Evaluation of Network Connection Credibility based on Neural Network
暂无分享,去创建一个
Qingtao Wu | Ruijuan Zheng | Bin Hua | Xintong Yang | Qingtao Wu | R. Zheng | Xintong Yang | Bin Hua
[1] John S. Baras,et al. Trust evaluation in ad-hoc networks , 2004, WiSe '04.
[2] Peng Xue. Research on Trustworthy Networks , 2005 .
[3] Michael Atighetchi,et al. Trust Assessment from Observed Behavior: Toward and Essential Service for Trusted Network Computing , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[4] Tian Li,et al. A Kind of Game-Theoretic Control Mechanism of User Behavior Trust Based on Prediction in Trustworthy Network , 2007 .
[5] Jiqiang Liu,et al. Study of Remote Automated Anonymous Attestation in Trusted Computing: Study of Remote Automated Anonymous Attestation in Trusted Computing , 2009 .
[6] Liu Ji. Study of Remote Automated Anonymous Attestation in Trusted Computing , 2009 .
[7] Hong Zhang,et al. Study on the Improved BP Algorithm and Application , 2009, 2009 Asia-Pacific Conference on Information Processing.
[8] Ali A. Ghorbani,et al. A detailed analysis of the KDD CUP 99 data set , 2009, 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications.
[9] Jun Chen,et al. Research on Trust Model Based on Behavior and Trusted Computing , 2010 .
[10] Qiang Huang,et al. A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform: A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform , 2010 .
[11] Lu Chen,et al. Research on Trusted Network Connection: Research on Trusted Network Connection , 2010 .
[12] Zhang Xing. A Formal Method Based on Noninterference for Analyzing Trust Chain of Trusted Computing Platform , 2010 .