[1] 张焕国,陈璐,张立强.可信网络连接研究 [J] . 计算机学报, 2010, 33(4):706-717.(ZHANG H G, CHEN L, ZHANG L Q . Research on trusted network connection [J]. Chinese Journal of Computers, 2010, 33(4): 706-717.) [2] 沈昌祥,张焕国,王怀民,等.可信计算的研究与发展[J].中国科学:信息科学,2010,40(2):139-166.(SHEN C X, ZHANG H G, WANG H M, et al. Research and development of trusted computing [J]. Scientia Sinica: Information Sciences, 2010, 40(2): 139-166.) [3] 闫小侠.可信网络框架研究与设计[D].北京:北京工业大学,2014.(YAN X X. The trusted network framework research and design[D]. Beijing: Beijing University of Technology, 2014.) [4] 冯登国,秦宇,汪丹,等.可信计算技术研究[J].计算机研究与发展,2011,48(8):1322-1349.(FENG D G, QIN Y, WANG D, et al. Research on trusted computing technology[J]. Journal of Computer Research and Development, 2011, 48(8): 1322-1349.) [5] 林闯,田立勤,王元卓.可信网络中用户行为可信的研究[J].计算机研究与发展,2008,45(12):2033-2043.(LIN C, TIAN L Q, WANG Y Z. Research on user behavior trust in trustworthy network[J]. Journal of Computer Research and Development, 2008, 45(12): 2033-2043.) [6] 梁洪泉,吴巍.基于动态贝叶斯网络的可信度量模型研究[J].通信学报,2013,34(9):68-76.(LIANG H Q, WU W. Research of trust evaluation model based on dynamic Bayesian network [J]. Journal on Communications, 2013, 34(9): 68-76.) [7] FENG R, XU X, ZHOU X, et al. A trust evaluation algorithm for wireless sensor networks based on node behaviors and D-S evidence theory [J]. Sensors, 2011, 11(2): 1345-1360. [8] 蒋黎明,张琨,徐建,等.一种基于图论方法的开放计算系统证据信任模型[J].计算机研究与发展,2013, 50(5):921-931.(JIANG L M, ZHANG K, XU J, et al. A new evidential trust model based on graph theory for open computing systems [J]. Journal of Computer Research and Development, 2013, 50(5): 921-931.) [9] 李道丰,杨义先,谷利泽,等.状态行为关联的可信网络动态信任计算研究[J].通信学报,2010,31(12):12-19.(LI D F, YANG Y X, GU L Z, et al. Study on dynamic trust metric of trusted network based on state and behavior associated [J]. Journal on Communications, 2010, 31(12): 12-19.) [10] 吴旭.基于增强稳定组模型的移动P2P网络信任评估方法[J].计算机学报,2014,37(10):2118-2127.(WU X. Enhanced stable group model-based trust evaluation scheme for mobile P2P networks [J]. Chinese Journal of Computers, 2014, 37(10): 2118-2127.) [11] 刘雪娇.数据挖掘中的动态聚类及增量研究 [D].哈尔滨:哈尔滨理工大学,2015.(LIU X J. Research on dynamic clustering and incremental in data mining [D]. Harbin : Harbin University of Science and Technology, 2015.) [12] HAN J, KAMBER M. Data Mining: Concepts and Techniques [M]. San Francisco, CA: Morgan Kaufmann, 2011: 13-18. [13] HAMERS L, HEMERYCK Y, HERWEYERS G. Similarity measures in scientometric research: the Jaccard index versus Salton cosine formula [J]. Information Processing & Management, 1989, 25(3): 315-318. [14] 王群,戴秀岳,杨莉.一种基于直觉模糊理论的P2P动态信任模型[J].计算机工程,2014,40(8):133-137.(WANG Q, DAI X Y, YANG L. A P2P dynamic trust model based on intuitionistic fuzzy theory [J].Computer Engineering, 2014, 40(8): 133-137.) |