Research Article

A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks

Figure 7

Simulation for defending against malicious attacks.
(a) IDTrust against individual malicious behaviors
(b) IDTrust against collusion malicious behaviors