F. Cai, T. Fugui, C. Yongquan, L. Ming, and P. Bing, Grey Theory Based Nodes Risk Assessment in P2P Networks, 2009 IEEE International Symposium on Parallel and Distributed Processing with Applications, pp.479-483, 2009.
DOI : 10.1109/ISPA.2009.45

B. Chun, J. Lee, H. Weatherspoon, and B. N. Chun, Netbait: a Distributed Worm Detection Service, 2003.

C. Duma, M. Karresand, N. Shahmehri, and G. Caronni, A Trust-Aware, P2P-Based Overlay for Intrusion Detection, 17th International Conference on Database and Expert Systems Applications (DEXA'06), pp.692-697, 2006.
DOI : 10.1109/DEXA.2006.21

C. J. Fung, O. Baysal, J. Zhang, I. Aib, and R. Boutaba, Trust Management for Host-Based Collaborative Intrusion Detection, DSOM 2008, pp.109-122, 2008.
DOI : 10.1145/1151454.1151495

C. J. Fung, . J. Zhang, I. Aib, and R. Boutaba, Robust and scalable trust management for collaborative intrusion detection, 2009 IFIP/IEEE International Symposium on Integrated Network Management, pp.33-40, 2009.
DOI : 10.1109/INM.2009.5188784

C. J. Fung, Q. Zhu, R. Boutaba, and T. Basar, Bayesian decision aggregation in collaborative intrusion detection networks, 2010 IEEE Network Operations and Management Symposium, NOMS 2010, pp.349-356, 2010.
DOI : 10.1109/NOMS.2010.5488489

A. K. Ghosh, J. Wanken, and F. Charron, Detecting anomalous and unknown intrusions against programs, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.259-267, 1998.
DOI : 10.1109/CSAC.1998.738646

R. Huebsch, B. N. Chun, J. M. Hellerstein, B. T. Loo, P. Maniatis et al., The Architecture of PIER: an Internet- Scale Query Processor, Proceedings of the 2005 Conference on Innovative Data Systems Research (CIDR), pp.28-43, 2005.

R. Janakiraman and M. Zhang, Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., pp.226-231, 2003.
DOI : 10.1109/ENABL.2003.1231412

J. Li, R. Li, and J. Kato, Future Trust Management Framework for Mobile Ad Hoc Networks, IEEE Communications Magazine, vol.46, issue.2, pp.108-114, 2008.

Z. Li, Y. Chen, and A. Beach, Towards scalable and robust distributed intrusion alert fusion with good load balancing, Proceedings of the 2006 SIGCOMM workshop on Large-scale attack defense , LSAD '06, pp.115-122, 2006.
DOI : 10.1145/1162666.1162669

W. Li, Y. Meng, and L. Kwok, Enhancing Trust Evaluation Using Intrusion Sensitivity in Collaborative Intrusion Detection Networks: Feasibility and Challenges, 2013 Ninth International Conference on Computational Intelligence and Security, pp.518-522, 2013.
DOI : 10.1109/CIS.2013.115

Y. Meng and L. F. Kwok, Adaptive False Alarm Filter Using Machine Learning in Intrusion Detection, Proceddings of the 6th International Conference on Intelligent Systems and Knowledge Engineering (ISKE), pp.573-584, 2011.
DOI : 10.1007/978-3-642-25658-5_68

Y. Meng, L. Kwok, and W. Li, Towards Designing Packet Filter with A Trustbased Approach Using Bayesian Inference in Network Intrusion Detection, Proceedings of The 8th International Conference on Security and Privacy in Communication Networks (SECURECOMM), pp.203-221, 2012.

C. Papadopoulos, R. Lindell, J. Mehringer, A. Hussain, and R. Govindan, COS- SACK: Coordinated Suppression of Simultaneous Attacks, Proceedings of the 2003 DARPA Information Survivability Conference and Exposition (DISCEX), pp.94-96, 2003.

P. A. Porras and P. G. Neumann, Emerald: Event Monitoring Enabling Responses to Anomalous Live Disturbances, Proceedings of the 20th National Information Systems Security Conference, pp.353-365, 1997.

Z. Qin, Z. Jia, and X. Chen, Fuzzy Dynamic Programming Based Trusted Routing Decision in Mobile Ad Hoc Networks, 2008 Fifth IEEE International Symposium on Embedded Computing, pp.180-185, 2008.
DOI : 10.1109/SEC.2008.46

D. Quercia, S. Hailes, and L. Capra, B-Trust: Bayesian Trust Framework for Pervasive Computing, LNCS, vol.3986, pp.298-312, 2006.
DOI : 10.1007/11755593_22

M. Roesch, Snort: Lightweight Intrusion Detection for Networks, Proceedings of the 13th USENIX Conference on System Administration (LISA), pp.229-238, 1999.

P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman, Reputation systems, Communications of the ACM, vol.43, issue.12, pp.45-48, 2000.
DOI : 10.1145/355112.355122

K. Scarfone and P. Mell, Guide to Intrusion Detection and Prevention Systems (IDPS), pp.800-894, 2007.
DOI : 10.6028/NIST.SP.800-94

S. R. Snapp, DIDS (Distributed Intrusion Detection System) -Motivation, Architecture, and An Early Prototype, Proceedings of the 14th National Computer Security Conference, pp.167-176, 1991.

Y. L. Sun, W. Yu, Z. Han, and K. Liu, Information Theoretic Framework of Trust Modelling and Evaluation for Ad Hoc Networks, IEEE Journal of Selected Areas in Communications, vol.24, issue.2, pp.305-317, 2006.

T. A. Tuan, A Game-Theoretic Analysis of Trust Management in P2P Systems, 2006 First International Conference on Communications and Electronics, pp.130-134, 2006.
DOI : 10.1109/CCE.2006.350832

G. Vigna and R. A. Kemmerer, NetSTAT: a network-based intrusion detection approach, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217), pp.25-34, 1998.
DOI : 10.1109/CSAC.1998.738566

Y. Wu, B. Foo, Y. Mei, and S. Bagchi, Collaborative Intrusion Detection System (CIDS): A Framework for Accurate and Efficient IDS, Proceedings of the 2003 Annual Computer Security Applications Conference (ACSAC), pp.234-244, 2003.

V. Yegneswaran, P. Barford, and S. Jha, Global Intrusion Detection in the DOMINO Overlay System, Proceedings of the 2004 Network and Distributed System Security Symposium (NDSS), pp.1-17, 2004.