{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:24:10Z","timestamp":1759134250878,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/aiccsa.2014.7073179","type":"proceedings-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T15:21:03Z","timestamp":1428074463000},"page":"56-63","source":"Crossref","is-referenced-by-count":5,"title":["ModConTR: A modular and configurable trust and reputation-based system for secure routing in ad-hoc networks"],"prefix":"10.1109","author":[{"given":"George","family":"Hatzivasilis","sequence":"first","affiliation":[]},{"given":"Ioannis","family":"Papaefstathiou","sequence":"additional","affiliation":[]},{"given":"Charalampos","family":"Manifavas","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"A robust reputation system for peer- to-peer and mobile ad hoc networks P2Pecon 2004","year":"2004","author":"buchegger","key":"ref10"},{"key":"ref11","first-page":"66","author":"ganeriwal","year":"2004","journal-title":"Reputation-based framework for high integrity sensor networks SAN '04"},{"key":"ref12","first-page":"277","author":"srinivasan","year":"2006","journal-title":"Drbts distributed reputation based beacon trust system 2nd IEEE International Symposium on Dependable Autonomic and Secure Computing"},{"journal-title":"Ns2 (Network Simulator 2)","year":"0","key":"ref13"},{"journal-title":"NAM (Network AniMator)","year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"127","DOI":"10.1016\/S0278-0984(02)11030-3","article-title":"Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system. The Economics of the Internet and E-Commerce","volume":"11","author":"resnick","year":"2002","journal-title":"Advances in Applied Microeconomics"},{"journal-title":"Reputation-based System a security analysis ENISA Position Paper","year":"2007","author":"carrara","key":"ref16"},{"key":"ref17","first-page":"18","volume":"2","author":"ngadi","year":"2008","journal-title":"A review current routing attacks in mobile ad-hoc networks International Journal of Computer Science and Security"},{"journal-title":"Memsic Inc 2010 Memsic Isis manual","year":"0","key":"ref18"},{"journal-title":"Crossbow","year":"2004","key":"ref19"},{"key":"ref4","first-page":"226","author":"buchegger","year":"2002","journal-title":"Performance Analysis of the CONFIDANT Protocol (Cooperation of Nodes Fairness in Dynamic Ad-hoc NeTworks)"},{"key":"ref3","first-page":"255","author":"marti","year":"2000","journal-title":"Mitigating Routing Misbehavior in Mobile Ad Hoc Networks"},{"key":"ref6","volume":"2","author":"madhavi","year":"2011","journal-title":"An intelligent distributed reputation based mobile intrusion detection system International Journal of Computer Science and Telecommunications"},{"journal-title":"Core A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks CMS'02","year":"2002","author":"michiardi","key":"ref5"},{"key":"ref8","first-page":"95","volume":"2","author":"rahem","year":"2012","journal-title":"Collaborative trust-based secure routing based ad-hoc routing protocol IJMER"},{"journal-title":"A Semidistributed Reputation-based Intrusion Detection System for Mobile Adhoc Networks","year":"2010","author":"kr trivedi","key":"ref7"},{"key":"ref2","first-page":"416","author":"hatzivasilis","year":"2012","journal-title":"Building trust in ad hoc distributed resource-sharing networks using reputation-based systems PCI 2012"},{"key":"ref1","first-page":"63","volume":"1","author":"singh","year":"2010","journal-title":"A Survey on Routing Protocols for Wireless Sensor Networks[J]"},{"key":"ref9","first-page":"43","volume":"3","author":"zhang","year":"2008","journal-title":"A cooperative secure routing protocol based on reputation system for ad hoc networks Journal of Communications"},{"journal-title":"BeagleBoard org Foundation","year":"2011","key":"ref20"},{"journal-title":"BeagleBoard org Foundation","year":"2011","key":"ref21"}],"event":{"name":"2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2014,11,10]]},"location":"Doha, Qatar","end":{"date-parts":[[2014,11,13]]}},"container-title":["2014 IEEE\/ACS 11th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7066213\/7073167\/07073179.pdf?arnumber=7073179","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T08:32:18Z","timestamp":1498206738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7073179\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/aiccsa.2014.7073179","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}