[1]
Fung, C., Zhang, J., Aib, I., Boutaba, R.: Trust management and admission control for Host –based Collaborative Intrusion Detection. J. Netw. Syst. Manage. 19, 257–277 (2011).
DOI: 10.1007/s10922-010-9176-7
Google Scholar
[2]
Shaojuan Su, Yindong Liu. Research on Ship Concurrent Collaborative Design based on PDM[J]. 2008 International Conference on Computational Intelligence and Security, 2008, 180-185.
DOI: 10.1109/cis.2008.179
Google Scholar
[3]
Omar, M., Challal, Y., Bouabdallah, A.: Reliable and fully distributed trust model for mobile ad hoc networks. Comput. Secur. 28, 199–214 (2009).
DOI: 10.1016/j.cose.2008.11.009
Google Scholar
[4]
Zhang, Z., Ho, P. -H., Nat-Abdesselam, F.: RADAR: a reputation-driven anomaly detection system for wireless mesh networks. Wirel. Netw. 16, 2221–2236 (2010).
DOI: 10.1007/s11276-010-0255-1
Google Scholar
[5]
Go´mez Ma´rmol, F., Girao, J., Martı´nez Pe´rez, G.: TRIMS, a privacy-aware trust and reputation model for identity management systems. Comput. Netw. 54, 2899–2912 (2010).
DOI: 10.1016/j.comnet.2010.07.020
Google Scholar
[6]
LIN You-di, ZHANG Rui-qian, JIXiang-yuan. Application in Auto-surface Reverse Engineering Based on Different Computer Supported Cooperation Design Platform [J]. Management technology, 2009, 2: 109- 112.
Google Scholar
[7]
Mao R, Miranker D, Sarvela P, et al. Clustering sequences in a metric space-the mobios project[C]. Edmonton, Canada: Poster of the 10th International Conference on Intelligent Systems for Molecular Biology, 2002, 3-7.
Google Scholar
[8]
Li J S, Su D Z Support Molules and System Structure of Web-Enabled Collaborative Environment, International Journal of Computer Integrated Manufacturing, 2007, 20(2~3): 265~279.
Google Scholar