相似文献/References:
[1]张祖昶,王诚.P2P网络的信任评估安全模型研究[J].计算机技术与发展,2014,24(01):163.
ZHANG Zu-chang,WANG Cheng.Research of a Safe Model of Trust Evaluation for P2 P Network[J].,2014,24(03):163.
[2]童岚岚 刘连忠.基于动态联盟的一种身份信任计算模型[J].计算机技术与发展,2010,(02):152.
TONG Lan-lan,LIU Lian-zhong.One of Arithmetic Models of Identity Trust Management Based on Dynamic Federation[J].,2010,(03):152.
[3]孙名松 邸明星 王湛昱.多决策树算法在P2P网络流量检测中的应用[J].计算机技术与发展,2010,(06):126.
SUN Ming-song,DI Ming-xing,WANG Zhan-yu.Application of Decision Tree Algorithm in Traffic Detection of P2P Network[J].,2010,(03):126.
[4]邓黎黎 刘才兴.基于信任的无线传感器网络安全路由研究[J].计算机技术与发展,2010,(06):159.
DENG Li-li,LIU Cai-xing.Research of Trust-Based Secure Routing Protocols for Wireless Sensor Networks[J].,2010,(03):159.
[5]李莹峰 邓晓衡.DHT网络中基于测量的QoS监控系统[J].计算机技术与发展,2009,(05):188.
LI Ying-feng,DENG Xiao-heng.Measurement- Based QoS Monitor System in DHT Network[J].,2009,(03):188.
[6]贺锋 王汝传.一种基于PKI的P2P身份认证技术[J].计算机技术与发展,2009,(10):181.
HE Feng,WANG Ru-chuan.A Peer- to- Peer Identity Authentication Technology Based on PKI[J].,2009,(03):181.
[7]吴敏 王汝传 王治平.基于支持向量机的P2P网络DoS攻击检测[J].计算机技术与发展,2009,(11):151.
WU Min,WANG Ru-chuan,WANG Zhi-ping.Detection Mechanism of DoS Attacks in Peer- to- Peer Networks Based on Support Vector Machine[J].,2009,(03):151.
[8]许加兴 汪厚新 周艳 金炜东.P2P网中基于IP组播的发现机制研究[J].计算机技术与发展,2006,(06):32.
XU Jia-xing,WANG Hou-xin,Zhou yah,et al.Discovery Implementation by IP Multicast in Peer to Peer Network[J].,2006,(03):32.
[9]杨文俊.P2P网络系统中节点自组织管理机制[J].计算机技术与发展,2006,(07):57.
YANG Wen-jun.A Novel Self-Organization Mechanism for Nodes Management in P2P Networks[J].,2006,(03):57.
[10]阳天保 张修如 贾丽会.基于P2P的视频点播系统模型及算法研究[J].计算机技术与发展,2006,(10):45.
YANG Tian-bao,ZHANG Xiu-ru,JIA Li-hui.Research on Video- on- Demand System Model and Algorithm Based on P2P[J].,2006,(03):45.
[11]陈伟 解争龙 弋改珍.P2P网络中蚁群的声誉信息分发算法研究[J].计算机技术与发展,2011,(12):124.
CHEN Wei,XIE Zheng-long,YI Gai-zhen.Research of Reputation-Ant Distribution Algorithm in P2P Networks[J].,2011,(03):124.