K. Hoffman, D. Zage, and C. Nita-rotaru, A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, p.42, 2009.
DOI : 10.1145/1592451.1592452

B. Ksiezopolski and Z. Kotulski, Adaptable security mechanism for dynamic environments, Computers & Security, vol.26, issue.3, pp.246-255, 2007.
DOI : 10.1016/j.cose.2006.11.002

B. Ksiezopolski, Z. Kotulski, and P. Szalachowski, Adaptive Approach to Network Security, Communications in Computer and Information Science, vol.14, issue.3, pp.233-241, 2009.
DOI : 10.1016/j.cose.2004.11.002

B. Ksiezopolski and . Qop-ml, QoP-ML: Quality of protection modelling language for cryptographic protocols, Computers & Security, vol.31, issue.4, pp.569-596, 2012.
DOI : 10.1016/j.cose.2012.01.006

B. Ksiezopolski, D. Rusinek, and A. Wierzbicki, On the efficiency modelling of cryptographic protocols by means of the Quality of Protection Modelling Language (QoP-ML). ICT-EurAsia 2013, LNCS, vol.7804, pp.261-270, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01480233

A. Schlosser, M. Voss, and L. Brckner, On the Simulation of Global Reputation Systems, Journal of Artificial Societies and Social Simulation, vol.9, issue.1, 2006.