{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:06:45Z","timestamp":1730214405290,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,5,1]],"date-time":"2020-05-01T00:00:00Z","timestamp":1588291200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,5]]},"DOI":"10.1109\/dessert50317.2020.9125015","type":"proceedings-article","created":{"date-parts":[[2020,6,25]],"date-time":"2020-06-25T20:46:07Z","timestamp":1593117967000},"page":"117-121","source":"Crossref","is-referenced-by-count":2,"title":["Approach to Sustainable Trust and Reputation Evaluation in Distributed Mobile Networks of the Internet of Things"],"prefix":"10.1109","author":[{"given":"Victoriia","family":"Turkina","sequence":"first","affiliation":[{"name":"National Aerospace University - Kharkiv Aviation Institute,Software Engineering And Business Faculty,Kharkiv"}]},{"given":"Dmytro","family":"Ihnatiev","sequence":"additional","affiliation":[{"name":"National Aerospace University - Kharkiv Aviation Institute,Software Engineering And Business Faculty,Kharkiv"}]}],"member":"263","reference":[{"key":"ref10","first-page":"18","article-title":"Machine to machine trust in the IoT era","volume":"1578","author":"liu","year":"2016","journal-title":"Proceeding TRUST'16 Proceedings of the 18th International Conference on Trust in Agent Societies"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2018.07.014"},{"key":"ref12","first-page":"1613","article-title":"Internet of Things (IoT) Framework for Granting Trust among Objects","volume":"13","author":"suryani","year":"2017","journal-title":"J Inf Process Syst"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-33630-5_18"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0151438"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0146896"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-45234-0_39"},{"key":"ref17","first-page":"3354","article-title":"A Trustworthy and Reliability Model for Reconfigurable Wireless Sensor Networks","volume":"24","author":"prasuna","year":"2016","journal-title":"Middle-East Journal of Scientific Research"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.5120\/ijca2016909153"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-018-5942-8"},{"journal-title":"Smarter with Gartner","year":"0","key":"ref4"},{"key":"ref3","first-page":"331","article-title":"Building the Hyperconnected Society. Internet of Things Research and Innovation Value Chains, Ecosystems and Markets","author":"vermesan","year":"2015","journal-title":"Ser River Publishers Series in Communications"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.2514\/6.2011-7329"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7263370"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.4108\/eai.18-6-2016.2264183"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1504\/IJSDES.2017.091728"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"739","DOI":"10.5937\/fmet1904739O","article-title":"Internet of Things evolution: A European perspective","volume":"47","author":"sa","year":"2019","journal-title":"FME Transactions"},{"article-title":"Trust and Reputation in the Internet of Things","year":"0","author":"eder","key":"ref9"},{"article-title":"Hyperautomation, blockchain, AI security, distributed cloud, and autonomous things drive disruption and create opportunities in this year's strategic technology trends","year":"0","author":"panetta","key":"ref1"},{"key":"ref20","article-title":"Security, Privacy and Trust for Smart Mobile-Internet of Things (M-IoT): A Survey","author":"sharma","year":"2019","journal-title":"ArXiv abs\/1903 05362"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2991\/jsta.2014.13.4.3"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/DESSERT.2018.8409123"},{"journal-title":"Social Internet of Things","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2307\/2005864"},{"journal-title":"SmartSantander","year":"0","key":"ref25"}],"event":{"name":"2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)","start":{"date-parts":[[2020,5,14]]},"location":"Kyiv, Ukraine","end":{"date-parts":[[2020,5,18]]}},"container-title":["2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9122248\/9124995\/09125015.pdf?arnumber=9125015","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,3,27]],"date-time":"2023-03-27T18:34:33Z","timestamp":1679942073000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9125015\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,5]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/dessert50317.2020.9125015","relation":{},"subject":[],"published":{"date-parts":[[2020,5]]}}}