{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T08:25:42Z","timestamp":1730276742310,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,11]]},"DOI":"10.1109\/istel.2012.6483151","type":"proceedings-article","created":{"date-parts":[[2013,3,27]],"date-time":"2013-03-27T16:55:14Z","timestamp":1364403314000},"page":"1103-1108","source":"Crossref","is-referenced-by-count":0,"title":["Alleviating controversiality problem in trust estimation"],"prefix":"10.1109","author":[{"given":"Mohsen","family":"Mohkami","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Shakeri","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.2002.994181"},{"journal-title":"Formalising trust as a computational concept","year":"1994","author":"marsh","key":"17"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.websem.2007.03.002"},{"journal-title":"The PageRank Citation Ranking Bringing Order to the Web","year":"1998","author":"page","key":"15"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1109\/WI.2005.112"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2011.6062344"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948037"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2009.70"},{"key":"12","article-title":"Super-agent based reputation management with a practical reward mechanism in decentralized systems","author":"wang","year":"2010","journal-title":"Proceedings of the IFIP WG 11 11 International Conference on Trust Management"},{"key":"21","first-page":"1377","article-title":"Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models","author":"kuter","year":"2007","journal-title":"AAAI"},{"key":"20","article-title":"Modeling and evaluating trust network inference","author":"ding","year":"2004","journal-title":"Proceedings of the 7th International Workshop on Trust in Agent Societies at AAMAS"},{"key":"22","first-page":"1025","article-title":"Operators for propagating trust and their evaluation in social networks","author":"hang","year":"2009","journal-title":"Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems (AAMAS) Columbia SC IFAAMAS"},{"key":"23","article-title":"Optimal social trust path selection in complex social networks","author":"li","year":"2010","journal-title":"Proceedings of the 24th AAAI Conference on Artificial Intelligence"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1568199.1568207"},{"key":"25","article-title":"Trust propagation with mixedeffects models","author":"overgoor","year":"2012","journal-title":"Proceedings of the 6th International AAAI Conference on Weblogs and Social Media"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-007-9021-x"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/IITA.2008.228"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ISCISC.2011.6062343"},{"key":"3","first-page":"1000","article-title":"Hierarchical trust architecture in a mobile ad-hoc network using ant algorithms","author":"satizabal","year":"2008","journal-title":"Third International Conference on Availability Reliability and Security ARES 08"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/CMC.2009.143"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/581291.581312"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2010.2059690"},{"key":"30","article-title":"Investigating interactions of trust and interest similarity","author":"ziegler","year":"2006","journal-title":"Decision Support Systems"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1049\/iet-ifs.2009.0140"},{"key":"6","first-page":"92","volume":"2","author":"sen","year":"2010","journal-title":"A Distributed Trust Management Framework for Detecting Malicious Packet Dropping Nodes in A Mobile Ad Hoc Network"},{"journal-title":"Attack Resistant Trust Metrics","year":"2004","author":"levien","key":"32"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICISS.2008.25"},{"key":"31","first-page":"121","article-title":"Controversial users demand local trust metrics: An experimental study on epinions.com community","author":"massa","year":"2005","journal-title":"AAAI'05"},{"key":"4","first-page":"825","article-title":"SORI: A secure and objective reputationbased incentive scheme for ad-hoc networks","volume":"2","author":"he","year":"2004","journal-title":"Proc IEEE Wireless Communications and Networking Conference (WCNC '04)"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-004-4744-y"},{"key":"8","first-page":"235","article-title":"Algorithmic design for communication in Mobile Ad Hoc Networks","author":"boukerche","year":"2003","journal-title":"MASCOTS tutorials"}],"event":{"name":"2012 Sixth International Symposium on Telecommunications (IST)","start":{"date-parts":[[2012,11,6]]},"location":"Tehran, Iran","end":{"date-parts":[[2012,11,8]]}},"container-title":["6th International Symposium on Telecommunications (IST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6478875\/6482932\/06483151.pdf?arnumber=6483151","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,22]],"date-time":"2017-03-22T22:46:33Z","timestamp":1490222793000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6483151\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/istel.2012.6483151","relation":{},"subject":[],"published":{"date-parts":[[2012,11]]}}}