Research Article
A Novel Iterative and Dynamic Trust Computing Model for Large Scaled P2P Networks
Figure 7
Simulation for defending against malicious attacks.
(a) IDTrust against individual malicious behaviors |
(b) IDTrust against collusion malicious behaviors |