1. [1] Z. Su et al., "Reliable and resilient trust management in distributed service provision networks," dl.acm.org, vol. 9, no. 3, Jun. 2015, doi: 10.1145/2754934. [
DOI:10.1145/2754934]
2. [2] D. Chen, F. Lai, and Z. Lin, "A trust model for online peer-to-peer lending: a lender's perspective," Information Technology and Management, vol. 15, no. 4, pp. 239-254, Dec. 2014, doi: 10.1007/S10799-014-0187-Z. [
DOI:10.1007/s10799-014-0187-z]
3. [3] M. Tang, X. Dai, J. Liu, and J. Chen, "Towards a trust evaluation middleware for cloud service selection," Future Generation Computer Systems, vol. 74, pp. 302-312, Sep. 2017, doi: 10.1016/J.FUTURE.2016.01.009. [
DOI:10.1016/j.future.2016.01.009]
4. [4] B. Lahno, "Trust. The Tacit Demand," Ethical Theory and Moral Practice, vol. 2, no. 4. Springer, pp. 433-435, 1999. [
DOI:10.1023/A:1009935315332]
5. [5] M. Ryan, "In AI We Trust: Ethics, Artificial Intelligence, and Reliability," Sci Eng Ethics, vol. 26, no. 5, pp. 2749-2767, Oct. 2020, doi: 10.1007/S11948-020-00228-Y/TABLES/1. [
DOI:10.1007/s11948-020-00228-y] [
PMID] [
]
6. [6] J.-H. Cho, K. Chan, and S. Adali, "A survey on trust modeling," ACM Computing Surveys (CSUR), vol. 48, 2015. [
DOI:10.1145/2815595]
7. [7] D. M. Messick and R. M. Kramer, "Trust as a form of shallow morality.," 2001.
8. [8] Y. Yamamoto, "A morality based on trust: Some reflections on Japanese morality," Philos East West, vol. 40, no. 4, pp. 451-469, 1990. [
DOI:10.2307/1399351]
9. [9] L. Floridi, "Information ethics, its nature and scope," ACM SIGCAS Computers and Society, vol. 36, no. 3, 2006. [
DOI:10.1145/1195716.1195719]
10. [10] L. Floridi, The ethics of information. 2013. Accessed: Jun. 21, 2022. [Online]. Available: https://books.google.com/books?hl=en&lr=&id=_XHcAAAAQBAJ&oi=fnd&pg=PP1&dq=The+ethics+of+information&ots=fZkH8VOxSZ&sig=QhCILoi1OTYVGbnRvifDNM5lwHY
11. [11] L. Floridi and J. W. Sanders, "Entropy as evil in information ethics," Etica & Politica, Special Issue on Computer Ethics, vol. 1, no. 2, 1999.
12. [12] D. De Siqueira Braga, M. Niemann, B. Hellingrath, and F. B. De Lima Neto, "Survey on computational trust and reputation models," ACM Comput Surv, vol. 51, no. 5, Aug. 2018, doi: 10.1145/3236008. [
DOI:10.1145/3236008]
13. [13] J. Wang et al., "A survey on trust evaluation based on machine learning," dl.acm.org, vol. 53, no. 5, Sep. 2020, doi: 10.1145/3408292. [
DOI:10.1145/3408292]
14. [14] A. J. Bidgoly and B. T. Ladani, "Modeling and quantitative verification of trust systems against malicious attackers," Comput J, vol. 59, no. 7, pp. 1005-1027, 2016. [
DOI:10.1093/comjnl/bxv108]
15. [15] F. Dini and G. Spagnolo, "Buying reputation on eBay: Do recent changes help?," International Journal of Electronic Business, vol. 7, no. 6, pp. 581-598, 2009. [
DOI:10.1504/IJEB.2009.029048]
16. [16] A. Jøsang and J. Golbeck, "Challenges for robust trust and reputation systems," in Proceedings of the 5th International Workshop on Security and Trust Management (SMT 2009), Saint Malo, France, 2009, vol. 5, no. 9.
17. [17] R. Kerr and R. Cohen, "Smart cheaters do prosper: defeating trust and reputation systems," in Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2, 2009, pp. 993-1000.
18. [18] K. Arshad and K. Moessner, "Robust collaborative spectrum sensing based on beta reputation system," in 2011 Future Network & Mobile Summit, 2011, pp. 1-8.
19. [19] M. Momani, K. Aboura, and S. Challa, "RBATMWSN: recursive Bayesian approach to trust management in wireless sensor networks," in 2007 3rd International Conference on Intelligent Sensors, Sensor Networks and Information, 2007, pp. 347-352. [
DOI:10.1109/ISSNIP.2007.4496868]
20. [20] P. Shi and H. Chen, "RASN: Resist on-off attack for wireless sensor networks," in Proceedings of the 2012 international conference on computer application and system modeling, 2012, pp. 690-693. [
DOI:10.2991/iccasm.2012.175]
21. [21] D. Wang, T. Muller, Y. Liu, and J. Zhang, "Towards robust and effective trust management for security: A survey," in 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, 2014. [
DOI:10.1109/TrustCom.2014.65]
22. [22] O. A. Wahab, J. Bentahar, H. Otrok, and A. Mourad, "A survey on trust and reputation models for Web services: Single, composite, and communities," Decis Support Syst, vol. 74, pp. 121-134, 2015. [
DOI:10.1016/j.dss.2015.04.009]
23. [23] N. Kandhoul, S. K. Dhurandher, and I. Woungang, "T_CAFE: a trust based security approach for opportunistic IoT," IET Communications, vol. 13, no. 20, 2019. [
DOI:10.1049/iet-com.2019.0657]
24. [24] S. Sicari, A. Rizzardi, L. A. Grieco, and A. Coen-Porisini, "Security, privacy and trust in Internet of Things: The road ahead," Computer networks, vol. 76, pp. 146-164, 2015. [
DOI:10.1016/j.comnet.2014.11.008]
25. [25] X. Wang, L. Liu, and J. Su, "RLM: A general model for trust representation and aggregation," IEEE Trans Serv Comput, vol. 5, no. 1, pp. 131-143, 2010. [
DOI:10.1109/TSC.2010.56]
26. [26] F. Ahmad, F. Kurugollu, A. Adnane, R. Hussain, and F. Hussain, "MARINE: Man-in-the-middle attack resistant trust model in connected vehicles," IEEE Internet Things J, vol. 7, no. 4, pp. 3310-3322, 2020. [
DOI:10.1109/JIOT.2020.2967568]
27. [27] A. Vasudeva and M. Sood, "Survey on sybil attack defense mechanisms in wireless ad hoc networks," Journal of Network and Computer Applications, vol. 120, pp. 78-118, 2018. [
DOI:10.1016/j.jnca.2018.07.006]
28. [28] Y. Ruan and A. Durresi, "A survey of trust management systems for online social communities-trust modeling, trust inference and attacks," Knowl Based Syst, vol. 106, 2016. [
DOI:10.1016/j.knosys.2016.05.042]
29. [29] B. Khosravifar, J. Bentahar, M. Gomrokchi, and R. Alam, "CRM: An efficient trust and reputation model for agent computing," Knowl Based Syst, vol. 30, pp. 1-16, 2012. [
DOI:10.1016/j.knosys.2011.01.004]
30. [30] B. Sun and D. Li, "A comprehensive trust-aware routing protocol with multi-attributes for WSNs," IEEE Access, vol. 6, pp. 4725-4741, 2017. [
DOI:10.1109/ACCESS.2017.2786944]
31. [31] K. Hoffman, D. Zage, and C. Nita-Rotaru, "A survey of attack and defense techniques for reputation systems," ACM Computing Surveys (CSUR), vol. 42, no. 1, pp. 1-31, 2009. [
DOI:10.1145/1592451.1592452]
32. [32] S. Vavilis, M. Petković, and N. Zannone, "A reference model for reputation systems," Decis Support Syst, vol. 61, pp. 147-154, 2014. [
DOI:10.1016/j.dss.2014.02.002]
33. [33] F. G. Mármol and G. M. Pérez, "Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems," Comput Stand Interfaces, vol. 32, no. 4, pp. 185-196, 2010. [
DOI:10.1016/j.csi.2010.01.003]
34. [34] Z. Noorian and M. Ulieru, "The state of the art in trust and reputation systems: a framework for comparison," Journal of theoretical and applied electronic commerce research, vol. 5, no. 2, pp. 97-117, 2010. [
DOI:10.4067/S0718-18762010000200007]
35. [35] D. D. S. Braga, M. Niemann, B. Hellingrath, and F. B. D. L. Neto, "Survey on computational trust and reputation models," ACM Computing Surveys (CSUR), vol. 51, no. 2018. [
DOI:10.1145/3236008]
36. [36] S. Chen, Y. Zhang, P. Liu, and J. Feng, "Coping with traitor attacks in reputation models for wireless sensor networks," in 2010 IEEE Global Telecommunications Conference GLOBECOM 2010, 2010, pp. 1-6. [
DOI:10.1109/GLOCOM.2010.5684005]
37. [37] L. F. Perrone and S. C. Nelson, "A study of on-off attack models for wireless ad hoc networks," in 2006 1st Workshop on Operator-Assisted (Wireless Mesh) Community Networks, 2006, pp. 1-10. [
DOI:10.1109/WOACN.2006.337180]
38. [38] D. Wang, T. Muller, J. Zhang, and Y. Liu, "Quantifying robustness of trust systems against collusive unfair rating attacks using information theory," in 24th International Joint Conference on Artificial Intelligence, 2015.
39. [39] D. Wang, T. Muller, A. A. Irissappane, J. Zhang, and Y. Liu, "Using Information Theory to Improve the Robustness of Trust Systems.," in AAMAS, 2015, pp. 791-799.
40. [40] J.-H. Cho, A. Swami, and R. Chen, "Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks," Journal of Network and Computer Applications, vol. 35, no. 3, pp. 1001-1012, 2012. [
DOI:10.1016/j.jnca.2011.03.016]
41. [41] A. Aldini, "Formal approach to design and automatic verification of cooperation-based networks," IARIA Int J Adv Internet Technol, vol. 6, no. 1, p. 2, 2013.
42. [42] T. Muller, "Semantics of trust," in International Workshop on Formal Aspects in Security and Trust, 2010. [
DOI:10.1007/978-3-642-19751-2_10]
43. [43] A. Herbon, and D. Tsadikovich. "An efficient entropy-based stopping rule for mitigating risk factors in supply nets." International Journal of Production Economics ,2023. [
DOI:10.1016/j.ijpe.2023.108837]
44. [44] A. Khoshkbarchi and H. R. Shahriari, "Improving Agents Trust in Service-Oriented Environment Based on Entropy Structure and Information Ethics Principles," Int J Hum Comput Interact, 2022. [
DOI:10.1080/10447318.2022.2115639]
45. [45] L. Floridi, The ethics of information. 2013. Accessed: Jun. 15, 2022. [
DOI:10.1093/acprof:oso/9780199641321.001.0001]
46. [46] Floridi, L., & Sanders, J. W. (1999). "Entropy as evil" - Google Scholar.
47. https://scholar.google.com/scholar?hl=en&as_sdt=0%2C5&q=Floridi%2C+L.%2C+%26+Sanders%2C+J.+W.+%281999%29.+Entropy+as+evil+in+information+ethics.+Etica+%26+Politica%2C+Special+Issue+on+Computer+Ethics%2C+1%282%29.&btnG= (accessed Jun. 15, 2022).
48. [47] P. Resnick and R. Zeckhauser, "Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system," in The Economics of the Internet and E-commerce, Emerald Group Publishing Limited, 2002.
49. [48] K. RahimiZadeh, and P. Kabiri. "Trust‐based routing method using a mobility‐based clustering approach in mobile ad hoc networks." Security and Communication Networks 7, no. 11, 2014. [
DOI:10.1002/sec.872]
50. [49] A. Khoshkbarchi, and H.R. Shahriari. "Coping with unfair ratings in reputation systems based on learning approach." Enterprise Information Systems 11, no. 10 (2017): 1481-1499. [
DOI:10.1080/17517575.2016.1221999]