{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T00:31:49Z","timestamp":1761611509627,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,1,10]],"date-time":"2020-01-10T00:00:00Z","timestamp":1578614400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,1,10]]},"DOI":"10.1145\/3377049.3377054","type":"proceedings-article","created":{"date-parts":[[2020,3,20]],"date-time":"2020-03-20T20:40:32Z","timestamp":1584736832000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":18,"title":["Hidden Markov Model based Trust Management Model for Underwater Wireless Sensor Networks"],"prefix":"10.1145","author":[{"given":"Md Murshedul","family":"Arifeen","sequence":"first","affiliation":[{"name":"Information &amp; Communication Tech. Bangladesh University of Professionals Dhaka, Bangladesh"}]},{"given":"Dip","family":"Bhakta","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Tech. Bangladesh University of Professionals Dhaka, Bangladesh"}]},{"given":"Sm Rakibul Hasan","family":"Remu","sequence":"additional","affiliation":[{"name":"Electrical &amp; Electronic Eng. Ahsanullah University of Science &amp; Technology Dhaka, Bangladesh"}]},{"given":"Md. Maynul","family":"Islam","sequence":"additional","affiliation":[{"name":"Information &amp; Communication Tech. Bangladesh University of Professionals Dhaka, Bangladesh"}]},{"given":"Mufti","family":"Mahmud","sequence":"additional","affiliation":[{"name":"Computing &amp; Technology Nottingham Trent University Nottingham, UK"}]},{"given":"M. S.","family":"Kaiser","sequence":"additional","affiliation":[{"name":"Institute of Information Tech. Jahangirnagar University Dhaka, Bangladesh"}]}],"member":"320","published-online":{"date-parts":[[2020,3,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2016.8208"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.02.004"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ECACE.2019.8679165"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2018.8554589"},{"key":"e_1_3_2_1_5_1","volume-title":"Workshop Record of SASC","volume":"8","author":"Bernstein Daniel J","year":"2008","unstructured":"Daniel J Bernstein. 2008. ChaCha, a variant of Salsa20. In Workshop Record of SASC, Vol. 8. 3--5."},{"key":"e_1_3_2_1_6_1","volume-title":"International Workshop on Formal Aspects in Security and Trust. Springer, 21--35","author":"ElSalamouny Ehab","year":"2009","unstructured":"Ehab ElSalamouny, Vladimiro Sassone, and Mogens Nielsen. 2009. HMM-based trust model. In International Workshop on Formal Aspects in Security and Trust. Springer, 21--35."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","unstructured":"W. Fang C. Zhu W. Chen W. Zhang and J. J. P. C. Rodrigues. 2018. BDTMS: Binomial Distribution-based Trust Management Scheme for Healthcare-oriented Wireless Sensor Network. In 2018 14th International Wireless Communications Mobile Computing Conference (IWCMC). 382--387. https:\/\/doi.org\/10.1109\/IWCMC.2018.8450403","DOI":"10.1109\/IWCMC.2018.8450403"},{"key":"e_1_3_2_1_8_1","volume-title":"Energy per instruction trends in Intel microprocessors. Technology@ Intel Magazine 4, 3","author":"Grochowski Ed","year":"2006","unstructured":"Ed Grochowski and Murali Annavaram. 2006. Energy per instruction trends in Intel microprocessors. Technology@ Intel Magazine 4, 3 (2006), 1--8."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SM2C.2017.8071827"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/T-WC.2008.070182"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2914769"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.4304\/jnw.9.12.3263-3267"},{"key":"e_1_3_2_1_13_1","volume-title":"Twenty-Sixth AAAI Conference on Artificial Intelligence.","author":"Liu Xin","year":"2012","unstructured":"Xin Liu and Anwitaman Datta. 2012. Modeling context aware dynamic trust using hidden markov model. In Twenty-Sixth AAAI Conference on Artificial Intelligence."},{"key":"e_1_3_2_1_14_1","first-page":"23","article-title":"Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor","volume":"1","author":"Oke Johnson Toyin","year":"2018","unstructured":"Johnson Toyin Oke, James Agajo, Bello Kontagora Nuhu, Jonathan G Kolo, and LA Ajao. 2018. Two Layers Trust-Based Intrusion Prevention System for Wireless Sensor Networks. Adv. Electr. Telecommun. Eng 1 (2018), 23--29.","journal-title":"Networks. Adv. Electr. Telecommun. Eng"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2902811"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11276-016-1368-y"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2904544"}],"event":{"name":"ICCA 2020: International Conference on Computing Advancements","acronym":"ICCA 2020","location":"Dhaka Bangladesh"},"container-title":["Proceedings of the International Conference on Computing Advancements"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3377049.3377054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:23:49Z","timestamp":1750202629000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3377049.3377054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,1,10]]},"references-count":17,"alternative-id":["10.1145\/3377049.3377054","10.1145\/3377049"],"URL":"https:\/\/doi.org\/10.1145\/3377049.3377054","relation":{},"subject":[],"published":{"date-parts":[[2020,1,10]]},"assertion":[{"value":"2020-03-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}