SybilShield: An agent-aided social network-based Sybil defense among multiple communities
暂无分享,去创建一个
Yiwei Thomas Hou | Wenjing Lou | Shucheng Yu | Lu Shi | Shucheng Yu | Lu Shi | Wenjing Lou | Y. Hou
[1] Brian Neil Levine,et al. A Survey of Solutions to the Sybil Attack , 2006 .
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[4] Lakshminarayanan Subramanian,et al. Sybil-Resilient Online Content Voting , 2009, NSDI.
[5] Ravi Kumar,et al. Structure and evolution of online social networks , 2006, KDD '06.
[6] Chandra Prakash,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2011 .
[7] Franco Scarselli,et al. Inside PageRank , 2005, TOIT.
[8] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[9] Aziz Mohaisen,et al. Measuring the mixing time of social graphs , 2010, IMC '10.
[10] Aziz Mohaisen,et al. Understanding Social Networks Properties for Trustworthy Computing , 2011, 2011 31st International Conference on Distributed Computing Systems Workshops.
[11] Daniele Quercia,et al. Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[13] Aziz Mohaisen,et al. Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.
[14] Krishna P. Gummadi,et al. An analysis of social network-based Sybil defenses , 2010, SIGCOMM 2010.
[15] Ben Y. Zhao,et al. An Empirical Study of Collusion Behavior in the Maze P2P File-Sharing System , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).
[16] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[17] M. Frans Kaashoek,et al. Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.
[18] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[19] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[20] Seungyeop Han,et al. Analysis of topological characteristics of huge online social networking services , 2007, WWW '07.
[21] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[22] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[23] Fengyuan Xu,et al. SybilDefender: Defend against sybil attacks in large social networks , 2012, 2012 Proceedings IEEE INFOCOM.