References
- Guo Q, Guo Y, Guo C. Alternative ranking based on fuzzy similarity in group decision-making. J Southwest Jiaotong Univ. 2010;45(2):105–108.
- Zeng Y, Sun Y, Xing L, et al. Trust-aware privacy evaluation in online social networks. IEEE ICC 2014-communication and information systems security symposium. University of Wollongong, Australia, p. 932–938.
- Yan Z, Yi W. Research on college students' online social behavior based on big data. J Electron Technol Softw Eng. 2014;23:30–31.
- Xingang Z, Baoping W, Xindang C. A hierarchical network security situation assessment model based on information fusion. Netw Sec Technol Appl. 2012;9(04):1072–1074.
- Deepa R, Swamynathan S. A trust model for directory-based service discovery in mobile ad hoc networks. SNDS 2014, CCIS 420. Berlin: Springer; 2014. p. 115–126.
- Qingsong C, Jianwei N, Mingzhu L. Method for evaluating node information dissemination ability in social network of opportunity. J Softw. 2012;23:49–58.
- Kuter U, Golbeck J. Sunny: a new algorithm for trust inference in social networks using probabilistic confidence model. Proceedings of the conference on artificial intelligence (AAAI 07); Vancouver, British Columbia, 2007. p. 1377–1382.
- Liu G, Wang Y, Orgun MA, et al. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans Ser Comput. 2013 Apr–Jun;6(2):152–166. doi: 10.1109/TSC.2011.58
- Jiang W, Wang G, Wu J. Generating trusted graphs for trust evaluation in online social networks. Future Generation Comput Sys. 2014;31:48–58. doi: 10.1016/j.future.2012.06.010
- Paul S, Pan J, Jain R. Architectures for the future networks and the next generation Internet: a survey. Comput Commun. 2011;34(1):2–42. doi: 10.1016/j.comcom.2010.08.001
- Wang G, Wu J. FlowTrust: trust inference with network flows. Front Comput Sci China. 2011;5(2):181–194. doi: 10.1007/s11704-011-0323-4
- Mrmol FG, Prez GM. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput Stand Interfaces. 2010;32(4):185–196. doi: 10.1016/j.csi.2010.01.003
- Shafiq MZ, Liu AX. Modeling morphology of social network cascades. arXiv preprint arXiv:1302.2376, 2013.
- Caverleea J, Liu L, Web S. The socialtrust framework for trusted social information management: architecture and algorithms. Inf Sci. 2010;180(1):95–112. doi: 10.1016/j.ins.2009.06.027
- Liu H, Lim E-P, Lauw HW, et al. Predicting trusts among users of online communities: an epinions case study. Proceedings of the ACM conference on electronic commerce (EC); Chicago, IL, 2008. p. 310–319.
- Walter F, Battiston S, Schweitzer F. A model of a trust- based recommendation system on a social network. Auton Agent Multi Agent Syst J. 2008 Feb;16(1):57–74. doi: 10.1007/s10458-007-9021-x
- Liu G, Yang Q, Wang H, et al. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. IEEE Infocom 2014 – IEEE conference on computer communications. Toronto, ON, Canada, p. 1698–1706.
- Xu Zhi. Application of Bayesian method based on maximum entropy principle in the analysis of measurement data. J Inner Mong Agric Univ. 2013;34(1):116–122.
- Tian CQ, Jiang JH, Hu ZG, et al. A novel super-peer based trust model for peer-to-peer networkss. Chin J Comput. 2010;33(2):345–355. doi: 10.3724/SP.J.1016..2010.00345
- Deepa R, Swamynathan S. A trust model for directory-based service discovery in mobile ad hoc networks. SNDS 2014, CCIS 420; Berlin: Springer; 2014. p. 115–126.
- Chen Z, Li L, Gui J, et al. KFTrust: P2P trust model based on evaluation rank using Kalman filter. Int J Auton Adapt Commun Sys. 2015;1(8):268–287. doi: 10.1504/IJAACS.2015.069566
- Zhong Qi, Qi Wei. Regional flexibility evaluation model based on situation management. Econ Manag. 2010;8:32–37.
- Tang W, Chen Z. Research of subjective trust management model based on the fuzzy set theory. J Softw. 2003;14(8):1401–1408.