{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T08:54:22Z","timestamp":1725612862303},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1109\/wf-iot.2016.7845509","type":"proceedings-article","created":{"date-parts":[[2017,2,9]],"date-time":"2017-02-09T21:42:54Z","timestamp":1486676574000},"page":"559-564","source":"Crossref","is-referenced-by-count":1,"title":["A trust-based scheme employing evidence reasoning for IoT architectures"],"prefix":"10.1109","author":[{"given":"Alexandras","family":"Fragkiadakis","sequence":"first","affiliation":[]},{"given":"Elias","family":"Tragos","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2008.31"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.251"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CISS.2009.5054704"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2010.5496102"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/wcm.2341"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.artint.2013.09.003"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1155\/2013\/760834"},{"journal-title":"Routing attacks in wireless sensor networks A survey","year":"2014","author":"virmani","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/ett.1413"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2980147.2980155"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.3390\/s110201345"},{"key":"ref7","first-page":"1","article-title":"Improving the Trustworthiness of Ambient Assisted Living Applications","author":"tragos","year":"2015","journal-title":"Proc of WPMC"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/iccsp.2013.6577120"},{"key":"ref1","first-page":"1","article-title":"Effective and Robust Detection of Jamming Attacks","author":"fragkiadakis","year":"2010","journal-title":"Future Network and MobileSummit"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/LCN.2010.5735718"}],"event":{"name":"2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)","start":{"date-parts":[[2016,12,12]]},"location":"Reston, VA, USA","end":{"date-parts":[[2016,12,14]]}},"container-title":["2016 IEEE 3rd World Forum on Internet of Things (WF-IoT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7831562\/7845389\/07845509.pdf?arnumber=7845509","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,12,13]],"date-time":"2017-12-13T19:52:59Z","timestamp":1513194779000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7845509\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/wf-iot.2016.7845509","relation":{},"subject":[],"published":{"date-parts":[[2016,12]]}}}