共 63 条
- [1] Bass T.(2000)Intrusion detection systems and multisensor data fusion Commun. ACM 43 99-105
- [2] Zhou C.V.(2010)A survey of coordinated attacks and collaborative intrusion detection Comput. Secur. 29 124-140
- [3] Leckie C.(2008)Reputation-based framework for high integrity sensor networks ACM Trans. Sensor Netw. 4 1-15
- [4] Karunasekera S.(2005)A survey and comparison of peer-to-peer overlay network schemes IEEE Commun. Surv. Tutor. 7 72-93
- [5] Ganeriwal S.(2009)Security threats scenarios in trust and reputation models for distributed systems Comput. Secur. 28 545-556
- [6] Balzano L.K.(2010)TRIMS, a privacy-aware trust and reputation model for identity management systems Comput. Netw. 54 2899-2912
- [7] Srivastava M.B.(2004)PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities IEEE Trans. Knowl. Data Eng. 16 843-857
- [8] Lua E.K.(2008)Intrusion alert correlation technique analysis for heterogeneous log Int. J. Comput. Sci. Netw. Secur. 8 132-138
- [9] Crowcroft J.(2010)Event-driven architecture based on patterns for detecting complex attacks Int. J. Crit. Comput. Based Syst. 1 283-309
- [10] Pias M.(2010)PKI-based trust management in inter-domain scenarios Comput. Secur. 29 278-290