-
1
-
-
79960864279
-
-
Cloudmark. www.cloudmark.com/en/home.html.
-
-
-
-
2
-
-
79960863865
-
-
Cooperative Network Security Community
-
Cooperative Network Security Community. http://www.dshield.org/.
-
-
-
-
4
-
-
84887232333
-
-
developers.facebook.com/connect.php
-
Facebook connect. developers.facebook.com/connect.php.
-
Facebook Connect
-
-
-
8
-
-
79960856291
-
-
The SpamHaus Project. www.spamhaus.org/.
-
-
-
-
9
-
-
84904789621
-
Collaborative email-spam filtering with the hashing trick
-
J. Attenberg, K. Weinberger, A. Dasgupta, A. Smola, and M. Zinkevich. Collaborative Email-Spam Filtering with the Hashing Trick. In CEAS, 2009.
-
(2009)
CEAS
-
-
Attenberg, J.1
Weinberger, K.2
Dasgupta, A.3
Smola, A.4
Zinkevich, M.5
-
12
-
-
84885797269
-
Sybilproof reputation mechanisms
-
A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PEcon, 2005.
-
(2005)
P2PEcon
-
-
Cheng, A.1
Friedman, E.2
-
13
-
-
70349455970
-
Manipulability of pagerank under sybil strategies
-
A. Cheng and E. Friedman. Manipulability of PageRank under Sybil Strategies. In NetEcon, 2006.
-
(2006)
NetEcon
-
-
Cheng, A.1
Friedman, E.2
-
14
-
-
85180633166
-
SybilInfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
15
-
-
4544304744
-
The sybil attack
-
March
-
J. R. Douceur. The Sybil Attack. In IPTPS, March 2002.
-
(2002)
IPTPS
-
-
Douceur, J.R.1
-
16
-
-
74549171828
-
Shibboleth architecture DRAFT v05
-
May
-
M. Erdos and S. Cantor. Shibboleth Architecture DRAFT v05. Internet2/MACE, May, 2, 2002.
-
(2002)
Internet2/MACE
, vol.2
-
-
Erdos, M.1
Cantor, S.2
-
17
-
-
78650115969
-
A walk in facebook: Uniform sampling of users in online social networks
-
M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Facebook: Uniform Sampling of Users in Online Social Networks. In IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
18
-
-
35248830148
-
Trust propagation in small worlds
-
Springer
-
E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen. Trust Propagation in Small Worlds. In LNCS, pages 239-254. Springer, 2003.
-
(2003)
LNCS
, pp. 239-254
-
-
Gray, E.1
Seigneur, J.-M.2
Chen, Y.3
Jensen, C.4
-
22
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
-
(2003)
WWW
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
24
-
-
33747798983
-
Collaborative spam filtering using e-mail networks
-
J. S. Kong, B. A. Rezaei, N. Sarshar, V. P. Roychowdhury, and P. O. Boykin. Collaborative Spam Filtering Using e-mail Networks. In IEEE Computer, 2006.
-
(2006)
IEEE Computer
-
-
Kong, J.S.1
Rezaei, B.A.2
Sarshar, N.3
Roychowdhury, V.P.4
Boykin, P.O.5
-
26
-
-
29244436370
-
Taxonomy of trust: Categorizing P2P reputation systems
-
S. Marti and H. Garcia-Molina. Taxonomy of Trust: Categorizing P2P Reputation Systems. In Computer Networks, 2006.
-
(2006)
Computer Networks
-
-
Marti, S.1
Garcia-Molina, H.2
-
27
-
-
45749135561
-
Ostra: Leveraging social networks to thwart unwanted traffic
-
A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
-
(2008)
NSDI
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K.P.4
-
29
-
-
0033295259
-
Bro: A system for detecting network intruders in real-time
-
V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, 1999.
-
(1999)
Computer Networks
-
-
Paxson, V.1
-
30
-
-
33750300419
-
Understanding the network-level behavior of spammers
-
A. Ramachandran and N. Feamster. Understanding the Network-level Behavior of Spammers. In ACM SIGCOMM, 2006.
-
(2006)
ACM SIGCOMM
-
-
Ramachandran, A.1
Feamster, N.2
-
32
-
-
70449656128
-
Repuscore: Collaborative reputation management framework for email infrastructure
-
G. Singaraju and B. B. Kang. RepuScore: Collaborative Reputation Management Framework for Email Infrastructure. In USENIX LISA, 2007.
-
(2007)
USENIX LISA
-
-
Singaraju, G.1
Kang, B.B.2
-
33
-
-
84904799723
-
Tracking email reputation for authenticated sender identities
-
G. Singaraju, J. Moss, and B. B. Kang. Tracking Email Reputation for Authenticated Sender Identities. In CEAS, 2008.
-
(2008)
CEAS
-
-
Singaraju, G.1
Moss, J.2
Kang, B.B.3
-
34
-
-
85018515597
-
SocialFilter: Introducing social trust to collaborative spam mitigation
-
M. Sirivianos, K. Kim, and X. Yang. SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation. In USENIX CollSec, 2010.
-
(2010)
USENIX CollSec
-
-
Sirivianos, M.1
Kim, K.2
Yang, X.3
-
36
-
-
77953306876
-
Predictive blacklisting as an implicit recommendation system
-
F. Soldo, A. Le, and A. Markopoulou. Predictive Blacklisting as an Implicit Recommendation System. In IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Soldo, F.1
Le, A.2
Markopoulou, A.3
-
37
-
-
0001636850
-
Kerberos: An authentication service for open network systems
-
J. G. Steiner, C. Neuman, and J. I. Schiller. Kerberos: An Authentication Service for Open Network Systems. In USENIX Winter, 1988.
-
(1988)
USENIX Winter
-
-
Steiner, J.G.1
Neuman, C.2
Schiller, J.I.3
-
39
-
-
55149090014
-
Experience with an object reputation system for peer-to-peer filesharing
-
K. Walsh and E. G. Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. In NSDI, 2006.
-
(2006)
NSDI
-
-
Walsh, K.1
Sirer, E.G.2
-
40
-
-
0032482432
-
Collective dynamics of small-world networks
-
D. J. Watts and S. H. Strogatz. Collective Dynamics of Small-World Networks. In Nature, 1998.
-
(1998)
Nature
-
-
Watts, D.J.1
Strogatz, S.H.2
-
41
-
-
58449122201
-
Spamming botnets: Signatures and characteristics
-
Y. Xie, F. Yu, K. Achan, R. Panigrahy, G. Hulten, and I. Osipko. Spamming Botnets: Signatures and Characteristics. In ACM SIGCOMM, 2008.
-
(2008)
ACM SIGCOMM
-
-
Xie, Y.1
Yu, F.2
Achan, K.3
Panigrahy, R.4
Hulten, G.5
Osipko, I.6
-
42
-
-
70449694823
-
A near-optimal social network defense against sybil attacks
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. A Near-Optimal Social Network Defense Against Sybil Attacks. In IEEE S&P, 2008.
-
(2008)
IEEE S&P
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
44
-
-
51349149626
-
ALPACAS: A large-scale privacy-aware collaborative anti-spam system
-
Z. Zhong, L. Ramaswamy, and K. Li. ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System. In IEEE INFOCOM, 2008.
-
(2008)
IEEE INFOCOM
-
-
Zhong, Z.1
Ramaswamy, L.2
Li, K.3
-
45
-
-
33646000168
-
Approximate object location and spam filtering on peer-to-peer systems
-
F. Zhou, L. Zhuang, B. Y. Zhao, L. Huang, A. D. Joseph, and J. Kubiatowicz. Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. In ACM/IFIP/USENIX Middleware, 2003.
-
(2003)
ACM/IFIP/USENIX Middleware
-
-
Zhou, F.1
Zhuang, L.2
Zhao, B.Y.3
Huang, L.4
Joseph, A.D.5
Kubiatowicz, J.6
|