{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,5]],"date-time":"2026-01-05T21:44:49Z","timestamp":1767649489974,"version":"3.38.0"},"reference-count":62,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["ICA"],"published-print":{"date-parts":[[2019,11,27]]},"DOI":"10.3233\/ica-190604","type":"journal-article","created":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T14:52:48Z","timestamp":1557845568000},"page":"37-56","source":"Crossref","is-referenced-by-count":12,"title":["An agent-based method for trust graph calculation in resource constrained environments"],"prefix":"10.1177","volume":"27","author":[{"given":"Borja","family":"Bordel","sequence":"first","affiliation":[{"name":"Department of Telematics Engineering, Universidad Polit\u00e9cnica de Madrid, Madrid, Spain"}]},{"given":"Ram\u00f3n","family":"Alcarria","sequence":"additional","affiliation":[{"name":"Department of Topographic Engineering and Cartography, Universidad Polit\u00e9cnica de Madrid, Madrid, Spain"}]},{"given":"Diego","family":"Mart\u00edn","sequence":"additional","affiliation":[{"name":"Department of Telematics Engineering, Universidad Polit\u00e9cnica de Madrid, Madrid, Spain"}]},{"given":"Diego","family":"S\u00e1nchez-de-Rivera","sequence":"additional","affiliation":[{"name":"Department of Telematics Engineering, Universidad Polit\u00e9cnica de Madrid, Madrid, Spain"}]}],"member":"179","reference":[{"key":"10.3233\/ICA-190604_ref1","unstructured":"Lee EA. Cyber-physical systems-are computing foundations adequate. In: Position Paper for NSF Workshop On Cyber-Physical Systems: Research Motivation, Techniques and Roadmap (Vol. 2). 2006."},{"key":"10.3233\/ICA-190604_ref2","doi-asserted-by":"crossref","unstructured":"Varghese A, Tandur D. Wireless requirements and challenges in Industry 4.0. In: 2014 International Conference on Contemporary Computing and Informatics (IC3I). 2014. pp. 634-638.","DOI":"10.1109\/IC3I.2014.7019732"},{"issue":"1","key":"10.3233\/ICA-190604_ref3","first-page":"4","article-title":"An IoT based reference architecture for smart water management processes","volume":"6","author":"Robles","year":"2015","journal-title":"JoWUA"},{"key":"10.3233\/ICA-190604_ref4","doi-asserted-by":"crossref","unstructured":"Mart\u00edn de Andr\u00e9s D, Alcarria R, Robles T, Morales Dominguez A. A Systematic Approach for Service Prosumerization in IoT Scenarios. In: Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS). 2013. pp. 494-499.","DOI":"10.1109\/IMIS.2013.89"},{"issue":"1","key":"10.3233\/ICA-190604_ref5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10270-015-0493-x","article-title":"Industry 4.0 as a cyber-physical system study","volume":"15","author":"Mosterman","year":"2016","journal-title":"Software & Systems Modeling"},{"key":"10.3233\/ICA-190604_ref6","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","article-title":"A cyber-physical systems architecture for industry 4.0-based manufacturing systems","volume":"3","author":"Lee","year":"2015","journal-title":"Manufacturing Letters"},{"issue":"11","key":"10.3233\/ICA-190604_ref7","doi-asserted-by":"crossref","first-page":"29478","DOI":"10.3390\/s151129478","article-title":"TF4SM: a framework for developing traceability solutions in small manufacturing companies","volume":"15","author":"Bordel S\u00e1nchez","year":"2015","journal-title":"Sensors"},{"key":"10.3233\/ICA-190604_ref8","doi-asserted-by":"crossref","first-page":"40","DOI":"10.1016\/j.ijcip.2014.09.003","article-title":"A language for describing attacks on cyber-physical systems","volume":"8","author":"Yampolskiy","year":"2015","journal-title":"International Journal of Critical Infrastructure Protection"},{"key":"10.3233\/ICA-190604_ref9","doi-asserted-by":"crossref","unstructured":"Yampolskiy M, Horvath P, Koutsoukos XD, Xue Y, Sztipanovits J. Taxonomy for Description of Cross-Domain Attacks on CPS. In: Proceedings of the Second ACM International Conference on High Confidence Networked Systems. 2013. pp. 135-142.","DOI":"10.1145\/2461446.2461465"},{"issue":"1","key":"10.3233\/ICA-190604_ref10","doi-asserted-by":"crossref","first-page":"15","DOI":"10.3233\/ICA-150503","article-title":"Design and implementation of membrane controllers for trajectory tracking of nonholonomic wheeled mobile robots","volume":"23","author":"Wang","year":"2016","journal-title":"Integrated Computer-Aided Engineering"},{"key":"10.3233\/ICA-190604_ref11","doi-asserted-by":"crossref","unstructured":"Bordel B, Alcarria R, S\u00e1nchez-de-Rivera D. Detecting Malicious Components in Large-Scale Internet-of-Things Systems and Architectures. In: World Conference on Information Systems and Technologies. Springer, Cham. 2017. pp. 155-165.","DOI":"10.1007\/978-3-319-56535-4_16"},{"issue":"4","key":"10.3233\/ICA-190604_ref13","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/s12652-016-0410-3","article-title":"Self-configuration in humanized Cyber-Physical Systems","volume":"8","author":"Bordel","year":"2017","journal-title":"J. Ambient Intelligence and Humanized Computing"},{"issue":"10","key":"10.3233\/ICA-190604_ref14","doi-asserted-by":"crossref","first-page":"2177","DOI":"10.3390\/s17102177","article-title":"A methodology for the design of application-specific cyber-physical social sensing co-simulators","volume":"17","author":"S\u00e1nchez","year":"2017","journal-title":"Sensors"},{"key":"10.3233\/ICA-190604_ref15","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1016\/j.compind.2017.04.002","article-title":"Industry 4.0 and the current status as well as future prospects on logistics","volume":"89","author":"Hofmann","year":"2017","journal-title":"Computers in Industry"},{"issue":"5","key":"10.3233\/ICA-190604_ref16","doi-asserted-by":"crossref","first-page":"1512","DOI":"10.3926\/jiem.1470","article-title":"Industrial revolution-industry 4.0: Are German manufacturing SMEs the first victims of this revolution","volume":"8","author":"Sommer","year":"2015","journal-title":"Journal of Industrial Engineering and Management"},{"key":"10.3233\/ICA-190604_ref17","doi-asserted-by":"crossref","unstructured":"Shrouf F, Ordieres J, Miragliotta G. Smart factories in Industry 4.0: A review of the concept and of energy management approached in production based on the Internet of Things paradigm. In Industrial Engineering and Engineering Management (IEEM), 2014 IEEE International Conference on. IEEE. 2014, December. pp. 697-701.","DOI":"10.1109\/IEEM.2014.7058728"},{"key":"10.3233\/ICA-190604_ref18","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","article-title":"A cyber-physical systems architecture for industry 4.0-based manufacturing systems","volume":"3","author":"Lee","year":"2015","journal-title":"Manufacturing Letters"},{"issue":"10","key":"10.3233\/ICA-190604_ref19","doi-asserted-by":"crossref","first-page":"864","DOI":"10.1111\/mice.12383","article-title":"Resource leveling based on line of balance and constraint programming","volume":"33","author":"Tang","year":"2018","journal-title":"Computer \u2013 Aided Civil and Infrastructure Engineering"},{"issue":"4","key":"10.3233\/ICA-190604_ref21","first-page":"41","article-title":"Enhancing process control in industry 4.0 scenarios using cyber-physical systems","volume":"7","author":"S\u00e1nchez","year":"2016","journal-title":"JoWUA"},{"key":"10.3233\/ICA-190604_ref22","doi-asserted-by":"crossref","first-page":"2967","DOI":"10.1109\/ACCESS.2017.2670024","article-title":"A cloud-based trust management framework for vehicular social networks","volume":"5","author":"Chen","year":"2017","journal-title":"IEEE Access"},{"key":"10.3233\/ICA-190604_ref23","doi-asserted-by":"crossref","first-page":"158","DOI":"10.1016\/j.comnet.2015.12.017","article-title":"Towards smart factory for industry 4.0: a self-organized multi-agent system with big data based feedback and coordination","volume":"101","author":"Wang","year":"2016","journal-title":"Computer Networks"},{"key":"10.3233\/ICA-190604_ref24","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1016\/j.jnca.2014.01.014","article-title":"A survey on trust management for internet of things","volume":"42","author":"Yan","year":"2014","journal-title":"Journal of Network and Computer Applications"},{"issue":"2","key":"10.3233\/ICA-190604_ref26","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical trust management for wireless sensor networks and its applications to trust-based routing and intrusion detection","volume":"9","author":"Bao","year":"2012","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"10.3233\/ICA-190604_ref27","unstructured":"Bao F, Chen R. Trust management for the internet of things and its application to service composition. In: IEEE International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM). 2012. pp. 1-6."},{"issue":"5","key":"10.3233\/ICA-190604_ref28","doi-asserted-by":"crossref","first-page":"606","DOI":"10.1109\/TMC.2008.161","article-title":"Social network analysis for information flow in disconnected delay-tolerant MANETs","volume":"8","author":"Daly","year":"2009","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"10.3233\/ICA-190604_ref29","doi-asserted-by":"crossref","unstructured":"Zhang M, Selic B, Ali S, Yue T, Okariz O, Norgren R. Understanding Uncertainty in Cyber-Physical Systems: A Conceptual Model. In: Modelling Foundations and Applications: 12th European Conference, ECMFA 2016; 2016 July 6-7. Vienna, Austria: Springer. 2016. pp. 247-264.","DOI":"10.1007\/978-3-319-42061-5_16"},{"issue":"1","key":"10.3233\/ICA-190604_ref30","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/2633684","article-title":"Approximate semantic matching of events for the internet of things","volume":"14","author":"Hasan","year":"2014","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"4","key":"10.3233\/ICA-190604_ref32","doi-asserted-by":"crossref","first-page":"1207","DOI":"10.2298\/CSIS110303056C","article-title":"TRM-IoT: A trust management model based on fuzzy reputation for internet of things","volume":"8","author":"Chen","year":"2011","journal-title":"Computer Science and Information Systems"},{"key":"10.3233\/ICA-190604_ref33","unstructured":"Truong NB, Um TW, Lee GM. A reputation and knowledge based trust service platform for trustworthy social internet of things. In: 19th Conference in Innovations in Clouds, Internet and Networks (ICIN); 2016 March 1-3. Paris, France. 2016."},{"key":"10.3233\/ICA-190604_ref34","doi-asserted-by":"crossref","unstructured":"Xiao H, Sidhu N, Christianson B. Guarantor and reputation based trust model for social internet of things. In: International Wireless Communications and Mobile Computing Conference (IWCMC); 2015 Aug 24-28. Dubrovnik, Croatia. 2015. pp. 600-605.","DOI":"10.1109\/IWCMC.2015.7289151"},{"key":"10.3233\/ICA-190604_ref35","doi-asserted-by":"crossref","unstructured":"Guha R, Kumar R, Raghavan P, Tomkins A. Propagation of trust and distrust. In: Proceedings of the 13th international conference on World Wide Web; 2004 May 17-22. New York, USA; ACM. 2004. pp. 403-412.","DOI":"10.1145\/988672.988727"},{"key":"10.3233\/ICA-190604_ref36","unstructured":"Jiang T, Baras JS. Graph algebraic interpretation of trust establishment in autonomic networks. In: Preprint Wiley Journal of Networks. Wiley. 2009."},{"issue":"9","key":"10.3233\/ICA-190604_ref37","doi-asserted-by":"crossref","first-page":"1750062","DOI":"10.1142\/S0129065717500629","article-title":"A correction method of a binary classifier applied to multi-label pairwise models","volume":"28","author":"Trajdos","year":"2018","journal-title":"International Journal of Neural Systems"},{"key":"10.3233\/ICA-190604_ref38","doi-asserted-by":"crossref","unstructured":"Golbeck J, Parsia B, Hendler J. Trust networks on the semantic web. In: Proceedings of the 7th International Workshop on Cooperative Information Agents (CIA-2003). 2003; pp. 238-249.","DOI":"10.1007\/978-3-540-45217-1_18"},{"issue":"1","key":"10.3233\/ICA-190604_ref39","doi-asserted-by":"crossref","first-page":"167","DOI":"10.3233\/JCS-2005-13107","article-title":"Reputation-based trust management","volume":"13","author":"Shmatikov","year":"2005","journal-title":"Journal of Computer Security"},{"key":"10.3233\/ICA-190604_ref40","doi-asserted-by":"crossref","unstructured":"Ziegler CN, Lausen G. Spreading activation models for trust propagation. In: Proceedings of IEEE International Conference on e-Technology, e-Commerce and e-Service; 2004 March 28-31. Taipei, Taiwan. IEEE. 2004. pp. 83-97.","DOI":"10.1109\/EEE.2004.1287293"},{"issue":"2","key":"10.3233\/ICA-190604_ref41","doi-asserted-by":"crossref","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","article-title":"On trust models and trust evaluation metrics for ad hoc networks","volume":"24","author":"Theodorakopoulos","year":"2006","journal-title":"IEEE Journal on selected areas in Communications"},{"issue":"4","key":"10.3233\/ICA-190604_ref42","doi-asserted-by":"crossref","first-page":"313","DOI":"10.3233\/ICA-160529","article-title":"Covariance matrix adaptation pareto archived evolution strategy with hypervolume-sorted adaptive grid algorithm","volume":"23","author":"Rostami","year":"2016","journal-title":"Integrated Computer-Aided Engineering"},{"key":"10.3233\/ICA-190604_ref43","unstructured":"Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Proceedings of the IEEE Symposium on Security and Privacy; 1996 May 6-8. California, USA. IEEE. 1996. pp. 164-173."},{"key":"10.3233\/ICA-190604_ref44","doi-asserted-by":"crossref","unstructured":"Cornelli F, Damiani E, di Vimercati SDC, Paraboschi S, Samarati P. Choosing reputable servents in a P2P network. In: Proceedings of the Eleventh International World Wide Web Conference; 2002 May 07-11. Honolulu, USA. ACM. 2002. pp. 376-386.","DOI":"10.1145\/511446.511496"},{"issue":"1","key":"10.3233\/ICA-190604_ref45","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1142\/S0129065712003067","article-title":"A novel efficient learning algorithm for self-generating fuzzy neural network with applications","volume":"22","author":"Liu","year":"2012","journal-title":"International Journal of Neural Systems"},{"key":"10.3233\/ICA-190604_ref46","doi-asserted-by":"crossref","unstructured":"Kretzschmar H, Stachniss C, Grisetti G. Efficient information-theoretic graph pruning for graph-based SLAM with laser range finders. In: IEEE\/RSJ International Conference on Intelligent Robots and Systems (IROS); 2011 Sep. 25-30. San Francisco, USA. IEEE. 2011. pp. 865-871.","DOI":"10.1109\/IROS.2011.6048060"},{"key":"10.3233\/ICA-190604_ref47","unstructured":"Dai F, Wu J. Distributed dominant pruning in ad hoc networks. In: Proceedings of the IEEE International Conference on Communications; 2003 May 11-15; Anchorage, Alaska, USA. IEEE. 2003. pp. 353-357."},{"issue":"4","key":"10.3233\/ICA-190604_ref48","doi-asserted-by":"crossref","first-page":"315","DOI":"10.3233\/ICA-170547","article-title":"Progressive preference articulation for decision making in multi-objective optimisation problems","volume":"24","author":"Rostami","year":"2017","journal-title":"Integrated Computer-Aided Engineering"},{"issue":"2","key":"10.3233\/ICA-190604_ref49","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1016\/S0304-3975(01)00401-7","article-title":"Predicting nearly as well as the best pruning of a planar decision graph","volume":"288","author":"Takimoto","year":"2002","journal-title":"Theoretical Computer Science"},{"key":"10.3233\/ICA-190604_ref50","unstructured":"Navigli R, Velardi P, Faralli S. A graph-based algorithm for inducing lexical taxonomies from scratch. In: International Joint Conference on Artificial Intelligence; 2011 July 16-22. Barcelona, Spain. 2011. pp. 1872-1877."},{"key":"10.3233\/ICA-190604_ref51","doi-asserted-by":"crossref","unstructured":"Sixtus A, Ortmanns S. High quality word graphs using forward-backward pruning. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing; 1999 March 15-19. Phoenix, Arizona, USA. IEEE. Vol. 2. 1999. pp. 593-596.","DOI":"10.1109\/ICASSP.1999.759736"},{"issue":"3","key":"10.3233\/ICA-190604_ref52","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1145\/311124.311130","article-title":"Mobile agents and the future of the internet","volume":"33","author":"Kotz","year":"1999","journal-title":"Operating Systems Review"},{"key":"10.3233\/ICA-190604_ref53","doi-asserted-by":"crossref","unstructured":"Godfrey WW, Jha SS, Nair SB. On a mobile agent framework for an internet of things. In: Communication Systems and Network Technologies (CSNT), 2013 International Conference on. IEEE. 2013, April. pp. 345-350.","DOI":"10.1109\/CSNT.2013.79"},{"key":"10.3233\/ICA-190604_ref54","doi-asserted-by":"crossref","unstructured":"Fortino G, Guerrieri A, Russo W, Savaglio C. Integration of agent-based and cloud computing for the smart objects-oriented IoT. In: Computer Supported Cooperative Work in Design (CSCWD), Proceedings of the 2014 IEEE 18th International Conference on. IEEE. 2014, May. pp. 493-498.","DOI":"10.1109\/CSCWD.2014.6846894"},{"issue":"1","key":"10.3233\/ICA-190604_ref55","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1111\/mice.12364","article-title":"Integrating a human behavior model within an agent \u2013 based approach for blasting evacuation","volume":"34","author":"Cimellaro","year":"2019","journal-title":"Computer \u2013 Aided Civil and Infrastructure Engineering"},{"issue":"5","key":"10.3233\/ICA-190604_ref56","doi-asserted-by":"crossref","first-page":"2026","DOI":"10.48084\/etasr.829","article-title":"Design of a mobile agents based solution to distributional management of computer networks, taking into account the security mechanisms","volume":"7","author":"Bahrami","year":"2017","journal-title":"Engineering, Technology & Applied Science Research"},{"issue":"1","key":"10.3233\/ICA-190604_ref58","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1109\/JPROC.2011.2160929","article-title":"Modeling cyber-physical systems","volume":"100","author":"Derler","year":"2012","journal-title":"Proceedings of the IEEE"},{"issue":"12","key":"10.3233\/ICA-190604_ref59","doi-asserted-by":"crossref","first-page":"3178","DOI":"10.1109\/TAC.2014.2351672","article-title":"Supporting heterogeneity in cyber-physical systems architectures","volume":"59","author":"Rajhans","year":"2014","journal-title":"IEEE Transactions on Automatic Control"},{"key":"10.3233\/ICA-190604_ref60","doi-asserted-by":"crossref","unstructured":"Lin J, Sedigh S, Hurson AR. An agent-based approach to reconciling data heterogeneity in cyber-physical systems. In: Parallel and Distributed Processing Workshops and Phd Forum (IPDPSW), 2011 IEEE International Symposium on. IEEE. 2011, May. pp. 93-103.","DOI":"10.1109\/IPDPS.2011.130"},{"key":"10.3233\/ICA-190604_ref61","doi-asserted-by":"crossref","unstructured":"Chess D, Harrison C, Kershenbaum A. Mobile agents: Are they a good idea? In: International Workshop on Mobile Object Systems. Springer, Berlin, Heidelberg. 1996, July. pp. 25-45.","DOI":"10.1007\/3-540-62852-5_4"},{"issue":"3","key":"10.3233\/ICA-190604_ref62","doi-asserted-by":"crossref","first-page":"1105","DOI":"10.2298\/CSIS120326018W","article-title":"From machine-to-machine communications towards cyber-physical systems","volume":"10","author":"Wan","year":"2013","journal-title":"Computer Science and Information Systems"},{"key":"10.3233\/ICA-190604_ref63","doi-asserted-by":"crossref","first-page":"47472","DOI":"10.1109\/ACCESS.2018.2866185","article-title":"Securing Internet-of-Things systems through implicit and explicit reputation models","volume":"6","author":"Bordel","year":"2018","journal-title":"IEEE Access"},{"key":"10.3233\/ICA-190604_ref64","doi-asserted-by":"crossref","first-page":"16149","DOI":"10.1109\/ACCESS.2018.2815567","article-title":"An intra-slice security solution for emerging 5G networks based on pseudo-random number generators","volume":"6","author":"Bordel","year":"2018","journal-title":"IEEE Access"},{"issue":"4","key":"10.3233\/ICA-190604_ref65","doi-asserted-by":"crossref","first-page":"326","DOI":"10.1016\/j.physd.2011.09.008","article-title":"Visibility graph similarity: A new measure of generalized synchronization in coupled dynamic systems","volume":"241","author":"Ahmadlou","year":"2012","journal-title":"Physica D: Nonlinear Phenomena"},{"key":"10.3233\/ICA-190604_ref66","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1016\/j.mfglet.2014.12.001","article-title":"A cyber-physical systems architecture for industry 4.0-based manufacturing systems","volume":"3","author":"Lee","year":"2015","journal-title":"Manufacturing Letters"},{"issue":"15","key":"10.3233\/ICA-190604_ref67","first-page":"1711","article-title":"Mobile \u2013 C: a mobile agent platform for mobile C\/C++ agents","volume":"36","author":"Chen","year":"2006","journal-title":"Software: Practice and Experience"}],"container-title":["Integrated Computer-Aided Engineering"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/ICA-190604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,11]],"date-time":"2025-03-11T05:31:21Z","timestamp":1741671081000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/ICA-190604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,27]]},"references-count":62,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/ica-190604","relation":{},"ISSN":["1069-2509","1875-8835"],"issn-type":[{"type":"print","value":"1069-2509"},{"type":"electronic","value":"1875-8835"}],"subject":[],"published":{"date-parts":[[2019,11,27]]}}}