Engineering-Theory & Practice"}],"container-title":["Intelligent Automation &amp; Soft Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/autosoftjournal.net\/viewPaper.php?paper=1152761","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T13:08:56Z","timestamp":1591189736000},"score":1,"resource":{"primary":{"URL":"http:\/\/autosoftjournal.net\/paperShow.php?paper=1152761"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,5]]},"references-count":36,"journal-issue":{"issue":"4","published-online":{"date-parts":[[2016,4,20]]},"published-print":{"date-parts":[[2016,10]]}},"alternative-id":["10.1080\/10798587.2016.1152761"],"URL":"https:\/\/doi.org\/10.1080\/10798587.2016.1152761","relation":{},"ISSN":["1079-8587","2326-005X"],"issn-type":[{"value":"1079-8587","type":"print"},{"value":"2326-005X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,5]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tasj20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"}]}}