5Singh P K, Lakhotin A. Static verification of worm and virus behavior in binary executables using model checking[C]//Information Assurance Workshop, IEEE System, Man and Cybernetics Society, 2003: 298-300.
6Kamvar S D, Schlosser M T, Molina H G. The Eigen trust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th Int'l World Wide Web Conf. 2003: 640-651.