[1] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari and M. Ayyash, "Internet of Things: A Survey on Enabling Technologies, Protocols and Applications," IEEE Communications Surveys & Tutorials, vol. 17, no. 4, pp. 2347-2356, 2015.
[2] J.-H. Cho, K. Chan and S. Adali, "A survey on trust modeling," ACM Computing Surveys, vol. 48, no. 2, p. 28, 2015.
[3] J. Guo and I.-R. Chen, "A Classification of Trust Computation Models for Service-Oriented Internet of Things Systems," in IEEE International Conference on Services Computing, 2015.
[4] A. Jøsang, R. Ismail and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[5] I.-R. Chen, J. Guo and F. Bao, "Trust Management for SOA-Based IoT and Its Application to Service Composition," IEEE Transactions on Services Computing, vol. 9, no. 3, pp. 482 - 495, 2016.
[6] Y. Wang, Y.-C. Lu, I.-R. Chen, J.-H. Cho, A. Swami and C.-T. Lu, "LogitTrust: A logit regression-based trust model for mobile ad hoc networks," in 6th ASE International Conference on Privacy, Security, Risk and Trust, 2014.
[7] S. A. Soleymani, A. H. Abdullah, W. H. Hassan, M. H. Anisi, S. Goudarzi, M. A. Rezazadeh Baee and S. Mandala, "Trust management in vehicular ad hoc network: a systematic review," EURASIP Journal on Wireless Communications and Networking , vol. 146, 2015.
[8] X. Yao, X. Zhang, H. Ning and P. Li, "Using trust model to ensure reliable data acquisition in VANETs," Ad Hoc Networks, vol. 55, pp. 107-118, 2017.
[9] H. Al-Hamadi and I.-R. Chen, "Trust-Based Decision Making for Health IoT Systems," IEEE Internet of Things Journal, vol. 4, no. 5, pp. 1408 - 1419, 2017.
[10] W. Li, H. Song and F. Zeng, "Policy-based Secure and Trustworthy Sensing for Internet of Things in Smart Cities," IEEE Internet of Things Journal , vol. PP, no. 99, p. 1, 2017.
[11] U. Jayasinghe, A. Otebolaku and T.-W. Um, "Data centric trust evaluation and prediction framework for IOT," in ITU Kaleidoscope: Challenges for a Data-Driven Society (ITU K), 2017.
[12] R. Böck, S. Glüge and A. Wendemuth, "Dempster-Shafer Theory with Smoothness," in International Symposium on Integrated Uncertainty in Knowledge Modelling and Decision Making, 2013.
[13] Y. Saied, A. Olivereau, D. Zeghlache and M. Laurent, "Trust management system design for the Internet of Things: A context-aware and multi-service approach," Computers & Security, vol. 39, pp. 351-365, 2013.
[14] F. Bao and I.-R. Chen, "Dynamic Trust Management for Internet of Things Applications," in Proceedings of the international workshop on Self-aware internet of things, 2012.
[15] Z. Chen, R. Ling, C. Huang and X. Zhu, "A scheme of access service recommendation for the Social Internet of Things," International Journal of Communication Systems., vol. 29, no. 4, pp. 694-706, 2016.
[16] Bao, Fenye, I.-R. Chen and J. Guo, "Scalable, Adaptive and Survivable Trust Management for Community of Interest Based Internet of Things Systems," in IEEE Autonomous Decentralized Systems, 2013.
[17] D. Chen, G. Chang, D. Sun, J. Li, J. Jia and W. Xingwei, "TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things," omputer Science and Information Systems, vol. 8, no. 4, pp. 1207-1228, 2011.
[18] B. Liu, Z. Xu and J. Chen, "Toward reliable data analysis for Internet of Things by Bayesian dynamic modeling and computation," in IEEE International Conference on Signal and Information Processing, 2015.
[19] Q. Ding, X. Li, M. Jiang and X. Zhou, "Reputation-based trust model in vehicular ad hoc networks," in Wireless Communications and Signal Processing, 2010.
[20] S. Gurung, D. Lin, A. Squicciarini and E. Bertino, "Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks," in International Conference on Network and System Security, 2013.
[21] M. Nitti, R. Girau and L. Atzori, "Trustworthiness Management in the Social Internet of Things," IEEE Transactions on Knowledge and Data Engineering, vol. 26, no. 5, pp. 1253 - 1266, 2014.
[22] R. Talreja, S. Sathish and K. Nenwani, "Trust and behavior based system to prevent collision in IoT enabled VANET," in Signal Processing, Communication, Power and Embedded System, 2016.
[23] G. Shafer, A mathematical theory of evidence, Princeton University Press, 1976.
[24] C. Jiang, Y. Ren, H.-H. Chen and M. Guizani, "Information Sharing in Cooperative Networks: a Generic Trustworthy Issue," in IEEE International Conference on Communications, 2016.
[25] Y. Zheng, S. Rajasegarar and C. Leckie, "Parking Availability Prediction for Sensor-Enabled Car Parks in Smart Cities," in IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing, 2015.
[26] جمیل جنتی، داریوش نظرپور، «مدیریت انرژی پارکینگ هوشمند خودروهای برقی در یک زیرشبکه با در نظر گرفتن اثرات برنامه پاسخگویی بار»، مجله مهندسی برق تبریز، جلد 47، شماره 2، صفحه 455-467، 1396
[27] رحیم بجانی، محمد کلانتری، امیرمسعود افتخاری مقدم، «ارائه چهارچوبی مبتنی بر نظریه بازیها برای جلب مشارکت گرهها در فرآیند شناسایی گرههای مخرب در شبکههای حسگر بی سیم»، مجله مهندسی برق تبریز، جلد 47، شماره 4، صفحه 1329-1342، 1396
[28] L. Gu, J. Wang, and B. Sun, “Trust management mechanism for Internet of things”, China Communications, vol. 11, no. 2, pp. 148-156, 2014
[29] H. Pohls, V. Angelakis, S. Suppan, K. Fischer, “RERUM: building a reliable IoT upon privacy and security enabled smart objects”, IEEE Wireless Communications and Networking Conference Workshops (WCNCW), 2014, pp. 122-127
[30] A. Rezvanian, A.M. Saghiri, S.M. Vahidipour, M.R. Meybodi, “Recent Advances in Learning Automata”, Springer, 2018.