-
1
-
-
35348830609
-
Implicit structure and the dynamics of blogspace
-
Adar, E., Zhang, L., Adamic, L., Lukose, R.: Implicit structure and the dynamics of blogspace. In: Workshop on the Weblogging Ecosystem, 13th International World Wide Web Conference (WWW) (2004)
-
(2004)
Workshop on the Weblogging Ecosystem, 13th International World Wide Web Conference (WWW)
-
-
Adar, E.1
Zhang, L.2
Adamic, L.3
Lukose, R.4
-
2
-
-
0034721164
-
Error and attack tolerance of complex networks
-
Albert, R., Jeong, H., Barabási, A.: Error and attack tolerance of complex networks. Nature 406, 378-382 (2000)
-
(2000)
Nature
, vol.406
, pp. 378-382
-
-
Albert, R.1
Jeong, H.2
Barabási, A.3
-
3
-
-
0012782386
-
Information cascades in the laboratory
-
Anderson, L., Holt, C.: Information cascades in the laboratory. American Economic Review 87(5), 847-862 (1995)
-
(1995)
American Economic Review
, vol.87
, Issue.5
, pp. 847-862
-
-
Anderson, L.1
Holt, C.2
-
4
-
-
0029700344
-
Decentralized trust management
-
S&P, pp, IEEE Computer Society, Los Alamitos
-
Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: IEEE Symposium on Security and Privacy (S&P), pp. 164-173. IEEE Computer Society, Los Alamitos (1996)
-
(1996)
IEEE Symposium on Security and Privacy
, pp. 164-173
-
-
Blaze, M.1
Feigenbaum, J.2
Lacy, J.3
-
6
-
-
33645223205
-
Wikipedia risks
-
Denning, P., Horning, J., Parnas, D., Weinstein, L.: Wikipedia risks. Communications of the ACM 48(12), 152 (2005)
-
(2005)
Communications of the ACM
, vol.48
, Issue.12
, pp. 152
-
-
Denning, P.1
Horning, J.2
Parnas, D.3
Weinstein, L.4
-
7
-
-
84947273682
-
The Sybil Attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
8
-
-
34547925203
-
Herdict: A distributed model for threats online
-
Bradbury, D, ed, Elsevier, Oxford
-
Hwang, T.: Herdict: a distributed model for threats online. In: Bradbury, D. (ed.) Network Security, pp. 15-18. Elsevier, Oxford (2007)
-
(2007)
Network Security
, pp. 15-18
-
-
Hwang, T.1
-
9
-
-
54249144163
-
-
Kahney, L.: Cheaters bow to peer pressure. Wired (February 15, 2001), http://www.wired.com/news/technology/0,1282,41838,00.html
-
Kahney, L.: Cheaters bow to peer pressure. Wired (February 15, 2001), http://www.wired.com/news/technology/0,1282,41838,00.html
-
-
-
-
10
-
-
84880467894
-
The EigenTrust algorithm for reputation management in P2P networks
-
ACM Press, New York
-
Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: 12th WWW, pp. 640-651. ACM Press, New York (2003)
-
(2003)
12th WWW
, pp. 640-651
-
-
Kamvar, S.1
Schlosser, M.2
Garcia-Molina, H.3
-
11
-
-
84976699318
-
The Byzantine Generals Problem
-
Lamport, L., Shostak, R., Pease, M.: The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems 4(3), 382-401 (1982)
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
12
-
-
54249115161
-
Online thugs assault sites that specialize in security help
-
September 11, 2007
-
Larkin, E.: Online thugs assault sites that specialize in security help. PC World (September 11, 2007), http://www.pcworld.com/businesscenter/article/ 137084/online_thugs_assault_sites_that_specialize_in_security_help_.html
-
PC World
-
-
Larkin, E.1
-
13
-
-
3042659976
-
-
PhD thesis draft, University of California at Berkeley
-
Levien, R.: Attack resistant trust metrics. PhD thesis (draft), University of California at Berkeley (2004)
-
(2004)
Attack resistant trust metrics
-
-
Levien, R.1
-
14
-
-
54249138363
-
Rock Phish' blamed for surge in phishing
-
December 12, 2006
-
McMillan, R.: 'Rock Phish' blamed for surge in phishing. InfoWorld (December 12, 2006), http://www.infoworld.com/article/06/12/12/HNrockphish_1. html
-
InfoWorld
-
-
McMillan, R.1
-
16
-
-
24744469980
-
Power laws, Pareto distributions and Zipf's law
-
Newman, M.: Power laws, Pareto distributions and Zipf's law. Contemporary Physics 46(5), 323-351 (2005)
-
(2005)
Contemporary Physics
, vol.46
, Issue.5
, pp. 323-351
-
-
Newman, M.1
-
18
-
-
54249115646
-
-
PhishTank: http://www.phishtank.com/
-
PhishTank
-
-
-
19
-
-
0030671980
-
-
IEEE S&P, pp, IEEE Computer Society, Los Alamitos 1997
-
Reiter, M., Stubblebine, S.: Toward acceptable metrics of authentication. In: IEEE S&P, pp. 10-20. IEEE Computer Society, Los Alamitos (1997)
-
Toward acceptable metrics of authentication
, pp. 10-20
-
-
Reiter, M.1
Stubblebine, S.2
-
20
-
-
84863469085
-
Stronger password authentication using browser extensions
-
USENIX Association, Berkeley, p
-
Ross, B., Jackson, C., Miyake, N., Boneh, D., Mitchell, J.: Stronger password authentication using browser extensions. In: 14th USENIX Security Symposium, USENIX Association, Berkeley, p. 2 (2005)
-
(2005)
14th USENIX Security Symposium
, pp. 2
-
-
Ross, B.1
Jackson, C.2
Miyake, N.3
Boneh, D.4
Mitchell, J.5
-
23
-
-
54249112525
-
-
Stop Badware: http://www.stopbadware.org
-
Stop Badware
-
-
-
24
-
-
84858471334
-
-
Vipul's Razor: http://razor.sourceforge.net
-
Razor
-
-
Vipul's1
-
26
-
-
77953910522
-
Fishing for phishes: Applying capture-recapture to phishing
-
ACM Press, New York
-
Weaver, R., Collins, M.: Fishing for phishes: applying capture-recapture to phishing. In: APWG eCrime, pp. 14-25. ACM Press, New York (2007)
-
(2007)
APWG eCrime
, pp. 14-25
-
-
Weaver, R.1
Collins, M.2
-
27
-
-
35348926088
-
Expertise networks in online communities: Structure and algorithms
-
ACM Press, New York
-
Zhang, J., Ackerman, M., Adamic, L.: Expertise networks in online communities: structure and algorithms. In: 16th WWW, pp. 221-230. ACM Press, New York (2007)
-
(2007)
16th WWW
, pp. 221-230
-
-
Zhang, J.1
Ackerman, M.2
Adamic, L.3
-
28
-
-
84898190494
-
Phinding phish: Evaluating antiphishing tools
-
Zhang, Y., Egelman, S., Cranor, L., Hong, J.: Phinding phish: evaluating antiphishing tools. In: 14th Annual Network & Distributed System Security Symposium (NDSS 2007) (2007)
-
(2007)
14th Annual Network & Distributed System Security Symposium (NDSS
-
-
Zhang, Y.1
Egelman, S.2
Cranor, L.3
Hong, J.4
|