{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T05:17:13Z","timestamp":1729660633111,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/glocom.2014.7417868","type":"proceedings-article","created":{"date-parts":[[2016,3,28]],"date-time":"2016-03-28T19:11:24Z","timestamp":1459192284000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Chance Discovery Based Security Service Selection for Social P2P Based Sensor Networks"],"prefix":"10.1109","author":[{"given":"Jun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Mianxiong","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Kaoru","family":"Ota","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Li","sequence":"additional","affiliation":[]},{"given":"Longhua","family":"Guo","sequence":"additional","affiliation":[]},{"given":"Gaolei","family":"Li","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"SMART Cities Search Engine","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2282292"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.3"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.67"},{"article-title":"Chance Discovery (Advanced Information Processing)","year":"2003","author":"ohsawa","key":"ref14"},{"key":"ref15","article-title":"KeyGraphAutomaticln Indexing by Cooccurrence Graph Based on Building construction Metaphor","author":"ohsawa","year":"1998","journal-title":"Proceedings of Advances in Digital Libraries Conference"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2009.22"},{"key":"ref17","first-page":"2386","article-title":"Localization and Dynamic Tracking Using Wireless-Networked Sensors and Multi-Agent Technology: First Steps","volume":"e85 a","author":"deng","year":"2002","journal-title":"IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences"},{"journal-title":"NetLogo","year":"0","key":"ref18"},{"journal-title":"OSVDB","year":"0","key":"ref19"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.201"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2373388"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2011.022411.110120"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2014.6724107"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2010.2084190"},{"key":"ref7","first-page":"1","article-title":"Trustworthiness Management in the Social Internet of Things","volume":"2013","author":"nitti","year":"2013","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-013-1294-6"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2014.2356613"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2011.5681022"}],"event":{"name":"GLOBECOM 2015 - 2015 IEEE Global Communications Conference","start":{"date-parts":[[2015,12,6]]},"location":"San Diego, CA, USA","end":{"date-parts":[[2015,12,10]]}},"container-title":["2015 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:40:12Z","timestamp":1602690012000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7417868"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/glocom.2014.7417868","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}