[1]
Li Xiao-yong,Gui Xiao-lin,Mao Qian,et al. Adaptive dynamictrust measurement and prediction model based on behavior monito-ring [J]. Chinese Journal of Computers,2009,32( 4) : 664-674.
Google Scholar
[2]
Lin Chuang,Peng Xue-hai. Research on trustworthy networks[J].Chinese Journal of Computers,2005,28( 5) : 751-757.
Google Scholar
[3]
Tian Li-qin,Lin Chuang. Evaluation mechanism for user behavior trust based on DSW [J]. Journal of Tsinghua University Scienceand Technology,2010,50( 5) : 763-767.
Google Scholar
[4]
Lv Yan-xia,Tian Li-qin,Sun Shan-shan. Trust evaluation and con-trol analysis of FANP-based user behavior in cloud computing environment[J]. Computer Science,2013,40( 1) 132-135.
Google Scholar
[5]
Ji Tie-guo,Tian Li-qin,Hu Zhi-xing,et al. AHP-based user behavior evaluation method in trustworthy network[J]. Computer Engineering and Applications,2007,43( 19) : 123-151.
Google Scholar
[6]
Stefan Schmidt,Robert Steele,Tharam S. Dillon fuzzy trust evalua-tion and credibility development in multi-agent systems [J]. Applied Soft Computing,2007,7( 2) : 492-505.
DOI: 10.1016/j.asoc.2006.11.002
Google Scholar
[7]
. BIRCH: An Efficient Data Clustering Method for Very Large Databases.
Google Scholar