[1] 中国互联网信息中心. 中国互联网络发展状况统计报告[EB/OL]. (2015-02-03) [2015-09-24]. http://www.cnnic.net.cn /hlwfzyj/hlwxzbg/201502/P020150203551802054676.pdf. [2] Blaze M, Feigenbaum J.Decentralized trust management [C]// Proceedings of the 17th Symposium on Security and Privacy. USA: IEEE Computer Society Press, 1996: 164-173. [3] Yu B, Singh M P.Distributed reputation management for electronic commerce[J]. Computational Intelligence (S1860-949X), 2002, 18(4): 535-549. [4] Almenárez F, Marín A, Díaz D, et al.Trust management for multimedia P2P applications in autonomic networking[J]. Ad Hoc Networks (S1570-8705), 2011, 9(4): 687-697. [5] Yu Y, Li K, Zhou W, et al.Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures[J]. Journal of Network and Computer Applications (S1084-8045), 2012, 35(3): 867-880. [6] Xia H, Jia Z, Li X, et al.Trust prediction and trust-based source routing in mobile ad hoc networks[J]. Ad Hoc Networks (S1570-8705), 2013, 11(7): 2096-2114. [7] Li X, Zhou F, Yang X.Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems (S1045-9219), 2012, 23(10): 1944-1957. [8] Can A B, Bhargava B.SORT: A Self-Organizing Trust Model for Pee-to-Peer Systems[J]. IEEE Transactions on Dependable and Secure Computing (S1545-5971), 2013, 10(1): 14-27. [9] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型研究[J]. 软件学报, 2003, 14(8): 1401-1408. (Tang Wen, Chen Zhong.Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J]. Journal of Software (S1000-9825), 2003, 14(8): 1401-1408.) [10] 胡建理, 周斌, 吴泉源. 一种P2P信任管理安全性协议[J]. 计算机科学, 2011, 38(10): 64-67, 90.(Hu Jianli, Zhou Bin, Wu Quanyuan. Security Protocol for Protecting the P2P Trust Information Management [J]. Computer Science (S1002-137X), 2011, 38(10): 64-67, 90.) [11] 胡建理, 周斌, 吴泉源. P2P网络环境下基于信誉的分布式抗攻击信任管理模型[J]. 计算机研究与发展, 2011, 48(12): 2235-2241. (Hu Jianli, Zhou Bin, Wu Quanyuan.A Reputation Based Attack-Resistant Distributed Trust Management Model for P2P Networks[J]. Journal of Computer Research and Development (S1000-1239), 2011, 48(12): 2235-2241.) [12] 冯景瑜, 张玉清, 陈深龙, 等. P2P声誉系统中GoodRep攻击及其防御机制[J]. 计算机研究与发展, 2011, 48(8): 1473-1480. (Feng Jing-yu, Zhang Yu-qing, Chen Shen-long, et al.GoodRep Attack and Defense in P2P Reputation Systems[J]. Journal of Computer Research and Development (S1000-1239), 2011, 48(8): 1473-1480.) [13] 陆秋琴, 和涛, 黄光球, 等. 信任攻击建模方法[J]. 计算机工程与应用, 2012, 48(12): 129-135. (Lu Qiuqin, He Tao, Huang Guangqiu, et al.Trust attack modeling[J]. Computer Engineering and Applications (S1002-8331), 2012, 48(12): 129-135.) [14] 陆秋琴, 和涛, 黄光球, 等. 面向对象粗糙信任攻击威胁感知模型[J]. 计算机工程与应用, 2012, 48(30): 103-176. (Lu Qiuqin, He Tao, Huang Guangqiu, et al.Object- oriented rough trust attack threat perception model[J]. Computer Engineering and Applications (S1002-8331), 2012, 48(30): 103-176.) [15] 田俊峰, 吴丽娟. 基于多项式主观逻辑的扩展信任传播模型[J]. 通信学报, 2013, 34(5): 12-19. (Tian Junfeng, Wu Lijuan.Multinomial subjective logic based extended trust propagation model[J]. Journal of Communications (S1000-436X), 2013, 34(5): 12-19.) [16] 舒远仲, 刘炎培, 彭晓红, 等. 面向对象Petri网建模技术综述[J]. 计算机工程与设计, 2010, 31(15): 3432-3435. (Shu Yuanzhong, Liu Yanpei, Peng Xiaohong, et al.Survey on object-oriented Petri net modeling[J]. Computer Engineering and Design (S1000-7024), 2010, 31(15): 3432-3435.) [17] 吴迪, 冯登国, 连一峰, 等. 一种给定脆弱性环境下的安全措施效用评估模型[J]. 软件学报, 2012, 23(7): 1880-1898. (Wu Di, Feng Dengguo, Lian Yifeng, et al.Efficiency Evaluation Model of System Security Measures in the Given Vulnerabilities Set[J]. Journal of Software (S1000-9825), 2012, 23(7): 1880-1898.) [18] 陈锋, 刘德辉, 张怡, 等. 基于威胁传播模型的层次化网络安全评估方法[J]. 计算机研究与发展, 2011, 48(6): 945-954. (Chen Feng, Liu Dehui, Zhang Yi, et al.A Hierarchical Evaluation Approach for Network Security Based on Threat Spread Model[J]. Journal of Computer Research and Development (S1000-1239), 2011, 48(6): 945-954.) [19] 王玥, 蔡皖东, 段琪. 基于遗传算法的网络脆弱性计算方法[J]. 系统仿真学报, 2009, 21(6): 1628-1632. (Wang Yue, Cai Wandong, Duan Qi.Computing Vulnerability of Network Based on Genetic Algorithm[J]. Jounal of System Simulation (S1004-731X), 2009, 21(6): 1628-1632.) |