[1] Chang E, Thomson P, Dillon T, et al. The fuzzy and dynamic nature of trust[C]// International Conference on Trust, Privacy, and Security in Digital Business. Springer-Verlag, 2005: 161-174. [2] Kamvar S D, Schlosser M T, Garcia-Molina H. The eigen trust algorithm for reputation management in p2p networks[C]//Proceedings of the 12th international conference on World Wide Web. ACM, 2003: 640-651. [3] Swamynathan G, Zhao B Y, Almeroth K C, et al. Globally decoupled reputations for large distributed networks[J]. Advances in Multimedia, 2007,(1): 1-14. [4] Das A, Islam M M. SecuredTrust: a dynamic trust computation model for secured communication in multiagent systems[J]. IEEE Transactions on Dependable & Secure Computing, 2012, 9(2): 261-274. [5] Agudo I, Fernandez-Gago C, Lopez J. A scale based trust model for multi-context environments[J]. Computers & Mathematics with Applications, 2010, 60(2): 209-216. [6] 李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,21(1):163-176. [7] Singh S I, Sinha S K. A new trust model based on time series prediction and markov model[C]// Proceedings of the Information and Communication Technologies International Conference, ICT 2010, Communications in Computer and Information Science, 2015: 148-156. [8] Xu H, Liu Y, Qi S, et al. A novel trust model based on probability and statistics for peer to peer networks[C]// International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering, 2013. 2047-2050. [9] Zhao H, Yang X, Li X. An incentive mechanism to reinforce truthful reports in reputation systems[J]. Journal of Network & Computer Applications, 2012, 35(3): 951-961. [10] 秦艳琳,吴晓平,高键鑫.分布式环境下信任路径选择性搜索及聚合研究[J].通信学报,2012(S1):148-156. [11] Singh A, Castro M, Druschel P, et al. Defending against eclipse attacks on overlay networks[C]//Proceedings of the 11th workshop on ACM SIGOPS European workshop. ACM, 2004. 21-21. [12] Van Heerden R P, Irwin B, Burke I. Classifying network attack scenarios using an ontology[C]// International Conference on Information Warfare and Security. 2012. 311-324. [13] Gao S, Ma J, Chen Z, et al. Ranking the spreading ability of nodes in complex networks based on local structure[J]. Physica A Statistical Mechanics & Its Applications, 2014, 403(6): 130-147. [14] Feng N, Li M, Xie J. Research on the optimal allocation of security resources in complex network information systems[J]. Journal of Systems Engineering, 2010, 25(25): 145-151. [15] Tajeddine A, Kayssi A, Chehab A, et al. Fuzzy reputation-based trust model[J]. Applied Soft Computing, 2011, 11(1): 345-355. [16] Wang X, Hu S, Yu Z, et al. The ad-hoc network trustworthiness evaluation model based on the bayesian network[C]// International Conference on Parallel and Distributed Computing, Applications and Technologies, 2012. 281-284. [17] 孙华梅,邹维娜.电子商务环境下基于Multi-Agent的B2B信任评价模型研究[J].运筹与管理,2014,(5):231-236. [18] Jiang L M, Zhang K, Jian X U, et al. Research on trust transitivity and aggregation in evidential trust model[J]. Journal on Communications, 2011, 32(8): 91-100. [19] Wang Y, Viradharajan V. Dynamictrust:the trust development in peer-to-peer environments[C]// IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing. IEEE, 2006: 302-305. [20] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于行为相似度的共谋团体识别模型[J].通信学报,2009,30(8):9-20. [21] 胡玲龙,潘巨龙,崔慧.无线传感器网络中基于信誉的恶意节点检测[J].中国计量学院学报,2012,23(1):41-47. [22] Stoica I, Morris R, Karger D, et al. Chord: A scalable peer-to-peer lookup service for internet applications[C]// Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. ACM, 2001. 149-160. [23] Meirom E A, Milling C, Caramanis C, et al. Localized epidemic detection in networks with overwhelming noise[J]. Acm Sigmetrics Performance Evaluation Review, 2014, 43(1): 441-442. |