[1] |
LIAO Ziyuan, CHEN Mingzhi, DENG Hui.Research on the Model of Cloud Computing Trust Management Based on Evaluation Credibility[J].Netinfo Security, 2016,16(2):33-39.
|
|
廖子渊,陈明志,邓辉. 基于评价可信度的云计算信任管理模型研究[J]. 信息网络安全,2016,16(2):33-39.
|
[2] |
ZOURIDAKI C, MARK B L, HEJMO M, et al.A Quantitative Trust Establishment Framework for Reliable Data Packet Delivery in MANETs[C]//ACM. The 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, November 7 , 2005, Alexandria, VA, USA. New York:ACM, 2005:1-10.
|
[3] |
TAN Shuaishuai, LI Xiaoping, DONG Qingkuan.A Trust Management System for Securing Data Plane of Ad-Hoc Networks[J]. IEEE Transactions on Vehicular Technology, 2016, 65(9):7579-7592.
|
[4] |
SIRISALA N, BINDU C S.Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs[C]// IEEE.2015 International Conference on Advanced Computing and Communications, September 18-20, 2015, Chennai, India.NJ:IEEE,2015:55-60.
|
[5] |
QI Jian, CHEN Xiaoming, YOU Weiqing.Research on the Method of Network Protocol Security Evaluation Based on Fuzzing Test[J].Netinfo Security, 2017,17(3):59-65.
|
|
齐健,陈小明,游伟青. 基于fuzzing测试的网络协议安全评估方法研究[J]. 信息网络安全,2017,17(3):59-65.
|
[6] |
JIANG Shouxu, LI Jianzhogn.A Reputation-Based Trust Mechanism for P2P E-Commerce Systems[J]. Journal of Software, 2007, 19(10):2551-2563.
|
|
姜守旭,李建中.一种P2P电子商务系统中基于声誉的信任机制[J]. 软件学报, 2007, 19(10):2551-2563
|
[7] |
LI Xiaoyong, GUI Xiaolin.Trust Quantitative Model with Multiple Decision Factors in Trusted Network[J]. Chinese Journal of Computers, 2009, 32(3):405-416.
|
|
李小勇, 桂小林.可信网络中基于多维决策属性的信任量化模型[J]. 计算机学报, 2009, 32(3):405-416.
|
[8] |
BUCHEGGER S, LEBOUDEC J Y. A Robust Reputation System for Mobile Ad-hoc Networks[EB/OL]. ,2018-9-20.
|
[9] |
CHEN Liqun, QIN L, MARTIN K M, et al.A Privacy-aware Reputation-based Announcement Scheme for VANETs[C]// IEEE.2013 IEEE 5th International Symposium on Wireless Vehicular Communications (WiVeC), June 2-3, 2013, Dresden, Germany. NJ:IEEE,2013:1-5.
|
[10] |
CHANG Yingxian, CHEN Guangyong, SHI Xinlei,et al.Research on Security Technology of Mobile Network[J]. Netinfo Security, 2016,16(4):76-81.
|
|
常英贤,陈广勇,石鑫磊,等. 移动网络安全防范技术研究[J]. 信息网络安全,2016,16(4):76-81.
|
[11] |
KAMEL M B M, ALAMERI I, ONAIZAH A N. STAODV: A Secure and Trust based Approach to Mitigate Blackhole Attack on AODV based MANET[C]// IEEE. 2017 IEEE 2nd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), March 25-26, 2017, Chongqing, China.NJ:IEEE, 2017: 1278-1282.
|
[12] |
XIA Hui, XIA Shoujun, YU Jia, et al.Applying Link Stability Estimation Mechanism to Multicast Routing in MANETs[J]. Journal of Systms Architecture, 2014, 60(5):467-480.
|
[13] |
SALEHI M, BOUKERCHE A, DAREHSHOORZADEH A, et al.Towards a Novel Trust-based Opportunistic Routing Protocol for Wireless Networks[J]. Wireless Networks, 2015, 22(3):1-17.
|
[14] |
ROYER E M . Multicast Ad hoc On- Demand Distance Vector (MAODV)Routing [EB/OL]. ,2018-9-20.
|
[15] |
MARCHANG N, DATTA R.Light-weight Trust-based Routing Protocol for Mobile Ad Hoc Networks[J]. Iet Information Security, 2012, 6(2):77-83.
|
[16] |
SHABUT A M, DAHAL K P, BISTA S K, et al.Recommendation Based Trust Model with an Effective Defence Scheme for MANETs[J]. IEEE Transactions on Mobile Computing, 2015, 14(10):2101-2115.
|
[17] |
ZHU Yufang, KUNZ T.MAODV Implementation for NS-2.26 [EB/OL]. ,2018-9-20.
|