{"id":"https://openalex.org/W1554514629","doi":"https://doi.org/10.1109/cisda.2015.7208633","title":"Ternary trust metric for mobile ad-hoc networks","display_name":"Ternary trust metric for mobile ad-hoc networks","publication_year":2015,"publication_date":"2015-05-01","ids":{"openalex":"https://openalex.org/W1554514629","doi":"https://doi.org/10.1109/cisda.2015.7208633","mag":"1554514629"},"language":"en","primary_location":{"id":"doi:10.1109/cisda.2015.7208633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2015.7208633","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5031607931","display_name":"Gus Anderson","orcid":null},"institutions":[{"id":"https://openalex.org/I183804699","display_name":"Lockheed Martin (Canada)","ror":"https://ror.org/00rs6n938","country_code":"CA","type":"company","lineage":["https://openalex.org/I1287521167","https://openalex.org/I183804699"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Gus Anderson","raw_affiliation_strings":["Lockheed Martin ATL"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin ATL","institution_ids":["https://openalex.org/I183804699"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5113669647","display_name":"David J. Dorsey","orcid":null},"institutions":[{"id":"https://openalex.org/I183804699","display_name":"Lockheed Martin (Canada)","ror":"https://ror.org/00rs6n938","country_code":"CA","type":"company","lineage":["https://openalex.org/I1287521167","https://openalex.org/I183804699"]}],"countries":["CA"],"is_corresponding":false,"raw_author_name":"David J. Dorsey","raw_affiliation_strings":["Lockheed Martin ATL"],"affiliations":[{"raw_affiliation_string":"Lockheed Martin ATL","institution_ids":["https://openalex.org/I183804699"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5031607931"],"corresponding_institution_ids":["https://openalex.org/I183804699"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.03428959,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"97","issue":null,"first_page":"1","last_page":"9"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10080","display_name":"Energy Efficient Wireless Sensor Networks","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7058984637260437},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5886854529380798},{"id":"https://openalex.org/keywords/metric","display_name":"Metric (unit)","score":0.5578504800796509},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5368512272834778},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.5231174826622009},{"id":"https://openalex.org/keywords/node","display_name":"Node (physics)","score":0.5003573894500732},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.4887216091156006},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.4410219192504883},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.38328373432159424},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.21744006872177124},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12407839298248291},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.07087597250938416}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7058984637260437},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5886854529380798},{"id":"https://openalex.org/C176217482","wikidata":"https://www.wikidata.org/wiki/Q860554","display_name":"Metric (unit)","level":2,"score":0.5578504800796509},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5368512272834778},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.5231174826622009},{"id":"https://openalex.org/C62611344","wikidata":"https://www.wikidata.org/wiki/Q1062658","display_name":"Node (physics)","level":2,"score":0.5003573894500732},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.4887216091156006},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.4410219192504883},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.38328373432159424},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.21744006872177124},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12407839298248291},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.07087597250938416},{"id":"https://openalex.org/C66938386","wikidata":"https://www.wikidata.org/wiki/Q633538","display_name":"Structural engineering","level":1,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C21547014","wikidata":"https://www.wikidata.org/wiki/Q1423657","display_name":"Operations management","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cisda.2015.7208633","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cisda.2015.7208633","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"id":"https://metadata.un.org/sdg/16","score":0.6600000262260437,"display_name":"Peace, Justice and strong institutions"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W142763505","https://openalex.org/W1600310449","https://openalex.org/W1994223040","https://openalex.org/W2040128811","https://openalex.org/W2040908139","https://openalex.org/W2049633694","https://openalex.org/W2105264891","https://openalex.org/W2127699957","https://openalex.org/W2130140239","https://openalex.org/W2142175015","https://openalex.org/W2153903530","https://openalex.org/W2315679726","https://openalex.org/W2588193797","https://openalex.org/W3129711340","https://openalex.org/W4248588746","https://openalex.org/W4285719527","https://openalex.org/W6605790161","https://openalex.org/W6635903900","https://openalex.org/W6675633554","https://openalex.org/W6681040864","https://openalex.org/W7061289335"],"related_works":["https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W1511473871","https://openalex.org/W1581687089","https://openalex.org/W2003275014","https://openalex.org/W4210799434","https://openalex.org/W2282175249"],"abstract_inverted_index":{"In":[0,27],"this":[1,33],"paper":[2],"we":[3],"describe":[4],"a":[5,10,37,70],"behavioral":[6],"state":[7],"classifier":[8],"employing":[9],"three-factor":[11],"node":[12,25,52],"reliability":[13,38,71],"measure":[14],"based":[15],"upon":[16],"inferred":[17],"Ability,":[18],"Integrity,":[19],"and":[20,44,84],"Benevolence":[21],"(AIB)":[22],"to":[23,29,61,79,96,99],"assess":[24],"reliability.":[26],"contrast":[28],"typical":[30],"scalar":[31],"measures,":[32],"multi-metric":[34],"index":[35],"creates":[36],"space":[39],"that":[40,69,89],"is":[41],"more":[42],"descriptive":[43],"in":[45,58],"which":[46],"distinctions":[47],"can":[48],"be":[49,76],"drawn":[50],"between":[51,81],"behaviors":[53],"ranging":[54],"from":[55],"small":[56],"deviations":[57],"expected":[59],"performance":[60],"signatures":[62],"of":[63],"hostile":[64],"intent.":[65],"We":[66],"further":[67],"demonstrate":[68],"or":[72,92],"trust":[73],"metric":[74],"should":[75],"informative":[77],"enough":[78],"differentiate":[80],"malicious":[82],"behavior":[83,85],"exhibited":[86],"by":[87],"nodes":[88],"are":[90],"misconfigured":[91],"dropping":[93],"packets":[94],"due":[95],"insufficient":[97],"resources":[98],"service":[100],"messages.":[101]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
