-
1
-
-
70849135951
-
-
"Flickr. http://www.flickr.com/.".
-
Flickr
-
-
-
2
-
-
21244432462
-
-
"Del.icio.us. http://del.icio.us/".
-
Del.icio.us.
-
-
-
3
-
-
70849114373
-
-
"YouTube. http://www.youtube.com/.".
-
YouTube
-
-
-
4
-
-
36348956237
-
Fighting spam on social web sites: A survey of approaches and future challenges
-
P. Heymann, G. Koutrika, and H. Garcia-Molina, "Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges, " IEEE Internet Computing, vol. 11, no. 6, pp. 36-45, 2007.
-
(2007)
IEEE Internet Computing
, vol.11
, Issue.6
, pp. 36-45
-
-
Heymann, P.1
Koutrika, G.2
Garcia-Molina, H.3
-
5
-
-
62949144587
-
Combating spam in tagging systems
-
G. Koutrika, F. A. Effendi, Z. Gyöngyi, P. Heymann, and H. Garcia- Molina, "Combating Spam in Tagging Systems, " in AIRWeb, 2007.
-
(2007)
AIRWeb
-
-
Koutrika, G.1
Effendi, F.A.2
Gyöngyi, Z.3
Heymann, P.4
Molina H.G.-5
-
6
-
-
70849106738
-
-
"Slidesharehttp://slideshare.net/.".
-
Slideshare
-
-
-
7
-
-
70849115504
-
-
"Rawsugar. http://rawsugar.com/".
-
Rawsugar
-
-
-
8
-
-
4544304744
-
The sybil attack
-
J. R. Douceur, "The Sybil Attack, " in IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.R.1
-
9
-
-
63049101066
-
The anti-social tagger: Detecting spam in social bookmarking systems
-
B. Krause, C. Schmitz, A. Hotho, and G. Stumme, "The anti-social tagger: detecting spam in social bookmarking systems, " in AIRWeb, 2008, pp. 61-68.
-
(2008)
AIRWeb
, pp. 61-68
-
-
Krause, B.1
Schmitz, C.2
Hotho, A.3
Stumme, G.4
-
10
-
-
70849133061
-
Combining clustering with classification for spam detection in social bookmarking systems
-
Z. Kyriakopoulou and T. Kalamboukis, "Combining Clustering with Classification for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
-
(2008)
RSDC
-
-
Kyriakopoulou, Z.1
Kalamboukis, T.2
-
11
-
-
70849084244
-
A novel supervised learning algorithm and its use for spam detection in social bookmarking systems
-
A. Gkanogiannis and T. Kalamboukis, "A novel supervised learning algorithm and its use for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
-
(2008)
RSDC
-
-
Gkanogiannis, A.1
Kalamboukis, T.2
-
12
-
-
70849094906
-
Using language models for spam detection in social bookmarking systems
-
T. Bogers and A. Bosch, "Using Language Models for Spam Detection in Social Bookmarking Systems, " in RSDC, 2008.
-
(2008)
RSDC
-
-
Bogers, T.1
Bosch, A.2
-
13
-
-
48349094144
-
Towards the semantic web: Collaborative tag suggestions
-
Z. Xu, Y. Fu, J. Mao, and D. Su, "Towards the semantic web: Collaborative tag suggestions, " in Collaborative Web Tagging Workshop in conjunction with WWW, 2006.
-
(2006)
Collaborative Web Tagging Workshop in Conjunction with WWW
-
-
Xu, Z.1
Fu, Y.2
Mao, J.3
Su, D.4
-
14
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. vonAhn, M. Blum, N. J. Hopper, and J. Langford, "CAPTCHA: Using Hard AI Problems for Security, " in EUROCRYPT, 2003, pp. 294- 311.
-
(2003)
EUROCRYPT
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
15
-
-
64849115434
-
PINTS: Peer-to-peer infrastructure for tagging systems
-
O. Görlitz, S. Sizov, and S. Staab, "PINTS: Peer-to-Peer Infrastructure for Tagging Systems, " in IPTPS, 2008.
-
(2008)
IPTPS
-
-
Görlitz, O.1
Sizov, S.2
Staab, S.3
-
16
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, P. K. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks, " in Internet Measurement Comference, 2007, pp. 29-42.
-
(2007)
Internet Measurement Comference
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, P.K.3
Druschel, P.4
Bhattacharjee, B.5
-
17
-
-
35348868025
-
Towards effective browsing of large scale social annotations
-
R. Li, S. Bao, Y. Yu, B. Fei, and Z. Su, "Towards effective browsing of large scale social annotations, " in WWW, 2007, pp. 943-952.
-
(2007)
WWW
, pp. 943-952
-
-
Li, R.1
Bao, S.2
Yu, Y.3
Fei, B.4
Su, Z.5
-
18
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, P. K. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and analysis of online social networks, " in Internet Measurement Comference, 2007.
-
(2007)
Internet Measurement Comference
-
-
Mislove, A.1
Marcon, M.2
Gummadi, P.K.3
Druschel, P.4
Bhattacharjee, B.5
-
19
-
-
0033726520
-
The small-world phenomenon: An algorithm perspective
-
J. M. Kleinberg, "The small-world phenomenon: an algorithm perspective, " in STOC, 2000.
-
(2000)
STOC
-
-
Kleinberg, J.M.1
-
20
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: defending against sybil attacks via social networks, " in SIGCOMM, 2006, pp. 267-278.
-
(2006)
SIGCOMM
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
21
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks, " in IEEE Symposium on Security and Privacy, 2008, pp. 3-17.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
22
-
-
85027289714
-
Computational puzzles as sybil defenses
-
N. Borisov, "Computational Puzzles as Sybil Defenses, " in Peer-to-Peer Computing, 2006, pp. 171-176.
-
(2006)
Peer-to-Peer Computing
, pp. 171-176
-
-
Borisov, N.1
-
23
-
-
34548349212
-
Limiting sybil attacks in structured P2P networks
-
H. Rowaihy, W. Enck, P. McDaniel, and T. L. Porta, "Limiting Sybil Attacks in Structured P2P Networks, " in INFOCOM, 2007, pp. 2596- 2600.
-
(2007)
INFOCOM
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
Mcdaniel, P.3
Porta, T.L.4
-
24
-
-
36949036429
-
Portcullis: Protecting connection setup from denial-of-capability attacks
-
B. Parno, D. Wendlandt, E. Shi, A. Perrig, B. M. Maggs, and Y.-C. Hu, "Portcullis: protecting connection setup from denial-of-capability attacks, " in SIGCOMM, 2007, pp. 289-300.
-
(2007)
SIGCOMM
, pp. 289-300
-
-
Parno, B.1
Wendlandt, D.2
Shi, E.3
Perrig, A.4
Maggs, B.M.5
Hu, Y.-C.6
|