-
3
-
-
37849017498
-
Social network analysis for routing in disconnected delay-tolerant manets
-
E. M. Daly and M. Haahr. Social network analysis for routing in disconnected delay-tolerant manets. In MobiHoc, 2007.
-
(2007)
MobiHoc
-
-
Daly, E.M.1
Haahr, M.2
-
4
-
-
84887074866
-
Drac: An architecture for anonymous low-volume communications
-
G. Danezis, C. Díaz, C. Troncoso, and B. Laurie. Drac: An architecture for anonymous low-volume communications. In PETS, 2010.
-
(2010)
PETS
-
-
Danezis, G.1
Díaz, C.2
Troncoso, C.3
Laurie, B.4
-
6
-
-
80052124479
-
Bubble rap: Social-based forwarding in delay-tolerant networks
-
P. Hui, J. Crowcroft, and E. Yoneki. Bubble rap: Social-based forwarding in delay-tolerant networks. IEEE TMC, 2011.
-
(2011)
IEEE TMC
-
-
Hui, P.1
Crowcroft, J.2
Yoneki, E.3
-
8
-
-
4944256645
-
The DBLP computer science bibliography: Evolution, research issues, perspectives
-
M. Ley. The DBLP computer science bibliography: Evolution, research issues, perspectives. In SPIR, 2009.
-
(2009)
SPIR
-
-
Ley, M.1
-
9
-
-
85026514688
-
Pisces: Anonymous communication using social networks
-
P. Mittal, M. Wright, and N. Borisov. Pisces: Anonymous communication using social networks. In NDSS, 2013.
-
(2013)
NDSS
-
-
Mittal, P.1
Wright, M.2
Borisov, N.3
-
10
-
-
84877969062
-
Incorporating trust into social network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim. Incorporating trust into social network-based sybil defenses. In INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
11
-
-
84878001185
-
Understanding social network properties for trustworthy computing
-
A. Mohaisen, H. Tran, N. Hopper, and Y. Kim. Understanding social network properties for trustworthy computing. In SIMPLEX, 2011.
-
(2011)
SIMPLEX
-
-
Mohaisen, A.1
Tran, H.2
Hopper, N.3
Kim, Y.4
-
12
-
-
84871985239
-
On the mixing time of directed social graphs and security implications
-
A. Mohaisen, H. Tran, N. Hopper, and Y. Kim. On the mixing time of directed social graphs and security implications. In ASIACCS, 2012.
-
(2012)
ASIACCS
-
-
Mohaisen, A.1
Tran, H.2
Hopper, N.3
Kim, Y.4
-
13
-
-
78650907130
-
Measuring the mixing time of social graphs
-
ACM
-
A. Mohaisen, A. Yun, and Y. Kim. Measuring the mixing time of social graphs. In IMC, pages 383-389. ACM, 2010.
-
(2010)
IMC
, pp. 383-389
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
14
-
-
84877951088
-
Anonymity in the wild
-
S. Nagaraja. Anonymity in the wild. In PETS, 2007.
-
(2007)
PETS
-
-
Nagaraja, S.1
-
15
-
-
65449147147
-
Community evolution in dynamic multi-mode networks
-
L. Tang, H. Liu, J. Zhang, and Z. Nazeri. Community evolution in dynamic multi-mode networks. In KDD, 2008.
-
(2008)
KDD
-
-
Tang, L.1
Liu, H.2
Zhang, J.3
Nazeri, Z.4
-
16
-
-
36849058149
-
A framework for community ident. in dynamic social networks
-
C. Tantipathananandh, T. Berger-Wolf, and D. Kempe. A framework for community ident. in dynamic social networks. In KDD, 2007.
-
(2007)
KDD
-
-
Tantipathananandh, C.1
Berger-Wolf, T.2
Kempe, D.3
-
17
-
-
65449145629
-
Colibri: Fast mining of large static and dynamic graphs
-
H. Tong, S. Papadimitriou, J. Sun, P. Yu, and C. Faloutsos. Colibri: fast mining of large static and dynamic graphs. In KDD, 2008.
-
(2008)
KDD
-
-
Tong, H.1
Papadimitriou, S.2
Sun, J.3
Yu, P.4
Faloutsos, C.5
-
19
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman. SybilGuard: defending against sybil attacks via social networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
-
20
-
-
84870954798
-
Multi-scale dynamics in a massive online social network
-
X. Zhao, A. Sala, C. Wilson, X. Wang, S. Gaito, H. Zheng, and B. Y. Zhao. Multi-scale dynamics in a massive online social network. In IMC, 2012.
-
(2012)
IMC
-
-
Zhao, X.1
Sala, A.2
Wilson, C.3
Wang, X.4
Gaito, S.5
Zheng, H.6
Zhao, B.Y.7
|