{"id":"https://openalex.org/W2038756717","doi":"https://doi.org/10.1145/1815396.1815543","title":"PROTECT","display_name":"PROTECT","publication_year":2010,"publication_date":"2010-06-28","ids":{"openalex":"https://openalex.org/W2038756717","doi":"https://doi.org/10.1145/1815396.1815543","mag":"2038756717"},"language":"en","primary_location":{"id":"doi:10.1145/1815396.1815543","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1815396.1815543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Wireless Communications and Mobile Computing Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5110337806","display_name":"Udayan Kumar","orcid":null},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Udayan Kumar","raw_affiliation_strings":["University of Florida","[University of Florida]"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"[University of Florida]","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5109581864","display_name":"Gautam Thakur","orcid":"https://orcid.org/0009-0001-0941-9444"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Gautam Thakur","raw_affiliation_strings":["University of Florida","[University of Florida]"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"[University of Florida]","institution_ids":["https://openalex.org/I33213144"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5048781653","display_name":"Ahmed Helmy","orcid":"https://orcid.org/0000-0003-1878-3536"},"institutions":[{"id":"https://openalex.org/I33213144","display_name":"University of Florida","ror":"https://ror.org/02y3ad647","country_code":"US","type":"education","lineage":["https://openalex.org/I33213144"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ahmed Helmy","raw_affiliation_strings":["University of Florida","[University of Florida]"],"affiliations":[{"raw_affiliation_string":"University of Florida","institution_ids":["https://openalex.org/I33213144"]},{"raw_affiliation_string":"[University of Florida]","institution_ids":["https://openalex.org/I33213144"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5110337806"],"corresponding_institution_ids":["https://openalex.org/I33213144"],"apc_list":null,"apc_paid":null,"fwci":6.6945,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.97014114,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"636","last_page":"645"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9973000288009644,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/selfishness","display_name":"Selfishness","score":0.9273277521133423},{"id":"https://openalex.org/keywords/undo","display_name":"Undo","score":0.8336489200592041},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7503793239593506},{"id":"https://openalex.org/keywords/mobile-ad-hoc-network","display_name":"Mobile ad hoc network","score":0.5383058786392212},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.516579270362854},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.500068187713623},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.453292578458786},{"id":"https://openalex.org/keywords/wireless-ad-hoc-network","display_name":"Wireless ad hoc network","score":0.45170724391937256},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.43789252638816833},{"id":"https://openalex.org/keywords/wireless-network","display_name":"Wireless network","score":0.43343034386634827},{"id":"https://openalex.org/keywords/routing","display_name":"Routing (electronic design automation)","score":0.4255460202693939},{"id":"https://openalex.org/keywords/mobile-computing","display_name":"Mobile computing","score":0.4120885729789734},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.4093628227710724},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.22411367297172546},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.16091367602348328},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.1060018241405487}],"concepts":[{"id":"https://openalex.org/C2778841147","wikidata":"https://www.wikidata.org/wiki/Q36381317","display_name":"Selfishness","level":2,"score":0.9273277521133423},{"id":"https://openalex.org/C2780154230","wikidata":"https://www.wikidata.org/wiki/Q513420","display_name":"Undo","level":2,"score":0.8336489200592041},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7503793239593506},{"id":"https://openalex.org/C91280400","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Mobile ad hoc network","level":3,"score":0.5383058786392212},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.516579270362854},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.500068187713623},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.453292578458786},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.45170724391937256},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.43789252638816833},{"id":"https://openalex.org/C108037233","wikidata":"https://www.wikidata.org/wiki/Q11375","display_name":"Wireless network","level":3,"score":0.43343034386634827},{"id":"https://openalex.org/C74172769","wikidata":"https://www.wikidata.org/wiki/Q1446839","display_name":"Routing (electronic design automation)","level":2,"score":0.4255460202693939},{"id":"https://openalex.org/C144543869","wikidata":"https://www.wikidata.org/wiki/Q2738570","display_name":"Mobile computing","level":2,"score":0.4120885729789734},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.4093628227710724},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.22411367297172546},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.16091367602348328},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.1060018241405487},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1815396.1815543","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1815396.1815543","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 6th International Wireless Communications and Mobile Computing Conference","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W1504320512","https://openalex.org/W1572481965","https://openalex.org/W1589370926","https://openalex.org/W1898447907","https://openalex.org/W1983711973","https://openalex.org/W1989259681","https://openalex.org/W1994499921","https://openalex.org/W2016143606","https://openalex.org/W2036110521","https://openalex.org/W2043564810","https://openalex.org/W2076169797","https://openalex.org/W2102091680","https://openalex.org/W2112876030","https://openalex.org/W2116682091","https://openalex.org/W2122426592","https://openalex.org/W2127699957","https://openalex.org/W2130354913","https://openalex.org/W2139223971","https://openalex.org/W2145060596","https://openalex.org/W2147151528","https://openalex.org/W2158503154","https://openalex.org/W2160015516","https://openalex.org/W2162862273","https://openalex.org/W2172279320","https://openalex.org/W2588354321","https://openalex.org/W2589889346","https://openalex.org/W6661190728","https://openalex.org/W6680983478"],"related_works":["https://openalex.org/W2285004036","https://openalex.org/W3035283282","https://openalex.org/W2768875466","https://openalex.org/W1591014886","https://openalex.org/W2551975114","https://openalex.org/W2025838880","https://openalex.org/W2123281165","https://openalex.org/W1511473871","https://openalex.org/W4210799434","https://openalex.org/W1581687089"],"abstract_inverted_index":{"Many":[0],"interactions":[1],"between":[2],"network":[3,213],"users":[4,167],"rely":[5],"on":[6,201],"trust,":[7],"which":[8],"is":[9],"becoming":[10],"particularly":[11],"important":[12],"given":[13],"the":[14,18,27,38,117,120,128,146,175,197,202,209],"security":[15],"breaches":[16],"in":[17,29,45,59,62,124,133,153,204,211],"Internet":[19],"today.":[20],"These":[21],"problems":[22],"are":[23,83,115,151,181],"further":[24],"exacerbated":[25],"by":[26,178],"dynamics":[28],"wireless":[30],"mobile":[31,46,60,125,134],"networks.":[32],"In":[33,184],"this":[34],"paper":[35],"we":[36],"address":[37],"issue":[39],"of":[40,102,112,155,166,171,199],"trust":[41,80,138,149,188,193],"advisory":[42],"and":[43,74,92,96,127,139,174,189],"establishment":[44],"networks,":[47,53],"with":[48,157,214],"application":[49],"to":[50,70,163],"ad":[51],"hoc":[52],"including":[54,86],"DTNs.":[55],"We":[56,142],"utilize":[57],"encounters":[58],"societies":[61],"novel":[63],"ways,":[64],"noticing":[65],"that":[66,144],"mobility":[67],"provides":[68],"opportunities":[69],"build":[71],"proximity,":[72],"location":[73],"similarity":[75],"based":[76],"trust.":[77],"Four":[78],"new":[79],"advisor":[81],"filters":[82,150,160,180,194],"introduced":[84],"-":[85,95],"encounter":[87,122],"frequency,":[88],"duration,":[89],"behavior":[90,93],"vectors":[91],"matrices":[94],"evaluated":[97],"over":[98,168],"an":[99],"extensive":[100],"set":[101],"real-world":[103],"traces":[104],"collected":[105],"from":[106],"a":[107,169,205,212],"major":[108],"university.":[109],"Two":[110],"sets":[111],"statistical":[113],"analyses":[114],"performed;":[116],"first":[118],"examines":[119],"underlying":[121],"relationships":[123],"societies,":[126],"second":[129],"evaluates":[130],"DTN":[131],"routing":[132],"peer-to-peer":[135],"networks":[136],"using":[137],"selfishness":[140,190,200],"models.":[141],"find":[143],"for":[145,187],"analyzed":[147],"trace,":[148],"stable":[152],"terms":[154],"growth":[156],"time":[158],"(3":[159],"have":[161],"close":[162],"90%":[164],"overlap":[165],"period":[170],"9":[172],"weeks)":[173],"results":[176],"produced":[177],"different":[179],"noticeably":[182],"different.":[183],"our":[185,192],"analysis":[186],"model,":[191],"largely":[195],"undo":[196],"effect":[198],"unreachability":[203],"network.":[206],"Thus":[207],"improving":[208],"connectivity":[210],"selfish":[215],"nodes.":[216]},"counts_by_year":[{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":1},{"year":2013,"cited_by_count":4},{"year":2012,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2016-06-24T00:00:00"}
