[1] 臧天宁,云晓春,张永铮,等.网络设备协同联动模型[J].计算机学报,2011,34(2): 216-228.
ZANG Tianning,YUN Xiaochun,ZHANG Yongzheng,et al. A model of network device coordinative run [J].Chinese Journal of Computers,2011,34(2):216-228.
[2] 刘旭勇.基于协同的网络安全防御系统研究[J].计算技术与自动化,2012,31(2): 142-144.
LIU Xuyong. Network security defense system research based on the collaborative [J]. Computing Technology and Automation,2012,8(2):142-144.
[3] CZIRKOS Z,RENCZ M,HOSSZU′ G. A distributed hash table assisted intrusion prevention system [J]. International Journal On Advances in Security,2012, 5(3/4):134-143.
[4] BERGER A,CESAREO J,DALCONZO A.Collaborative network defense with minimum disclosure [C]∥ Proceedings of IEEE Conference on Global Telecommunications,Piscataway:IEEE, 2011:16.
[5] HUANG N F,WANG C,LIAO I J,et al. An OpenFlowbased collaborative intrusion prevention system for cloud networking [C]∥ Proceedings of the 7th IEEE International Conference on Communication Software and Networks (ICCSN), New Jersey: IEEE, 2015: 85-92.
[6] KOTENKO I,KONOVALOV A,SHOROV A. Agentbased simulation of cooperative defense against botnets [J].Concurrency Computation Practice and Experience,2012,24(6):573588.
[7] KOTENKO I,ULANOV A. Agentbased simulation of DDOS attacks and defense mechanisms [J]. International Journal of Computing,2014, 4(2): 113-123.
[8] FUNG C J,ZHANG J,AIB I,et al. Dirichletbased trust management for effective collaborative intrusion detection networks [J]. IEEE Transactions on Network and Service Management,2011,8(2): 79-91.
[9] PINYOL I,SABATERMIR J. Computational trust and reputation models for open multiagent systems: a review [J]. Artificial Intelligence Review,2013,40(1): 125.
[10] ALJAZZAF Z M,CAPRETZ M A M,Perry M.Trust bootstrapping services and service providers [C]∥Proceedings of the 9th IEEE International Conference on Privacy,Security and Trust. Piscataway: IEEE,2011: 7-15.
[11] 石志国,贺也平,张宏.一种对等计算安全性的时间自衰减信任管理算法[J].计算机研究与发展, 2007,44(1): 110.
SHI Zhiguo,HE Yeping, ZHANG Hong. A time selfdecay trust management algorithm for P2P computing security [J]. Computer Research and Development,2007,44(1): 110.
[12] RUOHOMAA S,KUTVONEN L. Trust management survey [C]∥ Proceedings of the 3rd International Conference on iTrust. Berlin: Springer,2005: 77-92.
[13] LIU J, ISSARNY V. Enhanced reputation mechanism for mobile ad hoc networks [M]. Berlin Heidelberg:Springer,2004: 48-62.
[14] 王刚,桂小林.社会网络中交易节点的选取及其信任关系计算方法[J].计算机学报,2013,36(2): 368-383.
WANG Gang, GUI Xiaolin. Selecting and trust computing for transaction nodes in online social networks [J]. Chinese Journal of Computers,2013,36(2): 368383.
[15] 彭冬生,林闯,刘卫东.一种直接评价节点诚信度的分布式信任机制[J].软件学报,2008,19(4): 946-955.
PENG Dongsheng, LIN Chuang, LIU Weidong. A distributed trust mechanism directly evaluating reputation of nodes [J]. Journal of Software,2008,19(4): 946-955.
[16] 金瑜,古志民,班志杰.一种新的P2P系统中基于双ratings的声誉管理机制[J].计算机研究与发展,2008,45(6): 942-950.
JIN Yu, GU Zhimin, BAN Zhijie. A new reputation management mechanism based on biratings in P2P systems [J]. Journal of Computer Research and Development,2008,45(6): 942-950.
[17] FELDMAN M,CHUANG J. The evolution of cooperation under cheap pseudonyms [C]∥Proceedings of 7th International Conference on ECommerce Technology,Piscataway: IEEE,2005: 284-291.
[18] 林剑柠,吴慧中.基于主观逻辑理论的网格信任模型分析[J].计算机研究与发展,2007,44(8): 1365-1370.
LIN Jianning,WU Huizhong. Research on a trust model based on the subjective logic theory [J]. Journal of Computer Research and Development,2007,44(8): 13651370.
[19] 窦文,王怀民,贾焰,等.构造基于推荐的PeertoPeer环境下的Trust模型[J].软件学报,2004,15(4): 571-583.
DOU Wen,WANG Huaiming,JIA Yan,et al. A recommendationbased peertopeer trust model [J]. Journal of Software,2004,15(4): 571-583.
[20] MALIK Z,BOUGUETTAYA A. Reputation Bootstrapping for trust establishment among web services [J]. Internet Computing IEEE,2009,13(1): 40-47.
[21] BURNETT C,NORMAN T J,SYCARA K. Bootstrapping trust evaluations through stereotypes \[C\]∥Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems,New York:ACM,2010: 241-248.
[22] SENSOY M,YILMAZ B,NORMAN T J. Discovering frequent patterns to bootstrap trust [C]∥Proceedings of the 8th International Workshop ADMI,Berlin: Springer,2013: 93-104.
[23] 孙啸寅,吴国新,董永强等.一种基于推荐的信誉系统初始化定值策略[J].东南大学学报:自然科学版,2010,40(1): 41-46.
SUN Xiaoyan,WU Guoxin,DONG Yongqiang,et al. New initialization strategy of reputation system based on recommendation [J]. Journal of Southeast University: Natural Science Edition,2010,40(1): 41-46.
[24] MAXIMILIEN E M,SINGH M P. Reputation and endorsement for web services [J]. ACM SIGecom Exchanges,2001,3(1): 2431.
[25] NGUYEN H T,YANG J,ZHAO W. Bootstrapping trust and reputation for Web services [C] ∥Proceedings of the 14th IEEE I-nternational Conference on Commerce and Enterprise Computing, Piscataway: IEEE,2012: 41-48.
[26] 王家昉,冯志勇,徐超,等.多Agent系统中基于认知的信任框架研究[J].计算机学报,2010,1(1): 139-151.
WANG Jiafang,FENG Zhiyong,XU Chao, et al. Research on trust framework in multiagent system from the cognitive view [J]. Chinese Journal of Computers,2010,1(1): 139-151.
[27] 田俊峰,杜瑞忠,刘玉玲. 基于结点行为特征的可信性度量模型[J].计算机研究与发展,2011,48(6): 934-944.
TIAN Junfeng, DU Ruizhong, LIU Yuling. Trust evaluation model based on node behavior character [J]. Journal of Computer Research and Development,2011,48(6): 934-944.
[28] JIANG X, LIN C, YIN H,et al. Gamebased trust establishment for mobile ad hoc networks [C]∥Proceedings of the WRI International Conference on Communications and Mobile Computing, Piscataway: IEEE,2009,3: 475-479.
[29] WU Q,ZHU Q,LI P. A neural network based reputation bootstrapping approach for service selection [J]. Enterprise Information Systems, 2015, 9(7): 768-784.
[30] 刘彬,张仁津.电子商务中Web服务社区的动态信任启动模型[J]. 计算机工程,2012,38(10): 269-272.
LIU Bing,ZHANG Renjin. Dynamic trust starting model of web service community in electronic commerce [J]. Computer Engineering,2012,38(10): 269-272.
[31] JIAO H,LIU J,LI J,et al. A framework for reputation bootstrapping based on reputation utility and game theories [C]∥Proceedings of the 10th International Conference on Trust, Security and Privacy in Computing and Communications,Piscataway: IEEE,2011: 344-351.
[32] SANCHEZARTIGAS M,HERRERA B. Activity stereotypes,or how to cope with disconnection during trust bootstrapping [J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(1): 2-12.
[33] 曲大鹏,王兴伟,黄敏.移动对等网络中自私节点的检测和激励机制[J].软件学报,2013,24(4): 887-899.
QU Dapeng,WANG Xingwei,HUANG Min. Selfish Node Detection and Incentive Mechanism in Mobile P2P Networks [J]. Journal of Software,2013,24(4):887-899.
[34] MARTI S,GARCIAMOLINA H. Taxonomy of trust: Categorizing P2P reputation systems [J]. Computer Networks,2006,50(4): 472-484.
[35] LEE W,FAN W,MILLER M,et al.Toward costsensitive modeling for intrusion detection and response [J].Journal of Computer Security,2002,10(1): 522.
[36] 姜伟,方滨兴,田志宏,等. 基于攻防博弈模型的网络安全测评和最优主动防御[J].计算机学报,2009,32(4): 817-827.
JIANG Wei,FANG Binxing,TIAN Zhihong, et al. Evaluating network security and optimal active defense based on attackdefense game model [J]. Chinese Journal of Computers,2009,32(4): 817-827.
[37] WANG C Z,HUANG G Q. Network attack strategy digging based on object petri net [C]∥ Proceedings of the 3rd IEEE International Conference on Advanced Computer Theory and Engineering,Piscataway: IEEE,2010: 193-197.
[38] VARGA A,HORNIG R. An overview of the OMNeT++ simulation environment [C] ∥ Proceedings of the 1st International Conference on Simulation Tools and Techniques for Communications, Networks and Systems and Workshops,New York: ACM,2008,208(2): 183-202.
[39] KHOSRAVIFAR B,BENTAHAR J,GOMROKCHIET M, et al. CRM: an efficient trust and reputation model for agent computing [J]. Knowledge Based Systems,2012,30(2): 1-16. |