{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:25:43Z","timestamp":1729661143972,"version":"3.28.0"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,11]]},"DOI":"10.1109\/atnac.2015.7366827","type":"proceedings-article","created":{"date-parts":[[2016,1,4]],"date-time":"2016-01-04T16:36:12Z","timestamp":1451925372000},"page":"286-291","source":"Crossref","is-referenced-by-count":0,"title":["The double-edged sword: Revealing the critical role of structural hole in forming trust for securing Wireless sensor networks"],"prefix":"10.1109","author":[{"given":"Ming","family":"Xiang","sequence":"first","affiliation":[]},{"given":"William","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Adnan","family":"Al-Anbuky","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/ISECS.2008.211"},{"key":"ref11","first-page":"47","article-title":"On Trust Establishment in Mobile Ad Hoc Networks","volume":"2845","author":"eschenauer","year":"2002","journal-title":"Proc 10th Int'l Security Protocols Workshop"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.5465\/AMR.2007.24348410"},{"year":"1994","author":"marsh","journal-title":"Formalising trust as a computational concept","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1109\/IAW.2005.1495969"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1145\/304851.304877"},{"key":"ref16","first-page":"v2-185","article-title":"A method for evaluating initial trust value of direct trust and recommender trust","volume":"2","author":"mu","year":"2010","journal-title":"2010 International Conference on Computer Design and Applications (ICCDA)"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1109\/VITAE.2013.6617083"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1109\/TSG.2012.2224390"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1007\/978-3-642-01284-6_1"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/JPROC.2010.2059690"},{"year":"0","journal-title":"J-Sim","key":"ref28"},{"year":"2010","author":"momani","journal-title":"Survey of trust models in different network domains","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1016\/j.amc.2012.11.002"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"181","DOI":"10.3390\/jsan3030181","article-title":"An Authenticated Scheme for Wireless Sensor Network","volume":"3","author":"yang","year":"2014","journal-title":"J Sens Actuator Netw"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/GreenCom.2011.30"},{"doi-asserted-by":"publisher","key":"ref29","DOI":"10.1109\/WI-IAT.2012.89"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1109\/TCOMM.2012.031912.110179"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/AINA.2006.150"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/MWC.2010.5675772"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/ICACTE.2010.5579543"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/ICCT.2006.342023"},{"doi-asserted-by":"publisher","key":"ref20","DOI":"10.1145\/2527031.2527044"},{"year":"2009","author":"burt","journal-title":"Structural Holes The Social Structure of Competition","key":"ref22"},{"key":"ref21","first-page":"183","article-title":"The ties that torture: Simmelian tie analysis in organizations","volume":"16 1","author":"krackhardt","year":"1999","journal-title":"Research in the Sociology of Organizations"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1016\/S0191-3085(00)22009-1"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/s10955-013-0722-z"},{"year":"2013","author":"martin-hernandez","journal-title":"Measuring Robustness of Complex Networks","key":"ref26"},{"year":"2013","author":"ellens","journal-title":"Graph Measures and Network Robustness","key":"ref25"}],"event":{"name":"2015 International Telecommunication Networks and Applications Conference (ITNAC)","start":{"date-parts":[[2015,11,18]]},"location":"Sydney, Australia","end":{"date-parts":[[2015,11,20]]}},"container-title":["2015 International Telecommunication Networks and Applications Conference (ITNAC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7363403\/7366770\/07366827.pdf?arnumber=7366827","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T22:59:22Z","timestamp":1498258762000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7366827\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/atnac.2015.7366827","relation":{},"subject":[],"published":{"date-parts":[[2015,11]]}}}