2010
DOI: 10.1016/j.comcom.2010.01.028
|View full text |Cite
|
Sign up to set email alerts
|

A secure model for controlling the hubs in P2P wireless network based on trust value

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 16 publications
0
2
0
Order By: Relevance
“…After the difference operation with a period of 12 on dx t , a new sequence d ′ x t � D(x t , 1, 12) is obtained [28]. As shown in Figure 4, the 12th-order autocorrelation coefficient of the second-order difference sequence d ′ x t is close to 0, indicating that the periodic factor dx t is fully extracted [29][30][31]. An augmented Dickey-Fuller (ADF) test was performed on the second-order difference sequence d ′ x t , and the results are provided in Table 1.…”
Section: Sarima Modelmentioning
confidence: 91%
“…After the difference operation with a period of 12 on dx t , a new sequence d ′ x t � D(x t , 1, 12) is obtained [28]. As shown in Figure 4, the 12th-order autocorrelation coefficient of the second-order difference sequence d ′ x t is close to 0, indicating that the periodic factor dx t is fully extracted [29][30][31]. An augmented Dickey-Fuller (ADF) test was performed on the second-order difference sequence d ′ x t , and the results are provided in Table 1.…”
Section: Sarima Modelmentioning
confidence: 91%
“…Subsequently, Adul. Rah man and others set up an evaluation model of the trust degree based on distributed feedback informat ion [1][2][3]. After that, In accordance with the problems in trust description, many scholars put forward different trust management models under P2P environ ment with respective view [4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%