{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,25]],"date-time":"2025-04-25T11:26:40Z","timestamp":1745580400318},"reference-count":46,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,10,1]],"date-time":"2011-10-01T00:00:00Z","timestamp":1317427200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Peer-to-Peer Netw. Appl."],"published-print":{"date-parts":[[2012,3]]},"DOI":"10.1007\/s12083-011-0111-9","type":"journal-article","created":{"date-parts":[[2011,9,30]],"date-time":"2011-09-30T10:52:12Z","timestamp":1317379932000},"page":"92-103","source":"Crossref","is-referenced-by-count":21,"title":["Peer profile based trust model for P2P systems using genetic algorithm"],"prefix":"10.1007","volume":"5","author":[{"given":"Chithra","family":"Selvaraj","sequence":"first","affiliation":[]},{"given":"Sheila","family":"Anand","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,10,1]]},"reference":[{"key":"111_CR1","unstructured":"Crespo A, Garcia-Molina H (2002) \u201cRouting indices for peer-to-peer systems\u201d \u2013 Proceedings of the International Conference on Distributed Computing Systems (ICDCS)"},{"key":"111_CR2","unstructured":"Singh A, Liu L (2003) \u201cTrustme - anonymous management of trust relationships in decentralized p2p systems\u201d - Third International Conference on Peer-to-Peer Computing (P2P\u201903)"},{"key":"111_CR3","doi-asserted-by":"crossref","unstructured":"Suryanarayana G, Diallo M, Erenkrantz J, Taylor RN (2006) \u201cArchitecting trust-enabled peer-to-peer file-sharing applications\u201d - ACM Crossroads, Issue on Software Engineering, Vol. 12, No. 4, Summer","DOI":"10.1145\/1144359.1144364"},{"key":"111_CR4","unstructured":"Figueiredo D, Shapiro J, Towsley D \u201cIncentives to promote availability in peer-to-peer anonymity systems\u201d - 13TH IEEE International Conference on Network Protocols (ICNP\u201905)"},{"key":"111_CR5","unstructured":"Li H, Singhal M (2007) \u201cTrust management in distributed systems\u201d, 0018-9162\/07 IEEE Journal \u2013 Feb 2007"},{"key":"111_CR6","unstructured":"Ding C, Yueguo C, Weiwei C \u201cA survey study on trust management in P2P systems\u201d - Department of Computer Science, School of Computing\u201d -National University of Singapore"},{"key":"111_CR7","unstructured":"Ren H (2006) \u201cComparison of trust model in peer to peer system\u201d \u2013 TKK T-110.5290 \u2013 Seminar on Network Security"},{"key":"111_CR8","unstructured":"Li W \u201cUsing genetic algorithm for network intrusion detection\u201d - Proceedings of the United States Department of Energy Cyber Security Group 2004 Training Conference"},{"key":"111_CR9","doi-asserted-by":"crossref","unstructured":"Xiao L, Liu Y, Ni LM (2005) Improving unstructured peer-to-peer systems by adaptive connection establishment. IEEE Trans Comput 54(9), September","DOI":"10.1109\/TC.2005.146"},{"key":"111_CR10","unstructured":"Stakhanova N, Ferrero S, Wong J, Cai Y \u201cA reputation-based trust management in peer-to-peer network systems\u201d - Iowa State University"},{"key":"111_CR11","unstructured":"Dabek F, Brunskill E, Kaashoek MF \u201cBuilding peer-to-peer systems with chord, a distributed lookup service\u201d \u2013 MIT laboratory DARPA sponsored project contract N66001-00-1-8933"},{"key":"111_CR12","doi-asserted-by":"crossref","unstructured":"Ratnasamy S, Francis P, Handley M, Karp R, Shenker S \u201cA scalable content-addressable network\u201d - Proceedings of SIGCOMM\u201901, San Diego, California, USA, August 2001","DOI":"10.1145\/383059.383072"},{"key":"111_CR13","unstructured":"Kaashoek MF, Karger DR - Koorde: \u201cA simple degree-optimal distributed hash table\u201d - IRIS project, supported by the National Science Foundation under Cooperative Agreement No.ANI-0225660"},{"key":"111_CR14","unstructured":"Godfrey B, Lakshminarayanan K, Surana S, Karp R, Stoica I (2004) \u201cLoad balancing in dynamic structured P2P Systems\u201d - 0-7803-8356-7\/04\/$20.00 (C) 2004 IEEE"},{"key":"111_CR15","unstructured":"Aberer K, Despotovic Z \u201cManaging trust in a peer-2-peer information system\u201d, In Proc. of the IX International Conference on Information and Knowledge Management, Atlanta, Georgia"},{"key":"111_CR16","doi-asserted-by":"crossref","unstructured":"Kamvar D, Schlosser MT \u201cEigen trust algorihm for reputatation management in P2P networks\u201d,-May 2003, ACM 1-58113-680-3\/03\/0005","DOI":"10.1145\/775240.775242"},{"key":"111_CR17","doi-asserted-by":"crossref","unstructured":"Cornelli F, Damiani E, Vimercati SC, Paraboschi S, Samarati P (2002) \u201cA reputation-based approach for choosing reliable resources in peer-to-peer networks\u201d In CCS\u201902, Washington DC, USA","DOI":"10.1145\/586110.586138"},{"issue":"4","key":"111_CR18","doi-asserted-by":"crossref","first-page":"840","DOI":"10.1109\/TKDE.2003.1209003","volume":"15","author":"E Damiani","year":"2003","unstructured":"Damiani E, di Vimercati SDC, Paraboschi S, Samarati P (2003) Managing and sharing servents\u2019 reputations in p2p systems. IEEE Trans Knowl Data Eng 15(4):840\u2013854","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"111_CR19","doi-asserted-by":"crossref","unstructured":"Lee S, Sherwood R (2003) \u201cCooperative peer groups in NICE\u201d, IEEE Infocom, San Francisco, USA","DOI":"10.1109\/INFCOM.2003.1208963"},{"key":"111_CR20","doi-asserted-by":"crossref","unstructured":"Donato D, Leonardi S, Paniccia M (2008) \u201cCombining transitive trust and negative opinions for better reputation management in social networks\u201d","DOI":"10.1145\/1244408.1244421"},{"key":"111_CR21","doi-asserted-by":"crossref","unstructured":"Dewan P, Dasgupta P (2010) \u201cP2P reputation management using distributed identities and decentralized recommendation chains\u201d, IEEE Trans Knowl Data Eng 22(7), July 2010","DOI":"10.1109\/TKDE.2009.45"},{"key":"111_CR22","unstructured":"Conner W, Iyengar A, Mikalsen T, Rouvellou I, Nahrstedt K\u201c A trust management framework for service-oriented environments\u201d, April 20\u201324, 2009, Madrid, Spain, ACM 978-1-60558-487-4\/09\/04"},{"key":"111_CR23","doi-asserted-by":"crossref","unstructured":"Prasad RVVSV, Srinivas V,Valli Kumari V, Raju KVSVN (2009) \u201cAn effective calculation of reputation in P2P networks\u201d, J Netw 4(5), July 2009","DOI":"10.4304\/jnw.4.5.332-342"},{"key":"111_CR24","unstructured":"Marsh S (1994) \u201cFormalising trust as a computational concept\u201d, Ph.D. Thesis, University of Stirling"},{"key":"111_CR25","doi-asserted-by":"crossref","unstructured":"Sabater J, Sierra C (2002) \u201cReputation and social network analysis in multi-agent systems\u201d, First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy","DOI":"10.1145\/544852.544854"},{"key":"111_CR26","unstructured":"Pujol J, Sanguesa R \u201cExtracting reputation in multi agent systems by means of social network topology\u201d, First International Joint Conference on Autonomous Agents and Multi-Agent Systems, Bologna, Italy"},{"key":"111_CR27","unstructured":"Blaze M, Feigenbaum J, Lacy J (1996) \u201cDecentralized trust management\u201d, Proceedings of the 1996 IEEE Symposium on Security and Privacy, pages 164\u2013173. IEEE Computer Society Press, May 1996"},{"key":"111_CR28","doi-asserted-by":"crossref","unstructured":"Blaze M, Feigenbaum J, Strauss M (1998) \u201cCompliance-checking in the PolicyMaker trust management system\u201d, Proceedings of Second International Conference on Financial Cryptography (FC\u201998), volume 1465 of Lecture Notes in Computer Science, pages 254\u2013274. Springer","DOI":"10.1007\/BFb0055488"},{"issue":"4","key":"111_CR29","doi-asserted-by":"crossref","first-page":"285","DOI":"10.3233\/JCS-2001-9402","volume":"9","author":"D Clarke","year":"2001","unstructured":"Clarke D, Elien J, Ellison C, Fredette M, Morcos A, Rivest RL (2001) Certificate chain discovery in SPKI\/SDSI. J Comput Secur 9(4):285\u2013322, Proc. of the IEEE Symposium on Security and Privacy, May 2002, pp. 114\u2013130","journal-title":"J Comput Secur"},{"key":"111_CR30","unstructured":"Li N, Mitchell JC, Winsborough WH (2004) \u201cDesign of a role based trust management framework\u201d- Proc. of LMW02"},{"key":"111_CR31","doi-asserted-by":"crossref","unstructured":"Li N, Grosof BN, Feigenbaum J \u201cA practically implementable and tractable delegation logic\u201d, Proceedings of the 2000 IEEE Symposium on Security and Privacy, pages 27\u201342. IEEE Computer Society Press","DOI":"10.2139\/ssrn.290100"},{"key":"111_CR32","doi-asserted-by":"crossref","unstructured":"Lim SY, Jones A (2008) \u201cNetwork anomaly detection system: the state of art of network behaviour analysis\u201d - International Conference on Convergence and Hybrid Information Technology","DOI":"10.1109\/ICHIT.2008.249"},{"key":"111_CR33","doi-asserted-by":"crossref","unstructured":"Tian D, Liu Y, Li B \u201cAnomaly intrusion detection methods for peer-to-peer system\u201d - 2007 IFIP International Conference on Network and Parallel Computing \u2013 Workshops","DOI":"10.1109\/NPC.2007.20"},{"key":"111_CR34","unstructured":"Bolla R, Canini M, Rapuzzi R, Sciuto M \u201cCharacterizing the network behavior of P2P traffic\u201d - DIST - Department of Communication, Computer and System Sciences, University of Genoa"},{"key":"111_CR35","unstructured":"Feng Q, Wu Y, Sun Y, Jiang J, Dai Yafei \u201cUser behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions\u201d - CNDS Lab, Peking University, Beijing, China"},{"key":"111_CR36","unstructured":"Stakhanova N, Basu S, Wong J, Stakhanov O \u201cTrust framework for P2P networks using peer-profile based anomaly technique\u201d - Proceedings of the 25th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW\u201905)"},{"key":"111_CR37","doi-asserted-by":"crossref","unstructured":"Chen Y, Cheng X-Q, Li Y, Guo L \u201cSurvey & taxonomy of feature selection algorithms in intrusion detection system\u201d - Inscrypt 2006 -2nd SKLOIS Conference on Information Security and Cryptology","DOI":"10.1007\/11937807_13"},{"key":"111_CR38","doi-asserted-by":"crossref","unstructured":"Mukkamala S, Janoski G, Sung AH (2002) \u201cIntrusion detection using neural networks and support vector machines\u201d, In Proceedings of IEEE International Joint Conference on Neural Networks, IEEE Computer Society Press, 2002, pp 1702-1707","DOI":"10.1109\/IJCNN.2002.1007774"},{"key":"111_CR39","unstructured":"Kim DS, Nguyen H-N, Park JS \u201cGenetic algorithm to improve SVM based network intrusion detection system\u201d - Proceedings of the 19th International Conference on Advanced Information Networking and Applications (AINA\u201905) -1550-445X\/05 2005 IEEE"},{"key":"111_CR40","unstructured":"Baldi M, Corno F, Rebaudengo M, Squillero G \u201cGA-based performance analysis of network protocols\u201d - funded by EU-funded FOST and CHARME projects"},{"key":"111_CR41","unstructured":"Mitchell M (2006) \u201cAn Introduction to Genetic Algorithms\u201d. MIT Press"},{"key":"111_CR42","doi-asserted-by":"crossref","unstructured":"Denning DE \u201cAn intrusion-detection model\u201d, IEEE Transactions on Software Engineering, pages 222\u2013232, February 1987","DOI":"10.1109\/TSE.1987.232894"},{"key":"111_CR43","unstructured":"Chen Xiao-su, Wu Jin-hua, Ni Jun \u201cGenetic-feedback algorithm based network security policy framework\u201d - 1-4244-1312-5\/07 IEEE 2278"},{"key":"111_CR44","unstructured":"Bui TN, Moon BR (1996) \u201cGenetic algorithm and graph partitioning\u201d - IEEE Transactions on Computers, VOL. 45, NO. 7, JULY 1996"},{"key":"111_CR45","doi-asserted-by":"crossref","unstructured":"Kalogeraki V, Gunopulos D, Zeinalipour-Yazti D \u2018A local search mechanism for peer-to-peer networks\u2019, CIKM\u201902, November 4\u20139, 2002, McLean, Virginia, USA","DOI":"10.1145\/584792.584842"},{"key":"111_CR46","unstructured":"Wallach DS \u201cA survey of peer-to-peer security issues\u201d, Rice University, Houston, USA"}],"container-title":["Peer-to-Peer Networking and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-011-0111-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12083-011-0111-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12083-011-0111-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,10]],"date-time":"2023-06-10T05:06:48Z","timestamp":1686373608000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12083-011-0111-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,1]]},"references-count":46,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2012,3]]}},"alternative-id":["111"],"URL":"https:\/\/doi.org\/10.1007\/s12083-011-0111-9","relation":{},"ISSN":["1936-6442","1936-6450"],"issn-type":[{"value":"1936-6442","type":"print"},{"value":"1936-6450","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,10,1]]}}}