PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management
暂无分享,去创建一个
[1] Wilfried N. Gansterer,et al. Multi-Level Reputation-Based Greylisting , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[2] Hong Peng,et al. Research on a Naive Bayesian Based Short Message Filtering System , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[3] Yue Shen,et al. A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..
[4] Zheng Yan,et al. Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.
[5] Lise Getoor,et al. Trusting spam reporters: A reporter-based reputation system for email filtering , 2008, TOIS.
[6] Raimo Kantola,et al. Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory , 2014, Comput. Secur..
[7] Xianchao Zhang,et al. Automatic seed set expansion for trust propagation based anti-spamming algorithms , 2009, WIDM.
[8] Tie-Yan Liu,et al. BrowseRank: letting web users vote for page importance , 2008, SIGIR '08.
[9] Morris Sloman,et al. A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.
[10] Raimo Kantola,et al. Unwanted Traffic Control via Hybrid Trust Management , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[11] Viswanath Venkatesh,et al. Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..
[12] Jianping Wu,et al. A Trust and Reputation based Anti-SPIM Method , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[13] Raimo Kantola,et al. Unwanted Content Control via Trust Management in Pervasive Social Networking , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.
[14] Hector Garcia-Molina,et al. Combating Web Spam with TrustRank , 2004, VLDB.
[15] Fred D. Davis. Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..
[16] Brian D. Davison,et al. Topical TrustRank: using topicality to combat web spam , 2006, WWW '06.
[17] Raimo Kantola,et al. A generic solution for unwanted traffic control through trust management , 2014, New Rev. Hypermedia Multim..
[18] Jimmy McGibney,et al. A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[19] Gustavo Alonso,et al. Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..
[20] Yuchun Tang,et al. Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[21] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[22] Roberto A. Rocha,et al. Evaluation of a flowchart-based EHR query system: A case study of RetroGuide , 2010, J. Biomed. Informatics.
[23] Haiyun Luo,et al. Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.
[24] Sudhir Aggarwal,et al. Incorporating accountability into internet email , 2009, SAC '09.
[25] Xu Jingdong,et al. MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuard , 2010, 2010 International Conference on Communications and Mobile Computing.
[26] Jörg Ott,et al. Author's Personal Copy Pervasive and Mobile Computing Floating Content for Probabilistic Information Sharing , 2022 .
[27] Ram Dantu,et al. Socio-technical defense against voice spamming , 2007, TAAS.
[28] Wu Liu,et al. IPGroupRep: A Novel Reputation Based System for Anti-Spam , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.
[29] Raimo Kantola,et al. Unwanted Traffic Control via Global Trust Management , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[30] Prasant Mohapatra,et al. Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.
[31] Yue Shen,et al. PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.
[32] Liang Chen,et al. TruSMS: A trustworthy SMS spam control system based on trust management , 2015, Future Gener. Comput. Syst..
[33] Haiyun Luo,et al. URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.