Tracking Social Networks Events
暂无分享,去创建一个
[1] Haiying Shen,et al. Leveraging Social Networks for Effective Spam Filtering , 2014, IEEE Transactions on Computers.
[2] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[3] Marc Lemercier,et al. A dynamic approach to detecting suspicious profiles on social platforms , 2013, 2013 IEEE International Conference on Communications Workshops (ICC).
[4] John Kelley,et al. WhozThat? evolving an ecosystem for context-aware mobile social networks , 2008, IEEE Network.
[5] Hassan Takabi,et al. Towards active detection of identity clone attacks on online social networks , 2011, CODASPY '11.
[6] Paulo Salvador,et al. Detection of Illicit Network Activities Based on Multivariate Gaussian Fitting of Multi-Scale Traffic Characteristics , 2011, 2011 IEEE International Conference on Communications (ICC).
[7] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[8] Rami Puzis,et al. Deployment of DNIDS in Social Networks , 2007, 2007 IEEE Intelligence and Security Informatics.
[9] Santiago Eibe,et al. A social network activity recommender system for ubiquitous devices , 2011, 2011 11th International Conference on Intelligent Systems Design and Applications.
[10] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[11] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..
[12] Shah Mahmood,et al. New Privacy Threats for Facebook and Twitter Users , 2012, 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing.
[13] Krishna P. Gummadi,et al. Growth of the flickr social network , 2008, WOSN '08.
[14] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[15] Katarzyna Musial,et al. Multidimensional Social Network in the Social Recommender System , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[16] George Varghese,et al. I seek you: searching and matching individuals in social networks , 2009, WIDM.
[17] Xiaowei Ying,et al. Spectrum based fraud detection in social networks , 2011, ICDE.
[18] Chris Jermaine,et al. The Latent Community Model for Detecting Sybils in Social Networks , 2012, NDSS.