{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:12:15Z","timestamp":1725563535557},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1109\/chinacom.2011.6158229","type":"proceedings-article","created":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T20:43:51Z","timestamp":1330461831000},"page":"620-624","source":"Crossref","is-referenced-by-count":0,"title":["A service-oriented dynamic trust vector model for ad hoc networks"],"prefix":"10.1109","author":[{"family":"Li Yu","sequence":"first","affiliation":[]},{"family":"Fei Xiong","sequence":"additional","affiliation":[]},{"family":"Wei Cheng","sequence":"additional","affiliation":[]},{"family":"Wei Wang","sequence":"additional","affiliation":[]},{"family":"Hui Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","first-page":"1","article-title":"Mitigaton of malware proliferation in P2P networks using Double-layer Dynamic Trust (DDT) management scheme","author":"cai","year":"2009","journal-title":"Sarnoff Symposium 2009 SARNOFF'09"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.180"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/ICEBE.2008.28"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2005.861390"},{"key":"2","first-page":"372","article-title":"Bayesian network-based trust model","author":"wang","year":"2003","journal-title":"In Proceedings IEEE\/WIC International Conference on Web Intelligence 2003 WI 2003"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICITA.2005.168"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ISCC.2008.4625768"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2008.80"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2009.20"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473092"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/APSCC.2008.27"},{"key":"9","first-page":"241","article-title":"A formal Framework for Trust management of Service-oriented Systems","author":"liang","year":"2007","journal-title":"Service-Oriented Computing and Applications 2007 SOCA '07 IEEE International Conference on"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/MINES.2009.223"}],"event":{"name":"2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)","start":{"date-parts":[[2011,8,17]]},"location":"Harbin, China","end":{"date-parts":[[2011,8,19]]}},"container-title":["2011 6th International ICST Conference on Communications and Networking in China (CHINACOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6153170\/6158103\/06158229.pdf?arnumber=6158229","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T16:05:53Z","timestamp":1602691553000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6158229"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2011.6158229","relation":{},"subject":[],"published":{"date-parts":[[2011,8]]}}}