{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T00:24:17Z","timestamp":1729643057996,"version":"3.28.0"},"reference-count":31,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,12]]},"DOI":"10.1109\/dsdis.2015.95","type":"proceedings-article","created":{"date-parts":[[2016,2,4]],"date-time":"2016-02-04T21:53:41Z","timestamp":1454622821000},"page":"343-349","source":"Crossref","is-referenced-by-count":5,"title":["Exploring the Role of Structural Similarity in Securing Smart Metering Infrastructure"],"prefix":"10.1109","author":[{"given":"Aminu","family":"Bello","sequence":"first","affiliation":[]},{"given":"William","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Quan","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Ajit","family":"Narayanan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"volume":"1","journal-title":"UCINET 6 0 Version","year":"0","author":"borgatti","key":"ref31"},{"key":"ref30","first-page":"591","article-title":"P2P Recommendation Trust Model","author":"xuan","year":"2008","journal-title":"Intelligent Systems Design and Applications 2008 ISDA '08 Eighth International Conference on"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WOWMOM.2010.5534930"},{"article-title":"Minimum-Energy Mobile Wireless Networks Revisited","year":"2002","author":"li","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2015.05.008"},{"article-title":"Vertex similarity in networks","year":"2005","author":"leicht","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"ref15","first-page":"410","article-title":"oddball: Spotting Anomalies in Weighted Graphs","volume":"6119","author":"akoglu","year":"2010"},{"article-title":"Trust-Based Recommendation Based on Graph Similarity","year":"0","author":"hang","key":"ref16"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2006.11.003"},{"article-title":"Semantic Similarity in a Taxonomy: An Information-Based Measure and its Application to Problems of Ambiguity in Natural Language","year":"2011","author":"resnik","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1136\/bmj.e4483"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199545"},{"key":"ref4","first-page":"1","article-title":"TSRF: A Trust-Aware Secure Routing Framework in Wireless Sensor Networks","volume":"2014","author":"junqi","year":"2014","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"ref27","first-page":"73","article-title":"EVALUATION OF EFFECTIVE PARAMETERS OF ENERGY CONSUMPTION IN WIRELESS SENSOR NETWORKS","volume":"21","author":"ali","year":"2014","journal-title":"International Journal of Computer Research"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"169","DOI":"10.1109\/TCOMM.2012.031912.110179","article-title":"Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection","volume":"9","author":"fenye","year":"2012","journal-title":"IEEE Transactions on Network and Service Management"},{"key":"ref6","first-page":"237","article-title":"Trust Prediction with Propagation and Similarity Regularization","author":"xiaoming","year":"2014","journal-title":"Twenty-Eighth AAAI Conference on Artificial Intelligence"},{"article-title":"QTM: P2P Trust Simulator","year":"0","author":"andrew","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/s90503958"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2507157.2508071"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.10.016"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.02.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.08.012"},{"key":"ref1","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1109\/MCOM.2008.4473092","article-title":"Defense of trust management vulnerabilities in distributed networks","volume":"46","author":"yan","year":"2008","journal-title":"IEEE Communications Magazine"},{"journal-title":"PhD PhD in Computer Science Computer Science University of Stirling","article-title":"Formalising Trust as a Computational Concept","year":"1994","author":"marsh","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/0361-3682(91)90003-W"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jretai.2005.11.002"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICWMC.2010.14"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1038\/sj.embor.7400975"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1038\/35019019"},{"year":"2008","key":"ref25","article-title":"Jaccard coefficient"}],"event":{"name":"2015 IEEE International Conference on Data Science and Data Intensive Systems (DSDIS)","start":{"date-parts":[[2015,12,11]]},"location":"Sydney, Australia","end":{"date-parts":[[2015,12,13]]}},"container-title":["2015 IEEE International Conference on Data Science and Data Intensive Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7395500\/7396460\/07396524.pdf?arnumber=7396524","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,24]],"date-time":"2017-06-24T05:15:09Z","timestamp":1498281309000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7396524\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,12]]},"references-count":31,"URL":"https:\/\/doi.org\/10.1109\/dsdis.2015.95","relation":{},"subject":[],"published":{"date-parts":[[2015,12]]}}}