{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,9]],"date-time":"2024-07-09T07:21:38Z","timestamp":1720509698279},"reference-count":66,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2017,12,1]],"date-time":"2017-12-01T00:00:00Z","timestamp":1512086400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"funder":[{"DOI":"10.13039\/100007847","name":"Provincial Natural Science Foundation of China","doi-asserted-by":"publisher","award":["2017JJ2186"],"id":[{"id":"10.13039\/100007847","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Natural Sciences and Engineering Research Council of Canada (NSERC)","award":["RGPIN262075-2013"]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71501192"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Knowledge-Based Systems"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1016\/j.knosys.2017.09.027","type":"journal-article","created":{"date-parts":[[2017,9,28]],"date-time":"2017-09-28T05:16:02Z","timestamp":1506575762000},"page":"27-45","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":42,"special_numbering":"C","title":["Time-aware trustworthiness ranking prediction for cloud services using interval neutrosophic set and ELECTRE"],"prefix":"10.1016","volume":"138","author":[{"given":"Hua","family":"Ma","sequence":"first","affiliation":[]},{"given":"Haibin","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhigang","family":"Hu","sequence":"additional","affiliation":[]},{"given":"Keqin","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wensheng","family":"Tang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"10","key":"10.1016\/j.knosys.2017.09.027_bib0001","doi-asserted-by":"crossref","first-page":"134","DOI":"10.1016\/j.jnca.2014.07.019","article-title":"Cloud service selection: state-of-the-art and future research directions","volume":"45","author":"Sun","year":"2014","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0002","doi-asserted-by":"crossref","first-page":"1737","DOI":"10.1007\/s11280-015-0335-3","article-title":"Evolutionary algorithm-based multi-objective task scheduling optimization model in cloud environments","volume":"18","author":"Ramezani","year":"2015","journal-title":"World Wide Web-Internet Web Inf. Syst."},{"issue":"2","key":"10.1016\/j.knosys.2017.09.027_bib0003","doi-asserted-by":"crossref","first-page":"503","DOI":"10.1007\/s10489-014-0537-x","article-title":"Probabilistic approach for QoS-aware recommender system for trustworthy web service selection","volume":"41","author":"Mehdi","year":"2014","journal-title":"Appl. Intell."},{"issue":"9","key":"10.1016\/j.knosys.2017.09.027_bib0004","doi-asserted-by":"crossref","first-page":"3495","DOI":"10.1007\/s11771-015-2889-8","article-title":"User preferences-aware recommendation for trustworthy cloud services based on fuzzy clustering","volume":"22","author":"Ma","year":"2015","journal-title":"J. Cent. South Univ."},{"issue":"5","key":"10.1016\/j.knosys.2017.09.027_bib0005","first-page":"1246","article-title":"Cloud service selection model based on QoS-aware in cloud manufacturing environment","volume":"20","author":"Ma","year":"2014","journal-title":"Comput. Integr. Manuf. Syst."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0006","first-page":"57","article-title":"Hybrid-context-aware web service selection approach","volume":"14","author":"Zhang","year":"2013","journal-title":"J. Internet Technol."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0007","doi-asserted-by":"crossref","first-page":"887","DOI":"10.1007\/s11704-015-4532-0","article-title":"Recommend trustworthy services using interval numbers of four parameters via cloud model for potential users","volume":"9","author":"Ma","year":"2015","journal-title":"Front. Comput. Sci."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0008","doi-asserted-by":"crossref","first-page":"791","DOI":"10.1016\/j.jvlc.2014.10.006","article-title":"User feature-aware trustworthiness measurement of cloud services via evidence synthesis for potential users","volume":"25","author":"Ma","year":"2014","journal-title":"J. Vis. Lang. Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0009","doi-asserted-by":"crossref","first-page":"108","DOI":"10.1016\/j.jnca.2015.05.007","article-title":"User-side cloud service management: State-of-the-art and future directions","volume":"55","author":"Rehman","year":"2015","journal-title":"J. Netw. Comput. Appl."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0010","doi-asserted-by":"crossref","first-page":"1213","DOI":"10.1109\/TPDS.2012.285","article-title":"QoS ranking prediction for cloud services","volume":"24","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0011","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/j.future.2015.01.008","article-title":"Search-based QoS ranking prediction for web services in cloud environments","volume":"50","author":"Mao","year":"2015","journal-title":"Futur. Gen. Comput. Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0012","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1016\/j.jpdc.2016.05.008","article-title":"Toward trustworthy cloud service selection: a time-aware approach using interval neutrosophic set","volume":"96","author":"Ma","year":"2016","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0013","series-title":"Proceedings of the IEEE International Conference on Web Services (ICWS)","first-page":"265","article-title":"Time-aware collaborative filtering for QoS-based service recommendation","author":"Yu","year":"2014"},{"key":"10.1016\/j.knosys.2017.09.027_bib0014","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1016\/j.procs.2016.08.276","article-title":"Towards the realization of multi-dimensional elasticity for distributed cloud systems","volume":"97","author":"Truong","year":"2016","journal-title":"Proc. Comput. Sci."},{"key":"10.1016\/j.knosys.2017.09.027_bib0015","series-title":"Proceedings of the Sixth ACM Symposium on Cloud Computing","article-title":"Interactive data analytics: the new frontier","author":"Madden","year":"2015"},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0016","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1109\/MC.2015.84","article-title":"Programming elasticity in the cloud","volume":"48","author":"Truong","year":"2015","journal-title":"IEEE Comput."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0017","doi-asserted-by":"crossref","first-page":"66","DOI":"10.1109\/TCC.2014.2328578","article-title":"SelCSP: a framework to facilitate selection of cloud service providers","volume":"3","author":"Ghosh","year":"2015","journal-title":"IEEE Trans. Cloud Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0018","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.ins.2015.01.025","article-title":"Security in cloud computing: opportunities and challenges","volume":"305","author":"Ali","year":"2015","journal-title":"Inf. Sci."},{"key":"10.1016\/j.knosys.2017.09.027_bib0021","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1016\/j.jpdc.2014.09.002","article-title":"SABA: a security-aware and budget-aware workflow scheduling strategy in clouds","volume":"75","author":"Zeng","year":"2015","journal-title":"J. Parallel Distrib. Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0022","series-title":"Proceedings of the IEEE Eighth World Congress on Services (SERVICES","first-page":"133","article-title":"Secagreement: advancing security risk calculations in cloud services","author":"Hale","year":"2012"},{"issue":"12","key":"10.1016\/j.knosys.2017.09.027_bib0023","first-page":"143","article-title":"Survey: risk assessment for cloud computing","volume":"4","author":"Drissi","year":"2013","journal-title":"Int. J. Adv. Comput. Sci. Appl."},{"issue":"5","key":"10.1016\/j.knosys.2017.09.027_bib0024","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1109\/MITP.2010.128","article-title":"Establishing trust in cloud computing","volume":"12","author":"Khan","year":"2010","journal-title":"IT Prof."},{"issue":"5","key":"10.1016\/j.knosys.2017.09.027_bib0025","doi-asserted-by":"crossref","first-page":"726","DOI":"10.1016\/j.ijinfomgt.2013.05.004","article-title":"Risk perception and risk management in cloud computing: results from a case study of Swiss companies","volume":"33","author":"Brender","year":"2013","journal-title":"Int. J. Inf. Manag."},{"key":"10.1016\/j.knosys.2017.09.027_bib0026","series-title":"Proceedings of the IEEE Third International Conference on Cloud Computing (CLOUD)","first-page":"280","article-title":"QUIRC: a quantitative impact and risk assessment framework for cloud security","author":"Saripalli","year":"2010"},{"issue":"4","key":"10.1016\/j.knosys.2017.09.027_bib0027","first-page":"62","article-title":"Real-time risk management through the use of intelligent cloud-computing solutions","volume":"19","author":"Prestifilippo","year":"2014","journal-title":"Prod. Manag."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0028","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ejor.2015.07.019","article-title":"ELECTRE: a comprehensive literature review on methodologies and applications","volume":"250","author":"Govindan","year":"2016","journal-title":"Eur. J. Oper. Res."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0029","first-page":"2251","article-title":"Fuzzy QoS-driven service selection method for group user","volume":"10","author":"Peng","year":"2014","journal-title":"Int. J. Innov. Comput. Inf. Control"},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0030","doi-asserted-by":"crossref","first-page":"774","DOI":"10.1145\/2532635","article-title":"UsageQoS: estimating the QoS of web services through online user communities","volume":"8","author":"Huang","year":"2013","journal-title":"ACM Trans. Web"},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0031","doi-asserted-by":"crossref","first-page":"184","DOI":"10.1109\/JSYST.2013.2279732","article-title":"Cloud-based mobile multimedia recommendation system with user behavior information","volume":"8","author":"Mo","year":"2014","journal-title":"IEEE Syst. J."},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0032","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1109\/TSC.2011.59","article-title":"Collaborative web service QoS prediction via neighborhood integrated matrix factorization","volume":"6","author":"Zheng","year":"2013","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0033","series-title":"Proceedings of the IEEE International Conference on Web Services (ICWS)","first-page":"33","article-title":"A time-aware and data sparsity tolerant approach for web service recommendation","author":"Hu","year":"2014"},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0034","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1109\/TSC.2014.2381496","article-title":"Time-aware service recommendation for mashup creation","volume":"8","author":"Zhong","year":"2015","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.knosys.2017.09.027_bib0035","doi-asserted-by":"crossref","first-page":"68","DOI":"10.1016\/j.ins.2013.12.007","article-title":"Colbar: a collaborative location-based regularization framework for QoS prediction","volume":"265","author":"Yin","year":"2014","journal-title":"Inf. Sci."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0036","doi-asserted-by":"crossref","first-page":"216","DOI":"10.1016\/j.knosys.2013.11.014","article-title":"Combining QoS prediction and customer satisfaction estimation to solve cloud service trustworthiness evaluation problems","volume":"56","author":"Ding","year":"2014","journal-title":"Knowl. Based Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0037","series-title":"Proceedings of the IEEE International Conference on Cloud Computing (CLOUD'09)","first-page":"155","article-title":"An approach for selecting software-as-a-service (SaaS) product","author":"Godse","year":"2009"},{"issue":"4","key":"10.1016\/j.knosys.2017.09.027_bib0038","doi-asserted-by":"crossref","first-page":"1012","DOI":"10.1016\/j.future.2012.06.006","article-title":"A framework for ranking of cloud computing services","volume":"29","author":"Garg","year":"2013","journal-title":"Futur. Gen. Comput. Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0039","unstructured":"M. Menzel, M. Sch\u00f6nherr, S. Tai, (MC2) 2: criteria, requirements and a software prototype for cloud infrastructure decisions, Softw. Pract. Exp., 43 (11) (2013) 1283\u20131297."},{"key":"10.1016\/j.knosys.2017.09.027_bib0040","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.future.2015.11.025","article-title":"Cloud-FuSeR: fuzzy ontology and MCDM based cloud service selection","volume":"57","author":"Sun","year":"2016","journal-title":"Futur. Gen. Comput. Syst."},{"issue":"7","key":"10.1016\/j.knosys.2017.09.027_bib0041","doi-asserted-by":"crossref","first-page":"868","DOI":"10.3923\/itj.2012.868.875","article-title":"Efficient service selection middleware using ELECTRE methodology for cloud environments","volume":"11","author":"Silas","year":"2012","journal-title":"Inf. Technol. J."},{"issue":"2","key":"10.1016\/j.knosys.2017.09.027_bib0042","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1016\/0165-0114(86)90077-1","article-title":"Interval valued fuzzy sets based on normal forms","volume":"20","author":"Turksen","year":"1986","journal-title":"Fuzzy Sets Syst."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0043","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1016\/S0165-0114(86)80034-3","article-title":"Intuitionistic fuzzy sets","volume":"20","author":"Atanassov","year":"1986","journal-title":"Fuzzy Sets Syst."},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0044","doi-asserted-by":"crossref","first-page":"343","DOI":"10.1016\/0165-0114(89)90205-4","article-title":"Interval valued intuitionistic fuzzy sets","volume":"31","author":"Atanassov","year":"1989","journal-title":"Fuzzy Sets Syst."},{"issue":"4","key":"10.1016\/j.knosys.2017.09.027_bib0045","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1080\/03081079.2012.761609","article-title":"Multicriteria decision-making method using the correlation coefficient under single-valued neutrosophic environment","volume":"42","author":"Ye","year":"2013","journal-title":"Int. J. Gen. Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0046","series-title":"A Unifying Field in Logics: Neutrosophic Logic","author":"Smarandache","year":"1999"},{"key":"10.1016\/j.knosys.2017.09.027_bib0047","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1016\/j.knosys.2011.12.004","article-title":"An ensemble design of intrusion detection system for handling uncertainty using neutrosophic logic classifier","volume":"28","author":"Kavitha","year":"2012","journal-title":"Knowl. Based Syst."},{"issue":"8","key":"10.1016\/j.knosys.2017.09.027_bib0048","doi-asserted-by":"crossref","first-page":"1134","DOI":"10.1016\/j.cviu.2011.04.001","article-title":"Color texture image segmentation based on neutrosophic set and wavelet transformation","volume":"115","author":"Sengur","year":"2011","journal-title":"Comput. Vis. Image Underst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0049","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1016\/j.asoc.2014.04.008","article-title":"Segmentation of SAR images using improved artificial bee colony algorithm and neutrosophic set","volume":"21","author":"Hanbay","year":"2014","journal-title":"Appl. Soft Comput."},{"issue":"5","key":"10.1016\/j.knosys.2017.09.027_bib0050","first-page":"5","article-title":"Proposal for applicability of neutrosophic set theory in medical AI","volume":"27","author":"Ansari","year":"2011","journal-title":"Int. J. Comput. Appl."},{"key":"10.1016\/j.knosys.2017.09.027_bib0051","doi-asserted-by":"crossref","first-page":"281","DOI":"10.1016\/j.tourman.2016.08.010","article-title":"A novel decision support model for satisfactory restaurants utilizing social information: a case study of TripAdvisor.com","volume":"59","author":"Zhang","year":"2017","journal-title":"Tour. Manag."},{"key":"10.1016\/j.knosys.2017.09.027_bib0052","series-title":"Proceedings of the First International Conference on Neutrosophy, Neutrosophic Logic, Neutrosophic Set, Neutrosophic Probability and Statistics","first-page":"75","article-title":"A short note on financial data set detection using neutrosophic probability","author":"Khoshnevisan","year":"2001"},{"key":"10.1016\/j.knosys.2017.09.027_bib0053","series-title":"Interval Neutrosophic Sets and Logic: Theory and Applications in Computing","author":"Wang","year":"2005"},{"issue":"5","key":"10.1016\/j.knosys.2017.09.027_bib0054","doi-asserted-by":"crossref","first-page":"2459","DOI":"10.3233\/IFS-130916","article-title":"A multicriteria decision-making method using aggregation operators for simplified neutrosophic sets","volume":"26","author":"Ye","year":"2014","journal-title":"J. Intell. Fuzzy Syst."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0055","doi-asserted-by":"crossref","first-page":"1027","DOI":"10.1080\/18756891.2015.1099917","article-title":"An improved weighted correlation coefficient based on integrated weight for interval neutrosophic sets and its application in multi-criteria decision-making problems","volume":"8","author":"Zhang","year":"2015","journal-title":"Int. J. Comput. Intell. Syst."},{"issue":"2","key":"10.1016\/j.knosys.2017.09.027_bib0056","first-page":"242","article-title":"Some generalized neutrosophic number Hamacher aggregation operators and their application to group decision making","volume":"16","author":"Liu","year":"2014","journal-title":"Int. J. Fuzzy Syst."},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0057","doi-asserted-by":"crossref","first-page":"615","DOI":"10.1007\/s00521-015-1882-3","article-title":"An outranking approach for multi-criteria decision-making problems with interval-valued neutrosophic sets","volume":"27","author":"Zhang","year":"2016","journal-title":"Neural Comput. Appl."},{"issue":"2","key":"10.1016\/j.knosys.2017.09.027_bib0058","first-page":"13","article-title":"A multi attribute decision making method based on inclusion measure for interval neutrosophic sets","volume":"2","author":"\u015eahin","year":"2015","journal-title":"Int. J. Eng. Appl. Sci."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0059","first-page":"133","article-title":"Trusted cloud service","volume":"38","author":"Ding","year":"2015","journal-title":"Chin. J. Comput."},{"issue":"1","key":"10.1016\/j.knosys.2017.09.027_bib0060","first-page":"67","article-title":"Possibility degree method for ranking interval numbers and its application","volume":"18","author":"Xu","year":"2003","journal-title":"J. Syst. Eng."},{"issue":"4","key":"10.1016\/j.knosys.2017.09.027_bib0061","first-page":"311","article-title":"Algorithm for priority of fuzzy complementary judgement matrix","volume":"16","author":"Xu","year":"2001","journal-title":"J. Syst. Eng."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0062","first-page":"15","article-title":"Membership clouds and membership cloud generators","volume":"32","author":"Li","year":"1995","journal-title":"J. Comput. Res. Dev."},{"key":"10.1016\/j.knosys.2017.09.027_bib0063","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.ins.2014.04.051","article-title":"Generic normal cloud model","volume":"280","author":"Wang","year":"2014","journal-title":"Inf. Sci."},{"issue":"6","key":"10.1016\/j.knosys.2017.09.027_bib0064","first-page":"58","article-title":"Collective intelligence and uncertain knowledge representation in cloud computing","volume":"27","author":"Liu","year":"2011","journal-title":"Chin. Commun."},{"issue":"4","key":"10.1016\/j.knosys.2017.09.027_bib0065","doi-asserted-by":"crossref","first-page":"521","DOI":"10.1142\/S0218488515500233","article-title":"Enhancing recommender diversity using gaussian cloud transformation","volume":"23","author":"Chen","year":"2015","journal-title":"Int. J. Uncertain. Fuzziness Knowl. Based Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0067","series-title":"Proceedings of the IEEE Twenty-Second International Symposium on Software Reliability Engineering (ISSRE)","first-page":"210","article-title":"WSPred: a time-aware personalized QoS prediction framework for web services","author":"Zhang","year":"2011"},{"issue":"3","key":"10.1016\/j.knosys.2017.09.027_bib0068","doi-asserted-by":"crossref","first-page":"275","DOI":"10.1016\/j.future.2016.10.012","article-title":"Multi-valued collaborative QoS prediction for cloud service via time series analysis","volume":"68","author":"Ma","year":"2017","journal-title":"Futur. Gen. Comput. Syst."},{"key":"10.1016\/j.knosys.2017.09.027_bib0070","series-title":"Proceedings of the Thirty-First Annual International ACM SIGIR Conference on Research and Development in Information Retrieval","first-page":"587","article-title":"A new rank correlation coefficient for information retrieval","author":"Yilmaz","year":"2008"}],"container-title":["Knowledge-Based Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705117304471?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0950705117304471?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2020,10,18]],"date-time":"2020-10-18T10:41:08Z","timestamp":1603017668000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0950705117304471"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":66,"alternative-id":["S0950705117304471"],"URL":"https:\/\/doi.org\/10.1016\/j.knosys.2017.09.027","relation":{},"ISSN":["0950-7051"],"issn-type":[{"value":"0950-7051","type":"print"}],"subject":[],"published":{"date-parts":[[2017,12]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Time-aware trustworthiness ranking prediction for cloud services using interval neutrosophic set and ELECTRE","name":"articletitle","label":"Article Title"},{"value":"Knowledge-Based Systems","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.knosys.2017.09.027","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2017 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}]}}