{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,21]],"date-time":"2023-10-21T01:40:27Z","timestamp":1697852427080},"reference-count":7,"publisher":"International Academy Publishing (IAP)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["JCP"],"DOI":"10.4304\/jcp.6.12.2567-2573","type":"journal-article","created":{"date-parts":[[2011,12,13]],"date-time":"2011-12-13T10:22:10Z","timestamp":1323771730000},"source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of Network Connection Credibility based on Neural Network"],"prefix":"10.17706","volume":"6","author":[{"given":"Qingtao","family":"Wu","sequence":"first","affiliation":[]},{"given":"Xintong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Hua","sequence":"additional","affiliation":[]},{"given":"Ruijuan","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"7163","published-online":{"date-parts":[[2011,12,1]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.00706"},{"issue":"11","key":"ref2","first-page":"1930","article-title":"A Kind of Gam e-Theoretic Control Mechanism of User Behavior TrustBased on Prediction in Trustworthy Network","volume":"30","author":"Li-qin","year":"2007","journal-title":"Chinese Journal of Computers"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2009.01304"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.3724\/SP.J.1016.2010.00074"},{"issue":"5","key":"ref5","first-page":"751","article-title":"Research on trustworthy networks","volume":"28","author":"Chuang","year":"2005","journal-title":"Chinese Journal of Computers"},{"key":"ref6","first-page":"285","article-title":"webber F, Atighetchi M, Combs N. Trust assessment from observed behavior: Toward and essential service for trusted network computing[C].","volume-title":"Proceedings of the 5th IEEE International Symposium on Network Computing and Applications","author":"Pal","year":"2006"},{"key":"ref7","first-page":"1","article-title":"Baras J.S . Trust evaluation in Ad-hoc networks[C].","volume-title":"Proceedings of the 2004 ACM Workshop on Wireless Security, Wise","author":"George","year":"2004"}],"container-title":["Journal of Computers"],"original-title":[],"deposited":{"date-parts":[[2015,9,15]],"date-time":"2015-09-15T15:07:58Z","timestamp":1442329678000},"score":1,"resource":{"primary":{"URL":"http:\/\/ojs.academypublisher.com\/index.php\/jcp\/article\/view\/4491"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12,1]]},"references-count":7,"journal-issue":{"issue":"12","published-online":{"date-parts":[[2011,12,1]]}},"URL":"https:\/\/doi.org\/10.4304\/jcp.6.12.2567-2573","relation":{},"ISSN":["1796-203X"],"issn-type":[{"value":"1796-203X","type":"print"}],"subject":[],"published":{"date-parts":[[2011,12,1]]}}}