-
1
-
-
85076924278
-
-
Digg. http://www.digg.com.
-
-
-
-
2
-
-
0002505172
-
The anatomy of a large-scale hypertextual web search engine
-
BRIN, S., AND PAGE, L. The anatomy of a large-scale hypertextual web search engine. In WWW (1998).
-
(1998)
WWW
-
-
Brin, S.1
Page, L.2
-
3
-
-
29244445484
-
Sybilproof reputation mechanisms
-
New York, NY, USA, ACM
-
CHENG, A., AND FRIEDMAN, E. Sybilproof reputation mechanisms. In P2PECON'05: Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems (New York, NY, USA, 2005), ACM, pp. 128-132.
-
(2005)
P2PECON'05: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems
, pp. 128-132
-
-
Cheng, A.1
Friedman, E.2
-
5
-
-
79960868339
-
Sybil-resistant dht routing
-
DANEZIS, G., LESNIEWSKI-LAAS, C., KAASHOEK, M. F., AND ANDERSON, R. Sybil-resistant dht routing. In European Symposium On Research In Computer Security (2008).
-
(2008)
European Symposium on Research in Computer Security
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
7
-
-
35948942706
-
LIp: A lifetime and popularity based ranking approach to filter out fake files in p2p file sharing systems
-
FENG, Q., AND DAI, Y. Lip: A lifetime and popularity based ranking approach to filter out fake files in p2p file sharing systems. In IPTPS (2007).
-
(2007)
IPTPS
-
-
Feng, Q.1
Dai, Y.2
-
8
-
-
19944395899
-
Propagation of trust and distrust
-
GUHA, R., KUMAR, R., RAGHAVAN, P., AND TOMKINS, A. Propagation of trust and distrust. In WWW (2004).
-
(2004)
WWW
-
-
Guha, R.1
Kumar, R.2
Raghavan, P.3
Tomkins, A.4
-
9
-
-
62949176139
-
Doonesbury online poll hacked in favor of MIT
-
HSIEH, H. Doonesbury online poll hacked in favor of MIT. In MIT Tech (2006).
-
(2006)
MIT Tech
-
-
Hsieh, H.1
-
10
-
-
70449664666
-
-
INVESPBLOG. An interview with digg top user, 2008. http://www.invesp.com/blog/social- media/ an- interview- with- digg- top- user.html.
-
(2008)
An Interview with Digg Top User
-
-
-
11
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
New York, NY, USA, ACM
-
KAMVAR, S. D., SCHLOSSER, M. T., AND GARCIA-MOLINA, H. The eigentrust algorithm for reputation management in p2p networks. In WWW'03: Proceedings ofthe 12th international conference on World Wide Web (New York, NY, USA, 2003), ACM, pp. 640-651.
-
(2003)
WWW'03: Proceedings Ofthe 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
13
-
-
52949106331
-
Statistical properties of community structure in large social and information networks
-
LESKOVEC, J., LANG, K., DASGUPTA, A., AND MAHONEY, M. W. Statistical properties of community structure in large social and information networks. In 7th international conference on WWW (2008).
-
(2008)
7th International Conference on WWW
-
-
Leskovec, J.1
Lang, K.2
Dasgupta, A.3
Mahoney, M.W.4
-
15
-
-
85084162792
-
Attack-resistant trust metrics for public key certification
-
Berkeley, CA, USA, 1998), USENIX Association
-
LEVIEN, R., AND AIKEN, A. Attack-resistant trust metrics for public key certification. In SSYM'98: Proceedings of the 7th conference on USENIX Security Symposium, 1998 (Berkeley, CA, USA, 1998), USENIX Association, pp. 18-18.
-
(1998)
SSYM'98: Proceedings of the 7th Conference on USENIX Security Symposium
, pp. 18
-
-
Levien, R.1
Aiken, A.2
-
16
-
-
25844529486
-
Pollution in p2p file sharing systems
-
LIANG, J., KUMAR, R., XI, Y., AND ROSS, K. Pollution in p2p file sharing systems. In IEEE Infocom (2005).
-
(2005)
IEEE Infocom
-
-
Liang, J.1
Kumar, R.2
Xi, Y.3
Ross, K.4
-
17
-
-
42149117427
-
Measurement and analysis of online social networks
-
MISLOVE, A., MARCON, M., GUMMADI, K., DRUSCHEL, P., AND BHATTACHARJEE, S. Measurement and analysis of online social networks. In 7th Usenix/ACM SIGCOMM Internet Measurement Conference (IMC) (2007).
-
(2007)
7th Usenix/ACM SIGCOMM Internet Measurement Conference (IMC)
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.3
Druschel, P.4
Bhattacharjee, S.5
-
18
-
-
80054703857
-
Ostra: Leveraging trust to thwart unwanted communication
-
MISLOVE, A., POST, A., DRUSCHEL, P., AND GUMMADI, K. P. Ostra: Leveraging trust to thwart unwanted communication. In NSDI'08: Proceedings of the 5th conference on 5th Symposium on Networked Systems Design & Implementation (2008).
-
(2008)
NSDI'08: Proceedings of the 5th Conference on 5th Symposium on Networked Systems Design & Implementation
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K.P.4
-
20
-
-
84880875744
-
Link analysis, eigenvectors and stability
-
NG, A., ZHENG, A., AND JORDAN, M. Link analysis, eigenvectors and stability. In International Joint Conference on Artificial Intelligence (IJCAI) (2001).
-
(2001)
International Joint Conference on Artificial Intelligence (IJCAI)
-
-
Ng, A.1
Zheng, A.2
Jordan, M.3
-
24
-
-
33748705132
-
A model for social networks
-
TOIVONEN, R., ONNELA, J.-P., SARAMÄKI, J., HYVÖNEN, J., AND KASKI, K. A model for social networks. Physica A Statistical Mechanics and its Applications 371 (2006), 851-860.
-
(2006)
Physica a Statistical Mechanics and Its Applications
, vol.371
, pp. 851-860
-
-
Toivonen, R.1
Onnela, J.-P.2
Saramäki, J.3
Hyvönen, J.4
Kaski, K.5
-
25
-
-
55149090014
-
Experience with an object reputation system for peer-to-peer filesharing
-
Berkeley, CA, USA, USENIX Association
-
WALSH, K., AND SIRER, E. G. Experience with an object reputation system for peer-to-peer filesharing. In NSDI'06: Proceedings of the 3rd conference on 3rd Symposium on Networked Systems Design & Implementation (Berkeley, CA, USA, 2006), USENIX Association, pp. 1-1.
-
(2006)
NSDI'06: Proceedings of the 3rd Conference on 3rd Symposium on Networked Systems Design & Implementation
, pp. 1
-
-
Walsh, K.1
Sirer, E.G.2
-
26
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
YU, H., GIBBONS, P., KAMINSKY, M., AND XIAO, F. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE Symposium on Security and Privacy (2008).
-
(2008)
IEEE Symposium on Security and Privacy
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
27
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
New York, NY, USA, ACM
-
YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAXMAN, A. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM'06: Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications (New York, NY, USA, 2006), ACM, pp. 267-278.
-
(2006)
SIGCOMM'06: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
28
-
-
70449670722
-
DSybil: Optimal sybil-resistance for recommendation systems
-
YU, H., SHI, C., KAMINSKY, M., GIBBONS, P. B., AND XIAO, F. Dsybil: Optimal sybil-resistance for recommendation systems. In IEEE Security and Privacy (2009).
-
(2009)
IEEE Security and Privacy
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P.B.4
Xiao, F.5
-
29
-
-
84876911211
-
Making eigenvector-based reputation systems robust to collusions
-
ZHANG, H., GOEL, A., GOVINDAN, R., AND MASON, K. Making eigenvector-based reputation systems robust to collusions. In Proc. of the Third Workshop on Algorithms and Models for the Web Graph (2004).
-
(2004)
Proc. Of the Third Workshop on Algorithms and Models for the Web Graph
-
-
Zhang, H.1
Goel, A.2
Govindan, R.3
Mason, K.4
-
30
-
-
29844444091
-
Propagation models for trust and distrust in social networks
-
ZIEGLER, C.-N., AND LAUSEN, G. Propagation models for trust and distrust in social networks. Information Systems Frontiers 7, 4-5 (2005), 337-358.
-
(2005)
Information Systems Frontiers
, vol.7
, Issue.4-5
, pp. 337-358
-
-
Ziegler, C.-N.1
Lausen, G.2
|