{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T20:34:41Z","timestamp":1730234081938,"version":"3.28.0"},"reference-count":24,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,7,6]],"date-time":"2021-07-06T00:00:00Z","timestamp":1625529600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,7,6]]},"DOI":"10.1109\/icccnt51525.2021.9580036","type":"proceedings-article","created":{"date-parts":[[2021,11,3]],"date-time":"2021-11-03T19:29:48Z","timestamp":1635967788000},"page":"1-7","source":"Crossref","is-referenced-by-count":1,"title":["A Hybrid Trust Model for Cloud Service Provider Selection with NLP Support and Malicious User Feedback Filtering"],"prefix":"10.1109","author":[{"given":"Bhanu Prakash","family":"Poluparthi","sequence":"first","affiliation":[{"name":"Department Of Computer Science and Engineering,Amritapuri,India"}]},{"given":"G. Mani","family":"Kishan","sequence":"additional","affiliation":[{"name":"Department Of Computer Science and Engineering,Amritapuri,India"}]},{"given":"V. Bala Sai","family":"Praneeth","sequence":"additional","affiliation":[{"name":"Department Of Computer Science and Engineering,Amritapuri,India"}]},{"given":"A.","family":"Manikanta","sequence":"additional","affiliation":[{"name":"Department Of Computer Science and Engineering,Amritapuri,India"}]},{"given":"Greeshma","family":"Sarath","sequence":"additional","affiliation":[{"name":"Department Of Computer Science and Engineering,Amritapuri,India"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/2187836.2187967"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/AINA.2013.158"},{"key":"ref12","first-page":"1","article-title":"Towards an accurate evaluation of quality of cloud service in service-oriented cloud computing","author":"wang","year":"2012","journal-title":"Journal of Intelligent Manufacturing"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/AINA.2014.104"},{"year":"0","journal-title":"Cloud Armor Project Website - Dataset","key":"ref14"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1109\/TrustCom.2011.18"},{"year":"0","journal-title":"A Collaborative Filtering Method for Cloud Service Recommendation via Exploring Usage History","article-title":"springerprofessiona.de","key":"ref16"},{"key":"ref17","first-page":"181+","article-title":"A GENERIC APPROACH FOR OUTLIER DETECTION IN TIME-SERIES DATA","author":"sourabh","year":"0","journal-title":"Indian Journal of Scientific Research"},{"key":"ref18","first-page":"281","article-title":"Cloud service recommendation based on watchlist via temporal and tag preference fusion","author":"zhang","year":"0","journal-title":"IEEE International Conference on Cloud Services"},{"key":"ref19","first-page":"1015","author":"abawajy","year":"0","journal-title":"A reputation based grid information Systemsin International Conference Computational Science"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/ICPADS.2013.86"},{"year":"0","journal-title":"2017 17th IEEE\/ACM International Symposium on Cluster Cloud and Grid Computing (CCGRID)","article-title":"Modeling correlation between QoS attributes for trust computation in cloud computing environments","key":"ref3"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1109\/ICEBE.2012.47"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/Trustcom\/BigDataSE\/ICESS.2017.282"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1016\/j.future.2012.06.006"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/UCC.2011.36"},{"key":"ref2","first-page":"2519","article-title":"Trust Based Cloud Framework for Service Provider Selection","volume":"10","author":"mangla","year":"2017","journal-title":"Advances in Computational Sciences and Technology"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/WSCAR.2014.6916772"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/IMIS.2011.99"},{"year":"2021","author":"kumar","journal-title":"Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1109\/ICCIC.2016.7919606"},{"key":"ref21","first-page":"55","volume":"12","author":"supriya","year":"2016","journal-title":"A fuzzy based hierarchical trust framework to rate the cloud service providers based on infrastructure facilitie"},{"doi-asserted-by":"publisher","key":"ref24","DOI":"10.1109\/ICDSE.2018.8527731"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1007\/978-981-10-8639-7_56"}],"event":{"name":"2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)","start":{"date-parts":[[2021,7,6]]},"location":"Kharagpur, India","end":{"date-parts":[[2021,7,8]]}},"container-title":["2021 12th International Conference on Computing Communication and Networking Technologies (ICCCNT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9579467\/9579470\/09580036.pdf?arnumber=9580036","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:43:20Z","timestamp":1659483800000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9580036\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,7,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icccnt51525.2021.9580036","relation":{},"subject":[],"published":{"date-parts":[[2021,7,6]]}}}