2Rubin S,Christodorescu M,Ganapathy V,et al.An auctioning reputation system based on anomaly[C]//Proceedings of the 12th ACM Conference on Computer and Communications Security.ACM,2005:270-279.
3Hendrikx F,Bubendorfer K,Chard R.Reputation systems:A survey and taxonomy[J].Journal of Parallel and Distributed Computing,2015,75:184-197.
4Mohanty B K,Passi K.Agent based e-commerce systems that react to buyers,feedbacks-A fuzzy approach[J].International Journal of approximate reasoning,2010,51(8):948-963.
5Allen J.Case study:implementing MT for the translation of pre-sales marketing and post-sales software deployment documentation at Mycom International[M],Machine Translation:From Real Users to Research.Springer Berlin Heidelberg,2004:1-6.
6Sun S,Wang 丁,Chen L,et al.Understanding Consumers,trust in Internet Financial Sales Platform:Evidence from a YueBaoM[C]// Proceeding of Pacific Asia Conference on Information System(PACIS).2014.
7Li W,Chen H.Identifying Top Sellers In Underground Economy Using Deep Learning-Based Sentiment Analysis[C]//2014 IEEE Joint Intelligence and Security Informatics Conference(JISIC).IEEE,2014:64-67.
8Liberatore M,Levine B N,Shields C.Strengthening forensic investigations of child pornography on p2p networks[C].Proceedings of the 6th International Conference.ACM,2010:19.
9Haggerty J,Llewellyn-Jones D,Taylor M.Forweb:file fingerprinting for automated network forensics investigations Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications,Information,and Multimedia and Workshop.ICST(Institute for Com-puter Sciences,Social-Informatics and Telecommunications Engineering),2008:29.
10Nair A S V,Ajeena B A S.A Log Based Strategy for Fingerprinting and Forensic Investigation of Online Cyber Crimes[Cj// Proceedings of the 2014 International Conference on Interdisciplinary Advances in Applied Computing.ACM,2014:7.