[
1. Chen, D., G. Chang, D. Sun, J. Li, J. Jia, X. Wang. TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things. – Comput. Sci. Inf. Syst., Vol. 8, 2011, No 4, pp. 1207-1228.10.2298/CSIS110303056C
]Search in Google Scholar
[
2. Almogren, Ahmad, et al. FTM-IoMT: Fuzzy-Based Trust Management for Preventing Sybil Attacks in Internet of Medical Things. – IEEE Internet of Things Journal, 2020.10.1109/JIOT.2020.3027440
]Search in Google Scholar
[
3. Zhao, H., X. Li. VectorTrust: Trust Vector Aggregation Scheme for Trust Management in Peer-to-Peer Networks. – The Journal of Supercomputing, Vol. 64, 2013, No 3, pp. 805-829.10.1007/s11227-011-0576-6
]Search in Google Scholar
[
4. Becker, M. Y., P. Sewell. Cassandra: Flexible Trust Management, Applied to Electronic Health Records. – In: Proc. of 17th IEEE Computer Security Foundations Workshop, IEEE, 2004.
]Search in Google Scholar
[
5. Li, Hui-Jia, et al. Exploring the Trust Management Mechanism in Self-Organizing Complex Network Based on Game Theory. – Physica A: Statistical Mechanics and its Applications, Vol. 542, 2020, 123514.10.1016/j.physa.2019.123514
]Search in Google Scholar
[
6. Yan, Z., P. Zhang, A. V. Vasilakos. A Survey on Trust Management for Internet of Things. – Journal of Network and Computer Applications, Vol. 42, 2014, pp. 120-134.10.1016/j.jnca.2014.01.014
]Search in Google Scholar
[
7. Guo, J., R. Chen, J. J. Tsai. A Survey of Trust Computation Models for Service Management in Internet of Things Systems. – Computer Communications, Vol. 97, 2017, pp. 1-14.10.1016/j.comcom.2016.10.012
]Search in Google Scholar
[
8. Chen, R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, Vol. 13, 2015, No 6, pp. 684-696.10.1109/TDSC.2015.2420552
]Search in Google Scholar
[
9. Bernabe, J. B., J. L. H. Ramos, A. F. S. Gomez. TACIoT: Multidimensional Trust-Aware Access Control System for the Internet of Things. – Soft Computing, Vol. 20, 2016, No 5, pp. 1763-1779.10.1007/s00500-015-1705-6
]Search in Google Scholar
[
10. Ben, Y., A. Olivereau, D. Zeghlache, M. Laurent. Trust Management System Design for the Internet of Things : A Context-Aware and Multi-Service Approach. – Comput. Secur., 2013, pp. 1-15.
]Search in Google Scholar
[
11. Alshehri, M. D., F. K. Hussain, O. K. Hussain. – Mobile Netw Appl., Vol. 23, 2018, 419. https://doi.org/10.1007/s11036-018-1017-z10.1007/s11036-018-1017-z
]Search in Google Scholar
[
12. Mahmud, M., M. S. Kaiser, M. M. Rahman, et al. Cogn. Comput., Vol. 10, 2018, 864. https://doi.org/10.1007/s12559-018-9543-310.1007/s12559-018-9543-3
]Search in Google Scholar
[
13. Mohammad, M., A. Khalid, C. Subhash. RBATMWSN: Recursive Bayesian Approach to Trust Management in Wireless Sensor Networks. 2008, pp. 347-352. DOI: 10.1109/ISSNIP.2007.4496868.10.1109/ISSNIP.2007.4496868
]Search in Google Scholar
[
14. Chen, I. R., F. Bao, J. Guo. Trust-Based Service Management for Social Internet of Things Systems. – IEEE Transactions on Dependable and Secure Computing, 2016.10.1109/TDSC.2015.2420552
]Search in Google Scholar
[
15. Nitti, M., R. Girau, L. Atzori. Trustworthiness Management in the Social Internet of Things. – IEEE Transactions on Knowledge and Data Management, Vol. 26, 2014, No 5, pp. 1253-1266.10.1109/TKDE.2013.105
]Search in Google Scholar
[
16. Chen, I. R., et al. Dynamic Trust Management for Delay Tolerant Networks and Its Aapplication to Secure Routing. – IEEE Transactions Parallel and Distributed Systems, Vol. 25, 2014, No 5, pp. 1200-1210.10.1109/TPDS.2013.116
]Search in Google Scholar
[
17. Liu, Yu-Chao, et al. A Method for Trust Management in Cloud Computing: Data Coloring by Cloud Watermarking. – International Journal of Automation and Computing, Vol. 8, 2011, No 3, pp. 280-285.10.1007/s11633-011-0583-3
]Search in Google Scholar
[
18. Chen, I. R., J. Guo, F. Bao. Trust Management for SOA-Based IoT and Its Application to Service Composition. – IEEE Transactions on Service Computing, Vol. 9, 2016, No 3, pp. 482-495.10.1109/TSC.2014.2365797
]Search in Google Scholar
[
19. Freeman, L. C. Centrality on Social Networks. – Social Networks, Vol. 1, 1979, pp. 215-239.10.1016/0378-8733(78)90021-7
]Search in Google Scholar
[
20. Chen, Z., R. Ling, C. M. Huang, X. Zhu. A Scheme of Access Service Recommendation for the Social Internet of Things. – International Journal of Communication Systems, Vol. 29, 2016, No 4, pp. 694-706.10.1002/dac.2930
]Search in Google Scholar
[
21. Noor, T. H., et al. Trust Management of Services in Cloud Environments: Obstacles and Solutions. – ACM Computing Surveys (CSUR), Vol. 46, 2013, No 1, pp. 1-30.10.1145/2522968.2522980
]Search in Google Scholar
[
22. Alshehri, M. D., F. K. Hussain. A Fuzzy Security Protocol for Trust Management in the Internet of Things (Fuzzy-IoT). – Computing, Vol. 101, 2019, pp. 791-818. DOI:10.1007/s00607-018-0685-7.10.1007/s00607-018-0685-7
]Search in Google Scholar
[
23. Javanmardi, S., et al. FRTRUST: A Fuzzy Reputation Based Model for Trust Management in Semantic P2P Grids. – arXiv preprint arXiv:1404.2632, 2014.
]Search in Google Scholar
[
24. Bendiab, K., S. Shiaeles, S. Boucherkha. A New Dynamic Trust Model for “On Cloud” Federated Identity Management. – In: Proc. of 9th IFIP International Conference on New Technologies, Mobility and Security (NTMS’18), Paris, 2018, pp. 1-5.10.1109/NTMS.2018.8328673
]Search in Google Scholar
[
25. Bendiab, K., N. Kolokotronis, S. Shiaeles, S. Boucherkha. WiP: A Novel Blockchain-Based Trust Model for Cloud Identity Management. – In: Proc. of 16th IEEE Intl. Conf. on Dependable, Autonomic and Secure Computing, 16th Int. Conf. on Pervasive Intelligence and Computing, 4th Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech’18), Athens, 2018, pp. 724-729.
]Search in Google Scholar
[
26. Asiri, S., A. Miri. An IoT Trust and Reputation Model Based on Recommender Systems. – In: Proc. of 14th Annual Conference on Privacy, Security and Trust (PST’16), Auckland, 2016, pp. 561-568. DOI: 10.1109/PST.2016.7907017.10.1109/PST.2016.7907017
]Search in Google Scholar
[
27. Singh, A. V., V. Juyal, R. Saggar. Trust Based Intelligent Routing Algorithm for Delay Tolerant Network Using Artificial Neural Network. – Wireless Netw., Vol. 23, 2017, pp. 693-702. DOI:10.1007/s11276-015-1166-y.10.1007/s11276-015-1166-y
]Search in Google Scholar
[
28. Cha, I., et al. Trust in M2M Communication. – IEEE Vehicular Technology Magazine, Vol. 4, 2009, No 3, pp. 69-75.10.1109/MVT.2009.933478
]Search in Google Scholar
[
29. Shala, B., et al. Ensuring Trustworthiness for P2P-Based M2M Applications. – Internet Technologies and Applications (ITA), Wrexham, 2017, pp. 58-63.10.1109/ITECHA.2017.8101911
]Search in Google Scholar
[
30. Zhang, W., et al. Blockchain-Based Federated Learning for Device Failure Detection in Industrial IoT. – IEEE Internet of Things Journal, 2020.
]Search in Google Scholar
[
31. Muhati, E., D. B. Rawat. Hidden Markov Model Enabled Prediction and Visualization of Cyber Agility in IoT Era. – IEEE Internet of Things Journal, 2021.10.1109/JIOT.2021.3056118
]Search in Google Scholar
[
32. Imran, M., et al. PLEDGE: A Proof-of-Honesty Based Consensus Protocol for Blockchain-Based IoT Systems. – In: Proc. of 2020 IEEE International Conference on Blockchain and Cryptocurrency (ICBC), IEEE, 2020.
]Search in Google Scholar
[
33. Siby, S., R. R. Maiti, N. O. Tippenhauer. Iotscanner: Detecting Privacy Threats in Iot Neighborhoods. – In: Proc. of 3rd ACM International Workshop on IoT Privacy, Trust, and Security, 2017.
]Search in Google Scholar
[
34. Chen, Z., L. Tian, C. Lin. Trust Model of Wireless Sensor Networks and Its Application in Data Fusion. – Sensors, Vol. 17, 2017. 10.3390/s17040703.10.3390/s17040703542166328350347
]Search in Google Scholar
[
35. Maad, M. Artificial Neural Networks Advantages and Disadvantages. Bagdad College of Economic Science University, 2018.
]Search in Google Scholar