Mitigating the Malicious Trust Expansion in Social Network Service
暂无分享,去创建一个
[1] James A. Hendler,et al. Inferring binary trust relationships in Web-based social networks , 2006, TOIT.
[2] Morteza Amini,et al. Trust Inference in Web-Based Social Networks Using Resistive Networks , 2008, 2008 Third International Conference on Internet and Web Applications and Services.
[3] Georgia Koutrika,et al. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.
[4] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[5] Jennifer Golbeck,et al. Inferring Trust Relationships in Web-Based Social Networks , 2006 .
[6] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[7] Anna Cinzia Squicciarini,et al. WWW 2009 MADRID! Track: Security and Privacy / Session: Web Privacy Collective Privacy Management in Social Networks , 2022 .
[8] Mikhail J. Atallah,et al. Attribute-Based Access Control with Hidden Policies and Hidden Credentials , 2006, IEEE Transactions on Computers.
[9] Georg Lausen,et al. Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.
[10] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[11] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[12] David S. Rosenblum,et al. What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.
[13] Yingjiu Li,et al. An attribute-based access matrix model , 2005, SAC '05.
[14] Calton Pu,et al. Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.
[15] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.