[1] |
罗军舟, 韩志耕, 王良民 . 一种可信可控的网络体系及协议结构[J]. 计算机学报, 2009,3(3):391-404.
|
[2] |
林闯, 雷蕾 . 下一代互连网络体系结构研究[J]. 计算机学报, 2007,30(5):693-711.
|
[3] |
FUNG C , ZHANG J , AIB I , et al . Trust management and admission control for host-based collaborative intrusion detection[J]. Journal of Network and Systems Management, 2011,19(2):257-277.
|
[4] |
TAJEDDINE A , KAYSSI A , CHEHAB A , et al . Fuzzy reputation-based trust model[J]. Applied Soft Computing, 2011,11(1):345-355.
|
[5] |
GOVINDAN K . Trust computations and trust dynamics in mobile ad hoc networks: a survey[J]. Communications Surveys & Tu ials, 2011,14(2):279-298.
|
[6] |
RAYA M , PAPADIMITRATOS P , GLIGOR V D , et al . On data-centric trust establishment in ephemeral ad hoc networks[A]. INFOCOM. 2008. 13-18.
|
[7] |
XI Z Y , CHEN H , WANG X Z , et al . Evaluation model for computer network information security based on analytic hierarchy process[A]. Intelligent Information Technology Application[C]. 2009.
|
[8] |
CAO Y , ZHANG L , WU H . An evaluation system for network attack effect based on fuzzy[A]. E-Business and Information System Security[C]. 2009.
|
[9] |
JIN F , LIU P , ZHANG X , et al . The evaluation study of knowledge management performance based on grey-ahp method[A]. Software Engineering, Artificial Intelligence, Networking, and allel/Distributed Computing. 2007.
|
[10] |
张义荣, 鲜明, 王国玉 . 一种基于网络熵的计算机网络攻击效果定量评估方法[J]. 通信学报, 2004,25(11):158-165.
|
[11] |
WANG X , HE H , ZHANG H L , et al . Dynamic damage evaluation ofnetwork availability adjusted by index correlation[A]. Internet Computing for Science and Engineering (ICICSE)[C]. 2009.
|
[12] |
李小勇, 桂小林, 毛倩 等 . 基于行为监控的自适应动态信任度测模型[J]. 计算机学报, 2009,32(4):664-674.
|
[13] |
梁吉业, 李德玉 . 信息系统中的不确定性与知识获取[M] . 北京: 科学出版社, 2005.
|
[14] |
龚正虎, 卓莹 . 网络态势感知研究[J]. 软件学报, 2010,21(7):1605-1619.
|
[15] |
江勇, 林闯, 吴建平 . 网络传输控制的综合性能评价标准[J]. 计算机学报, 2002,25(8):869-877.
|
[16] |
MOORE A W , ZUEV D . Discriminators for Use in Flow-Based Classification[R]. Technical Report IRC-TR-04-028, 2004.
|
[17] |
LIN Z , FENG J . A rough set approach to feature selection based on relative decision entropy[J]. Lecture Notes in Computer Science, 2011,6954(11):110-119.
|
[18] |
KIM H , CLAFFY K , FOMENKOV M , et al . Internet traffic classification demystified: myths, caveats, and the best practices[A]. Proc of ACM CoNEXT'08[C]. New York, USA, 2008. 1-12.
|