{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T23:40:01Z","timestamp":1742082001713,"version":"3.38.0"},"reference-count":18,"publisher":"Elsevier BV","issue":"3","license":[{"start":{"date-parts":[[2012,5,1]],"date-time":"2012-05-01T00:00:00Z","timestamp":1335830400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computers &amp; Electrical Engineering"],"published-print":{"date-parts":[[2012,5]]},"DOI":"10.1016\/j.compeleceng.2011.11.018","type":"journal-article","created":{"date-parts":[[2011,12,16]],"date-time":"2011-12-16T03:33:48Z","timestamp":1324006428000},"page":"551-562","source":"Crossref","is-referenced-by-count":7,"title":["Towards reliable self-clustering Mobile Ad Hoc Networks"],"prefix":"10.1016","volume":"38","author":[{"given":"Wei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Guosun","family":"Zeng","sequence":"additional","affiliation":[]},{"given":"Jing","family":"Yao","sequence":"additional","affiliation":[]},{"given":"Hanli","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Daizhong","family":"Tang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.compeleceng.2011.11.018_b0005","doi-asserted-by":"crossref","unstructured":"Hu YC, Perrig A, Johnson DB. Ariadne: A secure on-demand routing protocol for Ad hoc networks. In: International Conference on Mobile Computing and Networking. Atlanta, USA; 2002, 12\u201323.","DOI":"10.1145\/570646.570648"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0010","unstructured":"Papadimitratos P, Haas ZJ. Secure routing for mobile Ad hoc networks. In: SCS Communication Networks and Distributed Systems Modeling and Simulation Conference (CNDS 2002), San Antonio, TX, USA, January 27-31; 2002. 193\u2013204."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0015","unstructured":"Bansal S, Baker M. Observation-based cooperation enforcement in Ad hoc networks. Technical Report. Stanford University; 2003."},{"issue":"3","key":"10.1016\/j.compeleceng.2011.11.018_b0020","first-page":"456","article-title":"Trusted dynamic level scheduling based on bayesian trust model, science in china: series F information","volume":"50","author":"Wang","year":"2007","journal-title":"Sciences"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0025","unstructured":"Liu Z, Joy AW, Thompson RA. A dynamic trust model for mobile Ad hoc networks. In: 10th IEEE international workshop on future trends of distributed computing systems (FTDCS 2004), Suzhou, China; 2004. p. 80\u20135."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0030","doi-asserted-by":"crossref","unstructured":"Pirzada AA, Datta A, McDonald C. Propagating trust in Ad-hoc networks for reliable routing. In: IEEE international workshop on wireless ad-hoc networks, Oulu, Finland; 2004. p. 58\u201362.","DOI":"10.1109\/IWWAN.2004.1525541"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0035","doi-asserted-by":"crossref","unstructured":"Jiang T, Baras JS, Ant-based adaptive trust evidence distribution in MANET. In: 24th international conference on distributed computing systems workshops (ICDCSW 2004), Tokyo, Japan; 2004. p. 588\u201393.","DOI":"10.1109\/ICDCSW.2004.1284092"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0040","unstructured":"Johnson DB, Maltz DA, Broch J. DSR: The dynamic source routing protocol for multihop wireless Ad hoc networks. In: Perkins CE, editor, Ad hoc networking. Boston, USA: Addison-Wesley Longman Publishing Co., Inc.; 2001. p. 139\u201372."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0045","unstructured":"Kermarrec A, Self-clustering in node-to-node overlays. In: International workshop on self\u2217 properties in complex information systems, Bertinoro, Italy, February 2004."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0050","unstructured":"Sripanidkulchai K, Maggs B, Zhang H, Efficient content location using interest-based locality in node-to-node systems, In: INFOCOM conference; 2003."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0055","doi-asserted-by":"crossref","unstructured":"Perkins, CE, Royer, EM, Das, SR. Performance comparison of two on-demand routing protocols for Ad hoc networks. IEEE Personal Communications, 2001; 8(1): 16\u201328.","DOI":"10.1109\/98.904895"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0060","doi-asserted-by":"crossref","unstructured":"Kleinberg J. Navigation in a small world. Nature 2000;406:845.","DOI":"10.1038\/35022643"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0065","doi-asserted-by":"crossref","unstructured":"Kumar R, Raghavan P, Rajagopalan S. Trawling the web for emerging cyber-communities, In: 8th WWW conference; 1999. p. 1481\u201393.","DOI":"10.1016\/S1389-1286(99)00040-7"},{"issue":"3","key":"10.1016\/j.compeleceng.2011.11.018_b0070","first-page":"494","article-title":"Bayesian cognitive trust model based self-clustering algorithm for manets, science in china: series F information","volume":"53","author":"Wang","year":"2010","journal-title":"Sciences"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0075","doi-asserted-by":"crossref","unstructured":"Ford J, Fulkerson DR. Maximal flow through a network. Canadian J Math 1956;8:399\u2013404.","DOI":"10.4153\/CJM-1956-045-5"},{"year":"1999","series-title":"Bayesian methods: an analysis for statisticians and interdisciplinary","author":"Thomas","key":"10.1016\/j.compeleceng.2011.11.018_b0080"},{"key":"10.1016\/j.compeleceng.2011.11.018_b0085","unstructured":"J\u00f8sang A, Ismail R, The Beta Reputation System. In: Proceedings of the 15th bled conference on electronic commerce, Bled, Slovenia; 2002. p. 324\u201337."},{"key":"10.1016\/j.compeleceng.2011.11.018_b0090","unstructured":"Jain R, The art of computer systems performance analysis: techniques for experimental design, measurement, simulation, and modeling, Wiley Computer Publishing, John Wiley & Sons, Inc.; 2005."}],"container-title":["Computers &amp; Electrical Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790611001947?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0045790611001947?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,3,15]],"date-time":"2025-03-15T23:02:45Z","timestamp":1742079765000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0045790611001947"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,5]]},"references-count":18,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012,5]]}},"alternative-id":["S0045790611001947"],"URL":"https:\/\/doi.org\/10.1016\/j.compeleceng.2011.11.018","relation":{},"ISSN":["0045-7906"],"issn-type":[{"type":"print","value":"0045-7906"}],"subject":[],"published":{"date-parts":[[2012,5]]}}}