Sun Y, Han Z, Yu W, et al. A trust evaluation framework in distributed networks:vulnerability analysis and defense against attacks //Proceedings of The 25th Conference on Computer Communications. Barcelona:IEEE, 2006:810-822.
[2]
Kevin H, David Z, Cristina N R. A survey of attack and defense techniques for reputation systems[J]. ACM Computing Surveys, 2007,42(1):1-31.
[3]
Feng Q Y, Yang Y F, Sun Y, et al. Modeling attack behaviors in rating systems //Proceedings of The 2nd International Workshop on Trust and Reputation Management in Massively Distributed Computing Systems. Beijing:, 2008:241-248.
[4]
邹铭.Web环境下信用体系关键技术的研究与应用[D].杭州:浙江大学计算机科学与技术学院,2008. Zhou Ming. A study into the key technologies of reputation reporting architecture in Web environment and its applications[D]. Hangzhou:School of Computer Science and Technology, Zhejiang University, 2008. (in Chinese)
[5]
Liu Y H, Yang Y F, Sun Y L. Detection of collusion behaviors in online reputation systems[C]//Proceedings of Asilomar Conference on Signals, Systems, and Computers. Pacific Grove, USA:[s.n.], 2008:1368-1372.
[6]
高小伟.BP神经网络在入侵检测系统中的应用及优化[D].济南:山东大学数学与系统科学学院,2007. Gao Xiaowei. The application of BP neural network in intrusion detection system and its optimization[D]. Ji\'nan:School of Mathematics and System Sciences, Shandong University, 2007. (in Chinese)