相似文献/References:
[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(07):163.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(07):126.
[3]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(07):188.
[4]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(07):181.
[5]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(07):151.
[6]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(07):102.
[7]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(07):32.
[8]阳天保 张修如 贾丽会.基于P2P的视频点播系统模型及算法研究[J].计算机技术与发展,2006,(10):45.
YANG Tian-bao,ZHANG Xiu-ru,JIA Li-hui.Research on Video- on- Demand System Model and Algorithm Based on P2P[J].,2006,(07):45.
[9]徐小龙 程春玲 陈丹伟 熊婧夷.一种应用于对等网络的可信片上Agent模型[J].计算机技术与发展,2010,(09):140.
XU Xiao-long,CHENG Chun-ling,CHEN Dan-wei,et al.Research on Model of Trusted Agent-on-Chip for P2P Networks[J].,2010,(07):140.
[10]吴敏 王汝传.一种基于双重流传输特性的P2P流量检测方案[J].计算机技术与发展,2010,(10):66.
WU Min,WANG Ru-chuan.A Mechanism for P2P-Traffic Detection Based on Two-Fold Traffic Transmission Features[J].,2010,(07):66.