{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:02:15Z","timestamp":1729677735481,"version":"3.28.0"},"reference-count":14,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/cisda.2015.7208633","type":"proceedings-article","created":{"date-parts":[[2015,8,20]],"date-time":"2015-08-20T21:41:42Z","timestamp":1440106902000},"page":"1-9","source":"Crossref","is-referenced-by-count":0,"title":["Ternary trust metric for mobile ad-hoc networks"],"prefix":"10.1109","author":[{"given":"Gus","family":"Anderson","sequence":"first","affiliation":[]},{"given":"David J.","family":"Dorsey","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"109","article-title":"Ecological integrity and ecological health are not the same","volume":"97","author":"karr","year":"1996","journal-title":"Engineering Within Ecological Constraints"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1998.926617"},{"key":"ref12","first-page":"709734","article-title":"An integrative model of organizational trust","author":"mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/SURV.2011.042711.00083","article-title":"Trust computations and trust dynamics in mobile adhoc networks: a survey","volume":"14","author":"kannan","year":"2012","journal-title":"Communications Surveys & Tutorials IEEE"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2011.08.048"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/345910.345955"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/BF01867203"},{"key":"ref6","first-page":"1419","article-title":"Protecting wireless networks against a denial of service attack based on virtual jamming","volume":"3","author":"chen","year":"2003","journal-title":"ACM MOBICOM"},{"key":"ref5","first-page":"459507","article-title":"Bayesian modelling and inference on mixtures of distributions","volume":"25","author":"marin","year":"2005","journal-title":"Handbook of Statistics"},{"key":"ref8","article-title":"An analytic distance metric for Gaussian mixture models with application in image retrieval","author":"sfikas","year":"0","journal-title":"ICANN'05 Proceedings of the 15th international conference on Artificial neural networks formal models and their applications 2005 vol Part II Volume Part II"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1111\/j.2517-6161.1977.tb01600.x","article-title":"Maximum likelihood from incomplete data via the EM algorithm","volume":"39","author":"dempster","year":"1977","journal-title":"Journal of the Royal Statistical Society"},{"key":"ref2","first-page":"709734","article-title":"An integrative model of organizational trust","author":"mayer","year":"1995","journal-title":"Academy of Management Review"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1504\/IJICS.2009.028811"},{"key":"ref9","article-title":"Principles of conservation biology","author":"groom","year":"2006","journal-title":"Sinauer Associates Sunderland MA"}],"event":{"name":"2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2015,5,26]]},"location":"Verona, NY, USA","end":{"date-parts":[[2015,5,28]]}},"container-title":["2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7165058\/7208613\/07208633.pdf?arnumber=7208633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T17:14:16Z","timestamp":1718039656000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7208633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":14,"URL":"https:\/\/doi.org\/10.1109\/cisda.2015.7208633","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}