-
3
-
-
2442549069
-
-
CAHILL, V., SHAND, B., GRAY, E., DIMMOCK, N., TWIGG, A., BACON, J., ENGLISH, C., WAGEALLA, W., TERZIS, S., NOXON, P., BRYCE, C., SERUGENDO, G.M., SEIGNEURL, J. M., CARBONE, M., KRUKOW, K., JENSON, C., CHEN, Y., AND NIELSEN, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervas. Comput. 2, 3, 52-61.
-
CAHILL, V., SHAND, B., GRAY, E., DIMMOCK, N., TWIGG, A., BACON, J., ENGLISH, C., WAGEALLA, W., TERZIS, S., NOXON, P., BRYCE, C., SERUGENDO, G.M., SEIGNEURL, J. M., CARBONE, M., KRUKOW, K., JENSON, C., CHEN, Y., AND NIELSEN, M. 2003. Using trust for secure collaboration in uncertain environments. IEEE Pervas. Comput. 2, 3, 52-61.
-
-
-
-
5
-
-
13244267079
-
-
DAMIANI, E., VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2004. P2P-Based collaborative spam detection and filtering. In Proceedings of 4th IEEE Conference on Peer-to-Peer Computing (P2P'04) (Zurich, Switzerland). IEEE Computer Society Press, Los Alamitos, CA.
-
DAMIANI, E., VIMERCATI, S. D. C., PARABOSCHI, S., AND SAMARATI, P. 2004. P2P-Based collaborative spam detection and filtering. In Proceedings of 4th IEEE Conference on Peer-to-Peer Computing (P2P'04) (Zurich, Switzerland). IEEE Computer Society Press, Los Alamitos, CA.
-
-
-
-
9
-
-
33947683962
-
-
EVETT, D. 2006. Spam Statistics 2006. http://spam-filter-review. toptenreviews.com/spam-statistics.html.
-
(2006)
Spam Statistics 2006
-
-
EVETT, D.1
-
11
-
-
33947631504
-
-
GOECKS, J. AND MYNATT E. D. 2002. Enabling privacy management in ubiquitous computing environments through trust and reputation systems. In. Proceedings of the Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW.
-
GOECKS, J. AND MYNATT E. D. 2002. Enabling privacy management in ubiquitous computing environments through trust and reputation systems. In. Proceedings of the Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW.
-
-
-
-
14
-
-
33947703258
-
Execution contexts for determining trust in a higher-order it calculus. School of Computing
-
HEPBURN, M. AND WRIGHT, D. 2003. Execution contexts for determining trust in a higher-order it calculus. School of Computing, University of Tasmania Technical Report.
-
(2003)
University of Tasmania Technical Report
-
-
HEPBURN, M.1
WRIGHT, D.2
-
15
-
-
33645022148
-
A survey of trust and reputation systems for online service provision
-
JØSANG, A., ISMAIL, R., AND BOYD, C. 2006. A survey of trust and reputation systems for online service provision. Decision Support Systems.
-
(2006)
Decision Support Systems
-
-
JØSANG, A.1
ISMAIL, R.2
BOYD, C.3
-
16
-
-
33947691034
-
From simulations to theorems: A position paper on research in the field of computational trust
-
KRUKOW, K. AND NIELSEN, M. 2006. From simulations to theorems: A position paper on research in the field of computational trust. In Proceedings of Formal Aspects in Security and Trust.
-
(2006)
Proceedings of Formal Aspects in Security and Trust
-
-
KRUKOW, K.1
NIELSEN, M.2
-
17
-
-
33947706887
-
-
LACY, S. 2006. Is your VoIP phone vulnerable?http://www. businessweek.com/technology/content/jun2006/tc20060613_799282.htm
-
LACY, S. 2006. Is your VoIP phone vulnerable?http://www. businessweek.com/technology/content/jun2006/tc20060613_799282.htm
-
-
-
-
18
-
-
33947709612
-
Resilient packet ring: Enabling VoIP delivery
-
LANCASTER, K. 2003. Resilient packet ring: Enabling VoIP delivery. Internet Telephony.
-
(2003)
Internet Telephony
-
-
LANCASTER, K.1
-
20
-
-
33746649806
-
Detection and mitigation of spam in IP telephony networks using signaling protocol analysis
-
IEEE Computer Society Press, Los Alamitos, CA
-
MACINTOSH, R. AND VINOKUROV, D. 2005. Detection and mitigation of spam in IP telephony networks using signaling protocol analysis. In Proceedings of the IEEE Symposium on Advances in Wired and Wireless Communication. IEEE Computer Society Press, Los Alamitos, CA. 49-52.
-
(2005)
Proceedings of the IEEE Symposium on Advances in Wired and Wireless Communication
, pp. 49-52
-
-
MACINTOSH, R.1
VINOKUROV, D.2
-
23
-
-
33947674313
-
SIP extensions for SPIT identification
-
draft-niccolini-sipping-feedback-spit-02
-
NICCOLINI, S., TARTARELLI, S., STIEMERLING, M., AND SRIVASTAVA, S. 2006. SIP extensions for SPIT identification. IETF SIP draft, draft-niccolini-sipping-feedback-spit-02.
-
(2006)
IETF SIP draft
-
-
NICCOLINI, S.1
TARTARELLI, S.2
STIEMERLING, M.3
SRIVASTAVA, S.4
-
25
-
-
3042874802
-
Trust in the λ calculus
-
ORBAEK, P. AND PALSBERG, J. 1997. Trust in the λ calculus. Funct. Prog. 7, 6, 557-591.
-
(1997)
Funct. Prog
, vol.7
, Issue.6
, pp. 557-591
-
-
ORBAEK, P.1
PALSBERG, J.2
-
27
-
-
33947696300
-
-
RAGO, S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications - Q3 Topical Report, Isuppli.
-
RAGO, S. 2006. VoIP spells equipment oppurtunities now. Networking and Optical Communications - Q3 Topical Report, Isuppli.
-
-
-
-
31
-
-
33845791268
-
Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages
-
RIGOUTSOS, I. AND HUYNH, T. 2004. Chung-Kwei: A pattern discovery based system for the automatic identification of unsolicited e-mail messages. In Proceedings of the 1st Conference on E-mail and Anti-Spam.
-
(2004)
Proceedings of the 1st Conference on E-mail and Anti-Spam
-
-
RIGOUTSOS, I.1
HUYNH, T.2
-
32
-
-
0037984544
-
-
RFC 3261
-
ROSENBERG, J., SHULZRINNE, H., CAMERILLO, G., JOHNSTON, A., PETERSON, J., SPARKS, R., HANDLEY, M., AND SCHOOLER, E. 2002. Session Initiation Protocol. RFC 3261
-
(2002)
Session Initiation Protocol
-
-
ROSENBERG, J.1
SHULZRINNE, H.2
CAMERILLO, G.3
JOHNSTON, A.4
PETERSON, J.5
SPARKS, R.6
HANDLEY, M.7
SCHOOLER, E.8
-
33
-
-
33947689306
-
The session initiation protocol (SIP) and spam
-
draft-ietf-sipping-spam-02.txt
-
ROSENBERG, J., JENNINGS, C., AND PETERSON, J. 2006. The session initiation protocol (SIP) and spam. Spam Draft - draft-ietf-sipping-spam-02.txt
-
(2006)
Spam Draft
-
-
ROSENBERG, J.1
JENNINGS, C.2
PETERSON, J.3
-
34
-
-
85006210403
-
Review on computational trust and reputation models
-
SABATER, J. AND SIERRA, C. 2005. Review on computational trust and reputation models. Artifi. Intell. Rev. 24, 33-60.
-
(2005)
Artifi. Intell. Rev
, vol.24
, pp. 33-60
-
-
SABATER, J.1
SIERRA, C.2
-
35
-
-
33947691771
-
-
SAHAMI, M., DUMAIS, S., HECKERMAN, D., AND HORVITZ, E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization - Papers from the AAAI Workshop, pp. 55-62, Madison, WI. AAAI Technical Report WS-98-05.
-
SAHAMI, M., DUMAIS, S., HECKERMAN, D., AND HORVITZ, E. 1998. A Bayesian approach to filtering junk e-mail. Learning for Text Categorization - Papers from the AAAI Workshop, pp. 55-62, Madison, WI. AAAI Technical Report WS-98-05.
-
-
-
-
36
-
-
1542634596
-
A memory-based approach to anti-spam filtering for mailing lists
-
SAKKIS, G., ANDROUTSOPOULOS, I., PALIOURAS, G., KARKALETSIS, V., SPYROPOULOS, C. D., AND STAMATOPOULOS, P. 2003. A memory-based approach to anti-spam filtering for mailing lists. Inf. Retrieval.
-
(2003)
Inf. Retrieval
-
-
SAKKIS, G.1
ANDROUTSOPOULOS, I.2
PALIOURAS, G.3
KARKALETSIS, V.4
SPYROPOULOS, C.D.5
STAMATOPOULOS, P.6
-
37
-
-
33947706346
-
-
SEIGNEUR, J. M., DIMMOCK, N., BRYCE, C., AND JENSEN, C. D. 2004. Combating spam with TEA (Trustworthy email addresses). In Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST'04) (Fredericton, New Brunswick, Canada). 47-58.
-
SEIGNEUR, J. M., DIMMOCK, N., BRYCE, C., AND JENSEN, C. D. 2004. Combating spam with TEA (Trustworthy email addresses). In Proceedings of the 2nd Annual Conference on Privacy, Security and Trust (PST'04) (Fredericton, New Brunswick, Canada). 47-58.
-
-
-
-
39
-
-
68549107952
-
Anti-spam filtering: A centroid based classification approach
-
IEEE Computer Society Press, Los Alamitos, CA
-
SOONTHORNPHISAJ, N., CHAIKULSERIWAT, K., AND TANG-ON, P. 2002. Anti-spam filtering: A centroid based classification approach. In IEEE Proceedings ICSP. IEEE Computer Society Press, Los Alamitos, CA.
-
(2002)
IEEE Proceedings ICSP
-
-
SOONTHORNPHISAJ, N.1
CHAIKULSERIWAT, K.2
TANG-ON, P.3
-
42
-
-
24944432504
-
Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification
-
WATTSON, B. 2004. Beyond identity: Addressing problems that persist in an electronic mail system with reliable sender identification. In Proceedings of the 1st Conference on Email and Anti-Spam (CEAS).
-
(2004)
Proceedings of the 1st Conference on Email and Anti-Spam (CEAS)
-
-
WATTSON, B.1
-
43
-
-
0036362188
-
An evidential model of distributed reputation management
-
ACM, New York
-
YU, B. AND SINGH, M. P. 2002. An evidential model of distributed reputation management. In Proceedings of 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems, Vol. 1, ACM, New York, 294-301.
-
(2002)
Proceedings of 1st International Joint Conference on Autonomous Agents and Multi-Agent Systems
, vol.1
, pp. 294-301
-
-
YU, B.1
SINGH, M.P.2
-
45
-
-
0034309383
-
Trust management through reputation mechanisms
-
ZACHARIA, G. AND MAES, P. 2000. Trust management through reputation mechanisms. Appl. Artifi. Intell. 14, 9, 881-908.
-
(2000)
Appl. Artifi. Intell
, vol.14
, Issue.9
, pp. 881-908
-
-
ZACHARIA, G.1
MAES, P.2
|