{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:43:58Z","timestamp":1767339838101,"version":"3.28.0"},"reference-count":18,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,11,1]],"date-time":"2019-11-01T00:00:00Z","timestamp":1572566400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1109\/aiccsa47632.2019.9035294","type":"proceedings-article","created":{"date-parts":[[2020,3,17]],"date-time":"2020-03-17T03:08:51Z","timestamp":1584414531000},"page":"1-8","source":"Crossref","is-referenced-by-count":18,"title":["Fuzzy Logic Based Security Trust Evaluation for IoT Environments"],"prefix":"10.1109","author":[{"given":"Ahmad","family":"Khalil","sequence":"first","affiliation":[]},{"given":"Nader","family":"Mbarek","sequence":"additional","affiliation":[]},{"given":"Olivier","family":"Togni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"IEEE 802 1AR-2018 - IEEE Standard for Local and Metropolitan Area Networks - Secure Device Identity","year":"0","key":"ref10"},{"journal-title":"TAXII_Overview pdf","year":"0","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.2298\/CSIS110303056C"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2016.03.006"},{"key":"ref14","volume":"12","author":"nunoo-mensah","year":"0","journal-title":"SoTRMSim Sociopsychological Trust and Reputation Models Simulator for Wireless Sensor Networks"},{"key":"ref15","article-title":"Dynamic trust management for internet of things applications","author":"fenye","year":"0","journal-title":"International Workshop on Self-aware Internet of Things Self-IoT '12"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.3390\/computers7040064"},{"journal-title":"Motivations of Fuzzy Logic doc | Fuzzy Logic | Artificial Neural Network","year":"0","key":"ref17"},{"journal-title":"What Is Sugeno-Type Fuzzy Inference?","year":"0","key":"ref18"},{"key":"ref4","article-title":"The untrusted IoT - A Path to Securing Billions of Insecure Devices","author":"hanna","year":"2015","journal-title":"Trusted Computing Group"},{"journal-title":"X 800 Security Architecture for Open Systems Interconnection for Ccitt Applications","year":"0","key":"ref3"},{"journal-title":"Y 2066 Common requirements of the Internet of things","year":"0","key":"ref6"},{"journal-title":"Y 2060 Overview of the Internet of Things","year":"0","key":"ref5"},{"journal-title":"Trusted Computing Group","article-title":"Welcome To Trusted Computing Group","year":"0","key":"ref8"},{"journal-title":"AIOTI","article-title":"Alliance for Internet of Things Innovation, &#x00AB; Report on Workshop on Security & Privacy in IoT &#x00BB;","year":"0","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2014.01.014"},{"journal-title":"English Oxford","article-title":"Living Dictionaries, Definition of Trust","year":"0","key":"ref1"},{"journal-title":"ISO","article-title":"ISO\/IEC 11889&#x2013;1:2015","year":"0","key":"ref9"}],"event":{"name":"2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)","start":{"date-parts":[[2019,11,3]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2019,11,7]]}},"container-title":["2019 IEEE\/ACS 16th International Conference on Computer Systems and Applications (AICCSA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9006726\/9035208\/09035294.pdf?arnumber=9035294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:49:38Z","timestamp":1658155778000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9035294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/aiccsa47632.2019.9035294","relation":{},"subject":[],"published":{"date-parts":[[2019,11]]}}}