{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:30:56Z","timestamp":1729618256844,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,1]]},"DOI":"10.1109\/comsnets.2016.7440007","type":"proceedings-article","created":{"date-parts":[[2016,3,29]],"date-time":"2016-03-29T20:54:20Z","timestamp":1459284860000},"page":"1-8","source":"Crossref","is-referenced-by-count":5,"title":["Analysis of trust models in Mobile Ad Hoc Networks: A simulation based study"],"prefix":"10.1109","author":[{"given":"Bata Krishna","family":"Tripathy","sequence":"first","affiliation":[]},{"given":"Padmalochan","family":"Bera","sequence":"additional","affiliation":[]},{"given":"Mohammad Ashiqur","family":"Rahman","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"Security in ad hoc networks: A general intrusion detection architecture enhancing trust based approaches","author":"albers","year":"2002","journal-title":"1st Int Workshop Wireless Inf Syst"},{"key":"ref11","first-page":"275","article-title":"Cooperation and trust: Some theoretical notes","author":"deutch","year":"1962","journal-title":"Nebraska Symposium on Motivation Nebraska University Press"},{"journal-title":"Trust A Sociological Theory","year":"1999","author":"sztompka","key":"ref12"},{"key":"ref13","first-page":"21","article-title":"Modeling and evaluating trust network inference. In Workshop on Deception","author":"ding","year":"2004","journal-title":"Fraud and Trust in agent societies at the Third international joint conference on autonomous agents and multiagent systems AAMAS'04"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2000.926815"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1023646.1023648"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2009.5397627"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2009.04.008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TMC.2007.70720"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICCChina.2014.7008383"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2011.0234"},{"journal-title":"Bamberger and Walter Interpersonal Trust-Attempt of a Definition","year":"2010","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.adhoc.2008.10.003"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.1995.9508080335"},{"key":"ref6","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1007\/978-3-540-39871-4_6","article-title":"On Trust Establishment in Mobile Ad Hoc Networks","volume":"2845","author":"eschenauer","year":"2002","journal-title":"Security Protocols 10th International Workshop"},{"key":"ref5","article-title":"Managing Trust in Self-Organized Mobile Ad Hoc Networks","author":"baras","year":"2005","journal-title":"Proc 12th Ann Network and Distributed System Security Symp"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/TDSC.2010.11","article-title":"A Policy Enforcing Mechanism for Trusted Ad Hoc Networks","volume":"8","author":"xu","year":"2011","journal-title":"IEEE Transactions on Dependable and Secure Computing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.092110.00088"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICICA.2014.67"},{"key":"ref9","article-title":"A Survey of Secure Wireless Ad Hoc Routing","author":"hu","year":"2004","journal-title":"IEEE Sec and Privacy"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1201\/b11447"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2014.2313865"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2010.0160"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2010.1009.I9P0339"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2010.2084571"},{"journal-title":"Mathematical Techniques in Multisensor Data Fusion","year":"2004","author":"hall","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EUC.2010.127"},{"key":"ref25","first-page":"1862","article-title":"Trust Modeling and Evaluation in Ad Hoc Networks","author":"sun","year":"2005","journal-title":"IEEE GLOBECOM 2005 proceedings"}],"event":{"name":"2016 8th International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2016,1,5]]},"location":"Bangalore, India","end":{"date-parts":[[2016,1,10]]}},"container-title":["2016 8th International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7435615\/7439923\/7440007.pdf?arnumber=7440007","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,5]],"date-time":"2019-09-05T22:44:41Z","timestamp":1567723481000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7440007\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,1]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2016.7440007","relation":{},"subject":[],"published":{"date-parts":[[2016,1]]}}}