JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (1): 53-59.doi: 10.6040/j.issn.1671-9352.3.2018.007
• High-end forum • Previous Articles Next Articles
Ze-nan WU1(),Li-qin TIAN1,2,*(),Zhi-gang WANG1
CLC Number:
1 | 张仕斌, 许春香. 基于云模型的信任评估方法[J]. 计算机学报, 2013, 36 (2): 422- 430. |
ZHANG Shibin , XU Chunxiang . Credit assessment method based on cloud model[J]. Acta Ch Computers, 2013, 36 (2): 422- 430. | |
2 | 林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45 (12): 2033- 2043. |
LIN Chuang , TIAN Liqin , WANG Yuanzhuo . Research on trusted users' behavior in trusted network[J]. Journal of Computer Research and Development, 2008, 45 (12): 2033- 2043. | |
3 | 田立勤, 林闯. 基于双滑动窗口的用户行为信任评估机制[J]. 清华大学学报(自然科学版), 2010, 50 (6): 763- 767. |
TIAN Liqin , LIN Chuang . User evaluation of user behavior based on double sliding windows[J]. Journal of Tsinghua University (Science and Technology), 2010, 50 (6): 763- 767. | |
4 | 孟宪佳, 马建峰, 卢笛, 等. 在社交网络中综合的信任评估模型[J]. 通信学报, 2014, 35 (12): 136- 143. |
MENG Xianjia , MA Jianfeng , LU Di , et al. Comprehensive trust assessment model in social networks[J]. Journal on Communications, 2014, 35 (12): 136- 143. | |
5 | 田立勤, 李君建, 毋泽南. 权重均衡优化的Web用户行为的信任评估[J]. 北京邮电大学学报, 2016, 39 (6): 99- 103. |
TIAN Liqin , LI Junjian , WU Zenan . Trust assessment of web user behavior based on weight equilibrium optimi-zation[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39 (6): 99- 103. | |
6 | 毋泽南, 田立勤, 王志刚. 基于机器学习的Web用户行为认证[J]. 网络与信息安全学报, 2018, 4 (1): 45- 51. |
WU Zenan , TIAN Liqin , WANG Zhigang . Web user behavior authentication based on machine learning[J]. Journal of Network and Information Security, 2018, 4 (1): 45- 51. | |
7 |
李建, 管卫利, 刘吉强, 等. 基于信任评估的网络访问模型[J]. 信息网络安全, 2015, 36 (10): 14- 23.
doi: 10.3969/j.issn.1671-1122.2015.10.003 |
LI Jian , GUAN Weili , LIU Jiqiang , et al. Network access model based on trust evaluation[J]. Information Network Security, 2015, 36 (10): 14- 23.
doi: 10.3969/j.issn.1671-1122.2015.10.003 |
|
8 |
龚文涛, 夏凌云, 洪涛. Web服务中一种基于时间衰减和反馈的信任管理机制研究[J]. 计算机工程与科学, 2011, 33 (8): 70- 73.
doi: 10.3969/j.issn.1007-130X.2011.08.012 |
GONG Wentao , XIA Lingyun , HONG Tao . A trust management mechanism based on time decay and feedbac-k in web services[J]. Computer Engineering and Sciences, 2011, 33 (8): 70- 73.
doi: 10.3969/j.issn.1007-130X.2011.08.012 |
|
9 | 赵治国, 谭邦, 夏石莹, 等. 基于时间序列的P2P网络综合信任模型研究[J]. 计算机工程与应用, 2017, 53 (15): 127- 131. |
ZHAO Zhiguo , TAN Bang , XIA Shiying , et al. Study on integrated P2P network trust model based on time series[J]. Journal of Computer Engineering and Applications, 2017, 53 (15): 127- 131. | |
10 | LIU Wu, REN Ping, LIU Ke, et al. User cooperation trust model and its application in network security management[C]//Proc of 2011 Eighth Int Conf on Fuzzy Systems and Knowledge Discovery (FSKD). Piscataway: IEEE, 2011: 2335-2339. |
11 |
张波, 向阳, 黄震华. 一种社交网络中的个体间推荐信任度计算方法[J]. 南京航空航天大学学报, 2013, 45 (4): 563- 568.
doi: 10.3969/j.issn.1005-2615.2013.04.021 |
ZHANG Bo , XIANG Yang , HUANG Zhenhua . A method to calculate the trust between individuals in social net-works[J]. Journal of Nanjing University of Aeronautics, 2013, 45 (4): 563- 568.
doi: 10.3969/j.issn.1005-2615.2013.04.021 |
|
12 | NOOR T H, SHENG Q Z, ALFAZI A. Reputation attacks detection for effective trust assessment among cloud services[C]//Proc of 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Melbourne: IEEE, 2013: 469-476. |
13 | 邵堃, 罗飞, 梅枭雄, 等. 一种正态分布下的动态推荐信任模型[J]. 软件学报, 2012, 23 (12): 3130- 3148. |
SHAO Kun , LUO Fei , MEI Xiaoxiong , et al. A dynamic recommendation trust model under normal distribution[J]. Journal of Software, 2012, 23 (12): 3130- 3148. |
[1] | HUANG Chong-zheng,WU Yuan-xi,CHEN Hong . An efficient algorithm for current frequent sequence mining in data stream [J]. J4, 2007, 42(11): 37-39 . |
|