{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,25]],"date-time":"2026-04-25T06:41:51Z","timestamp":1777099311753,"version":"3.51.4"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1109\/isads.2009.5207367","type":"proceedings-article","created":{"date-parts":[[2009,8,24]],"date-time":"2009-08-24T11:09:10Z","timestamp":1251112150000},"page":"1-6","source":"Crossref","is-referenced-by-count":15,"title":["A novel flexible trust management system for heterogeneous wireless sensor networks"],"prefix":"10.1109","author":[{"given":"P.","family":"Trakadas","sequence":"first","affiliation":[]},{"given":"S.","family":"Maniatis","sequence":"additional","affiliation":[]},{"given":"P.","family":"Karkazis","sequence":"additional","affiliation":[]},{"given":"T.","family":"Zahariadis","sequence":"additional","affiliation":[]},{"given":"H.C.","family":"Leligou","sequence":"additional","affiliation":[]},{"given":"S.","family":"Voliotis","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","year":"0"},{"key":"16","article-title":"gpsr: greedy perimeter stateless routing for wirelessnetworks","author":"karp","year":"0","journal-title":"MobiCom 2000"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/SECCMW.2005.1588306"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2008.4473092"},{"key":"11","article-title":"towards resilient geographic routing in wireless sensor networks","author":"b-ghazaleh","year":"2005","journal-title":"1st ACM Workshop on QoS and Security for Wireless and Mobile Networks"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1007\/s11277-006-1574-5"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.2007.4396947"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.422"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/PCCC.2004.1395061"},{"key":"7","article-title":"cluster-based reputation and trust for wireless sensor networks","author":"crosby","year":"2007","journal-title":"Consumer Communications and Networking Conference"},{"key":"6","first-page":"491","article-title":"trust evaluation model for wireless sensor networks","volume":"1","author":"hurt","year":"2005","journal-title":"The 7th International Conference on Advanced Communication Technology ICACT 2005"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/MOBHOC.2007.4428674"},{"key":"4","article-title":"a secure routing protocol for wireless ad hoc networks","author":"li","year":"2006","journal-title":"Proceedings of the 39th Hawaii International Conference on System Sciences"},{"key":"9","article-title":"generic reliability trust model","author":"mahoney","year":"2005","journal-title":"Proceedings of the 3rd Annual Conference on Privacy Security and Trust"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437800"}],"event":{"name":"2009 International Symposium on Autonomous Decentralized Systems (ISADS)","location":"Athens, Greece","start":{"date-parts":[[2009,3,23]]},"end":{"date-parts":[[2009,3,25]]}},"container-title":["2009 International Symposium on Autonomous Decentralized Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5185482\/5207317\/05207367.pdf?arnumber=5207367","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,17]],"date-time":"2017-03-17T16:27:09Z","timestamp":1489768029000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5207367\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/isads.2009.5207367","relation":{},"subject":[],"published":{"date-parts":[[2009,3]]}}}