-
1
-
-
84856207794
-
A trust and reputation based anti-spim method
-
AZ
-
Jun Bi, Jianping Wu, and Wenmao Zhang. 2008. A trust and reputation based anti-spim method. In Proceedings of INFOCOM, (AZ), 2485-2493. DOI:10.1109/INFOCOM.2008.319.
-
(2008)
Proceedings of Infocom
, pp. 2485-2493
-
-
Bi, J.1
Wu, J.2
Zhang, W.3
-
2
-
-
84928786032
-
Trusms: A trustworthy SMS spam control system based on trust management
-
Liang Chen, Zheng Yan, Weidong Zhang, and Raimo Kantola. 2014. TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst. DOI:10.1016/j.future.2014.06.010.
-
(2014)
Future Gener. Comput. Syst
-
-
Chen, L.1
Yan, Z.2
Zhang, W.3
Kantola, R.4
-
3
-
-
55249087535
-
Perceived usefulness, perceived ease of use, and user acceptance of information technology, Manage
-
Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology, Manage. MIS Quart. 13, 3, 319-340.
-
(1989)
MIS Quart
, vol.13
, Issue.3
, pp. 319-340
-
-
Davis, F.D.1
-
5
-
-
84946590102
-
-
EZSetup. Retrieved December 30, from
-
EZSetup. Retrieved December 30, 2014 from http://research.microsoft.com/en-us/groups/wn/mssn.aspx.
-
(2014)
-
-
-
6
-
-
84946590103
-
-
Familiar Stranger. Retrieved December 30, from
-
Familiar Stranger. Retrieved December 30, 2014 from http://www.paulos.net/research/intel/familiarstranger/index.htm.
-
(2014)
-
-
-
7
-
-
84861334371
-
Trust computations and trust dynamics in mobile adhoc networks: A survey
-
Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 14, 2, 279-298. DOI:10.1109/SURV.2011.042711.00083.
-
(2012)
IEEE Commun. Surv. Tutor
, vol.14
, Issue.2
, pp. 279-298
-
-
Govindan, K.1
Mohapatra, P.2
-
8
-
-
0009481412
-
A survey of trust in Internet applications
-
Tyrone Grandison and Morris Sloman. 2000. A survey of trust in Internet applications. IEEE Commun. Surv. 4th Quart. 3, 4, 2-16. DOI:10.1109/COMST.2000.5340804.
-
(2000)
IEEE Commun. Surv. 4th Quart
, vol.3
, Issue.4
, pp. 2-16
-
-
Grandison, T.1
Sloman, M.2
-
11
-
-
33947698455
-
Socio-technical defense against voice spamming
-
2007
-
Prakash Kolan and Ram Dantu. 2007. Socio-technical defense against voice spamming. ACM Trans. Autonom. Adapt. Syst. 2, 1, Article 2 (2007). DOI:10.1145/1216895.1216897.
-
(2007)
ACM Trans. Autonom. Adapt. Syst.
, vol.2
, Issue.1
-
-
Kolan, P.1
Dantu, R.2
-
12
-
-
73049090912
-
Incorporating accountability into internet email
-
(SAC'09). ACM, New York, NY
-
Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan. 2009. Incorporating accountability into internet email. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 975-882. DOI:10.1145/1529282.1529470.
-
(2009)
Proceedings of the 2009 ACM Symposium on Applied Computing
, pp. 882-975
-
-
Liu, W.1
Aggarwal, S.2
Duan, Z.3
-
13
-
-
57349156602
-
Browse rank: Letting web users vote for page importance
-
(SIGIR'08). ACM, New York
-
Yuting Liu, Bin Gao, Tie-Yan Liu, Ying Zhang, Zhiming Ma, Shuyuan He, and Hang Li. 2008. Browse Rank: Letting web users vote for page importance. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'08). ACM, New York, 451-458. DOI:10.1145/1390334.1390412.
-
(2008)
Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 451-458
-
-
Liu, Y.1
Gao, B.2
Liu, T.-Y.3
Zhang, Y.4
Ma, Z.5
He, S.6
Li, H.7
-
14
-
-
11244320485
-
Ubiquitous and robust access control for mobile ad hoc networks
-
URSA
-
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. 2004. URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12, 6, 1049-1063. DOI:10.1109/TNET.2004.838598.
-
(2004)
IEEE/Acm Trans. Netw
, vol.12
, Issue.6
, pp. 1049-1063
-
-
Luo, H.1
Kong, J.2
Zerfos, P.3
Lu, S.4
Zhang, L.5
-
15
-
-
34548163151
-
A trust overlay architecture and protocol for enhanced protection against spam
-
(ARES'07) (Vienna, Austria)
-
J. McGibney and D. Botvich. 2007. A trust overlay architecture and protocol for enhanced protection against spam. In Proceedings of the Conference on Availability, Reliability and Security (ARES'07) (Vienna, Austria). 749-756. DOI:10.1109/ARES.2007.28.
-
(2007)
Proceedings of the Conference on Availability, Reliability and Security
, pp. 749-756
-
-
McGibney, J.1
Botvich, D.2
-
16
-
-
84946590104
-
-
MobileSocial. Retrieved December 30, from
-
MobileSocial. Retrieved December 30, 2014 from http://mobisocial.stanford.edu.
-
(2014)
-
-
-
17
-
-
84946590105
-
-
Nokia-instant-community. Retrieved December 30, from
-
Nokia-instant-community. Retrieved December 30, 2014 from http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/.
-
(2014)
-
-
-
18
-
-
81855164770
-
Floating content for probabilistic information sharing
-
Jörg Ott, Esa Hyytiä, Pasi Lassila, Jussi Kangasharju, and Sougata Santra. 2011. Floating content for probabilistic information sharing. Pervas. Mobile Comput. 7, 6, 671-689.
-
(2011)
Pervas. Mobile Comput
, vol.7
, Issue.6
, pp. 671-689
-
-
Ott, J.1
Hyytiä, E.2
Lassila, P.3
Kangasharju, J.4
Santra, S.5
-
19
-
-
0003780986
-
The pagerank citation ranking: Bringing order to the web
-
Palo Alto, CA
-
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1998. The pagerank citation ranking: Bringing order to the web. Tech. Rep., Stanford Univ., Palo Alto, CA.
-
(1998)
Tech. Rep., Stanford Univ
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
20
-
-
78651281054
-
Enabling social networking in ad hoc networks of mobile phones
-
2009
-
Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634-1637. DOI:10.14778/1687553.1687611.
-
(2009)
Proc. Vldb Endow
, vol.2
, Issue.2
, pp. 1634-1637
-
-
Sarigöl, E.1
Riva, O.2
Stuedi, P.3
Alonso, G.4
-
21
-
-
85027911673
-
Analysis on the acceptance of global trust management for unwanted traffic control based on game theory
-
Yue Shen, Zheng Yan, and Raimo Kantola. 2014. Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Computers & Security. DOI:10.1016/j.cose.2014.03.010.
-
(2014)
Computers & Security
-
-
Shen, Y.1
Yan, Z.2
Kantola, R.3
-
23
-
-
67249154420
-
Support vector machines and random forests modeling for spam senders behavior analysis
-
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yang, and D. Alperovitch. 2008. Support vector machines and random forests modeling for spam senders behavior analysis. In Proceedings of IEEE GLOBECOM. 1-5. DOI:10.1109/GLOCOM.2008.ECP.419.
-
(2008)
Proceedings of IEEE Globecom
, pp. 1-5
-
-
Tang, Y.1
Krasser, S.2
He, Y.3
Yang, W.4
Alperovitch, D.5
-
24
-
-
80055020190
-
A survey of preventing, blocking and filtering short message services (SMS) spam
-
Muhammad Taufiq, N. Mohd, Fikri Azli bin Abdullah, Kyunguk Kang, and Deokjai Choi. 2010. A survey of preventing, blocking and filtering Short Message Services (SMS) spam. In Proceedings of the International Conference on Computer and Electrical Engineering, 1, 462-466.
-
(2010)
Proceedings of the International Conference on Computer and Electrical Engineering
, vol.1
, pp. 462-466
-
-
Taufiq, M.1
Mohd, N.2
Abdullah, F.A.B.3
Kang, K.4
Choi, D.5
-
25
-
-
84946590107
-
-
UCI dataset. Retrieved December 30, from
-
UCI dataset. Retrieved December 30, 2014 from http://archive.ics.uci.edu/ml/datasets/SMS+Spam+Collection.
-
(2014)
-
-
-
26
-
-
43649087245
-
Technology acceptance model 3 and a research agenda on interventions
-
Viswanath Venkatesh and Hillol Bala. 2008. Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 2, 273-315. DOI:10.1016/j.jbi.2009.06.001.
-
(2008)
Decis. Sci
, vol.39
, Issue.2
, pp. 273-315
-
-
Venkatesh, V.1
Bala, H.2
-
28
-
-
84919877646
-
Percontrep: A practical reputation system for pervasive content services
-
Zheng Yan, Yu Chen, and Yue Shen. 2014a. PerContRep: A practical reputation system for pervasive content services. Supercomputing 70, 3, 1051-1074. DOI:10.1007/s11227-014-1116-y.
-
(2014)
Supercomputing
, vol.70
, Issue.3
, pp. 1051-1074
-
-
Yan, Z.1
Chen, Y.2
Shen, Y.3
-
29
-
-
84875211673
-
A practical reputation system for pervasive social chatting
-
Zheng Yan, Yu Chen, and Yue Shen. 2013a. A practical reputation system for pervasive social chatting. Elsevier's J. Comput. Syst. Sci. 79, 5, 556-572. DOI:10.1016/j.jcss.2012.11.003.
-
(2013)
Elsevier's J. Comput. Syst. Sci
, vol.79
, Issue.5
, pp. 556-572
-
-
Yan, Z.1
Chen, Y.2
Shen, Y.3
-
33
-
-
84897021274
-
A generic solution for unwanted traffic control through trust management
-
Zheng Yan, Raimo Kantola and Yue Shen. 2014b. A generic solution for unwanted traffic control through trust management. New Rev. Hypermed. Multimed. 20, 1, 25-51. DOI:10.1080/13614568.2013.832807.
-
(2014)
New Rev. Hypermed. Multimed
, vol.20
, Issue.1
, pp. 25-51
-
-
Yan, Z.1
Kantola, R.2
Shen, Y.3
-
34
-
-
80052880154
-
Autonomic trust management for a component based software system
-
Zheng Yan and Christian Prehofer. 2011. Autonomic trust management for a component based software system. IEEE Trans. Depend. Secure Comput. 8, 6, 810-823. DOI:10.1109/TDSC.2010.47.
-
(2011)
IEEE Trans. Depend. Secure Comput
, vol.8
, Issue.6
, pp. 810-823
-
-
Yan, Z.1
Prehofer, C.2
-
35
-
-
1842815887
-
Security in mobile ad hoc networks: Challenges and solutions
-
Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. 2004. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11, 1, 38-47. DOI:10.1109/MWC.2004.1269716.
-
(2004)
IEEE Wireless Commun
, vol.11
, Issue.1
, pp. 38-47
-
-
Yang, H.1
Luo, H.2
Ye, F.3
Lu, S.4
Zhang, L.5
-
36
-
-
72849134115
-
IPGroupRep: A novel reputation based system for anti-spam
-
Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. 2009a. IPGroupRep: A novel reputation based system for anti-spam. In Proceedings of the Conference on Ubiquitous, Autonomic and Trusted Computing. 513-518. DOI:10.1109/UIC-ATC.2009.15.
-
(2009)
Proceedings of the Conference on Ubiquitous, Autonomic and Trusted Computing
, pp. 513-518
-
-
Zhang, H.1
Duan, H.2
Liu, W.3
Wu, J.4
-
39
-
-
66949164379
-
Trusting spam reporters: A reporter-based reputation system for email filtering
-
Elena Zheleva, Aleksander Kolcz, and Lise Getoor. 2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Trans. Inf. Syst. 27, 1, Article 3. DOI: 10.1145/1416950.1416953.
-
(2008)
ACM Trans. Inf. Syst
, vol.27
, Issue.1
-
-
Zheleva, E.1
Kolcz, A.2
Getoor, L.3
|