![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Self-nominating trust model based on hierarchical fuzzy systems for peer-to-peer networks
Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are ext...
-
Article
A topological potential weighted community-based recommendation trust model for P2P networks
Peer-to-Peer (P2P) technology has experienced its great popularity for resource sharing in current network services. However, lacking of prior experience and knowledge about other peers’ reputation, P2P suffer...
-
Chapter and Conference Paper
Rumor Spreading and Security Monitoring in Complex Networks
Rumor spreading is a typical phenomenon which poses security threats. Therefore, it is necessary to study the evolution mechanism of rumor spreading in complex networks. Considering the hesitating state in rum...