相似文献/References:
[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(05):163.
[2]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(05):126.
[3]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(05):181.
[4]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(05):151.
[5]宁多彪 陶中平 吕光宏[].基于PNS—PGrid的P2P路由算法的设计与实现[J].计算机技术与发展,2009,(12):47.
NING Duo-biao,TAO Zhong-ping,LU Guang-hong.Design and Implementation of P2P Routing Algorithm Based on PNS- PGrid[J].,2009,(05):47.
[6]郭晶 吴国新 李想.P2P网络环境下信任模型的研究与实现[J].计算机技术与发展,2009,(03):102.
GUO Jing,WU Guo-xin,LI Xiang.Research and Design for Trust Model in P2P Network[J].,2009,(05):102.
[7]王文奎 吴国新.一种对等式存储系统的设计与实现[J].计算机技术与发展,2008,(04):236.
WANG Wen-kui,WU Guo-xin.Design and Implementation of Storage System Based on Peer-to-Peer Architecture[J].,2008,(05):236.
[8]吴国庆.对等网络技术研究[J].计算机技术与发展,2008,(07):100.
WU Guo-qing.Peer- to- Peer Network Research[J].,2008,(05):100.
[9]江庆 钟尚平 吕建明.P2P网络下一种基于DHT的视频点播方案[J].计算机技术与发展,2008,(07):229.
JIANG Qing,ZHONG Shang-ping,LU Jian-ming.A P2P Video - on - Demand Scheme Based on DHT[J].,2008,(05):229.
[10]孙名松 刘杰 李胜利.基于语义划分的P2P搜索技术研究[J].计算机技术与发展,2010,(08):75.
SUN Ming-song,LIU Jie,LI Sheng-li.Research on P2P Searching Technology Based on Semantic Division[J].,2010,(05):75.