[1] 林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45(12):2033-2043. Lin Chuang, Tian Liqin, Wang Yuanzhuo. Research on trustworthiness of user behavior in trusted networks[J]. Computer Research and Development, 2008, 45(12):2033-2043.
[2] 冀铁果, 田立勤, 胡志兴, 等. 可信网络中一种基于AHP的用户行为评估方法[J]. 计算机工程与应用, 2007, 43(19):123-127. Ji Tieguo, Tian Liqin, Hu Zhixing, et al. A user behavior assessment method based on AHP in trusted network[J]. Computer Engineering and Applications, 2007, 43(19):123-127.
[3] 马军煜, 赵知劲, 叶学义. 基于模糊决策分析的可信网络用户行为评估[J]. 计算机工程, 2011, 37(13):125-128. Ma Junyu, Zhao Zhijin, Ye Xueyi. Evaluation of user behavior in trusted networks based on fuzzy decision analysis[J]. Computer Engineering, 2011, 37(13):125-128.
[4] 郭树凯, 田立勤, 沈学利. FAHP在用户行为信任评价中的研究[J]. 计算机工程与应用, 2011, 47(12):59-61. Guo Shukai, Tian Liqin, Shen Xueli. Research on FAHP in user behavior trust evaluation[J]. Computer Engineering and Applications, 2011, 4(12):59-61.
[5] Li Wen, Ping Lingdi, Lu Kuijun, et al. Trust model of users behavior in trustworthy internet[C]//Proc of 2009 WASE Int Conf on Information Engineering. Piscataway, NJ:IEEE, 2009:403-406.
[6] Liu Wu, Ren Ping, Liu Ke, et al. User cooperation trust model and its application in network security management[C]//Proc of 2011 Eighth Int Conf on Fuzzy Systems and Knowledge Discovery (FSKD). Piscataway, NJ:IEEE, 2011:2335-2339.
[7] Brosso I, La Neve A, Bressan G, et al. A continuous authentication system based on user behavior analysis[C]//Proc of 2010 Int Conf on Availability, Reliability, and Security. Piscataway, NJ:IEEE, 2010:380-385.
[8] Tzu-Yu Chuang. Trust with social network learning in E-commerce[C]//Proc of 2010 IEEE International Conference on Communications Workshops.[S.l.]:[s.n.], 2010:1-6.
[9] Noor T H, Sheng Q Z, Alfazi A. Reputation attacks detection for effective trust assessment among cloud services[C]//Proc of 201312th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.[S. l.]:[s. n.], 2013:469-476.
[10] 陈郑伟. 基于AJAX的点击流技术以及在电子政务中的应用[D]. 北京:首都师范大学, 2007.
[11] 田俊峰, 曹迅. 基于多部图的云用户行为认定模型[J]. 计算机研究与发展, 2014, 51(10):2308-2317. Tian Junfeng, Cao Xun. Multi-Partition-based cloud user behavior recognition model[J]. Computer Research and Development, 2014, 51(10):2308-2317. |