-
1
-
-
84870452716
-
-
Apache Hadoop. http://hadoop.apache.org/.
-
Apache Hadoop
-
-
-
2
-
-
84887232333
-
-
Facebook connect. developers.facebook.com/connect.php.
-
Facebook Connect
-
-
-
5
-
-
85080686036
-
-
An Explanation of CAPTCHAs. http://www.facebook.com/note. php?note-id=36280205765, 2008.
-
(2008)
An Explanation of CAPTCHAs
-
-
-
15
-
-
0038483826
-
Emergence of scaling in random networks
-
A.-L. Barabasi and R. Albert. Emergence of Scaling in Random Networks. Science, 286:509-512, 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabasi, A.-L.1
Albert, R.2
-
16
-
-
0242710969
-
Introduction to markov chains: With special emphasis on rapid mixing
-
E. Behrends. Introduction to Markov chains: with Special Emphasis on Rapid Mixing. In Advanced Lectures in Mathematics, 2000.
-
(2000)
Advanced Lectures in Mathematics
-
-
Behrends, E.1
-
17
-
-
84865622599
-
All your contacts are belong to Us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In WWW, 2009.
-
(2009)
WWW
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
21
-
-
84885797269
-
Sybilproof reputation mechanisms
-
A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PEcon, 2005.
-
(2005)
P2PEcon
-
-
Cheng, A.1
Friedman, E.2
-
23
-
-
84887050003
-
SybilInfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes Using Social Networks. In NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
24
-
-
85030321143
-
MapReduce: Simplified data processing on large clusters
-
J. Dean and S. Ghemawat. MapReduce: Simplified Data Processing on Large Clusters. In OSDI, 2004.
-
(2004)
OSDI
-
-
Dean, J.1
Ghemawat, S.2
-
26
-
-
4544304744
-
The sybil attack
-
J. R. Douceur. The Sybil Attack. In IPTPS,2002.
-
(2002)
IPTPS
-
-
Douceur, J.R.1
-
27
-
-
80051972853
-
Preventing sybil attacks by privilege attenuation: ADesign principle for social network systems
-
P. W. L. Fong. Preventing Sybil Attacks by Privilege Attenuation: ADesign Principle for Social Network Systems. In IEEES&P,2011.
-
(2011)
IEEES&P
-
-
Fong, P.W.L.1
-
28
-
-
78650025451
-
Detecting and characterizing social spam campaigns
-
H. Gao, J. Hu, C. Wilson, Z. Li, Y. Chen, and B. Y. Zhao. Detecting and Characterizing Social Spam Campaigns. In IMC, 2010.
-
(2010)
IMC
-
-
Gao, H.1
Hu, J.2
Wilson, C.3
Li, Z.4
Chen, Y.5
Zhao, B.Y.6
-
29
-
-
78650115969
-
A walk in face-book: Uniform sampling of users in online social networks
-
M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Face-book: Uniform Sampling of Users in Online Social Networks. In IEEE INFOCOM, 2010.
-
(2010)
IEEE INFOCOM
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
31
-
-
0020083498
-
The meaning and use of the area under a receiver operating characteristic (ROC) curve
-
J. A. Hanley and B. J. McNeil. The Meaning and Use of the Area under a Receiver Operating Characteristic (ROC) Curve. Radiology, 143, 1982.
-
(1982)
Radiology
, pp. 143
-
-
Hanley, J.A.1
McNeil, B.J.2
-
32
-
-
3042697346
-
Evaluating collaborative filtering recommender systems
-
J. L. Herlocker, J. A. Konstan, L. G. Terveen, and J. T. Riedl. Evaluating Collaborative Filtering Recommender Systems. ACMTrans. Inf. Syst.,22, 2004.
-
(2004)
ACMTrans. Inf. Syst.
, pp. 22
-
-
Herlocker, J.L.1
Konstan, J.A.2
Terveen, L.G.3
Riedl, J.T.4
-
33
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
-
(2003)
WWW
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
36
-
-
85076766975
-
Whanau: A sybil-proof distributed hash table
-
C. Lesniewski-Laas and M. F. Kaashoek. Whanau: A Sybil-proof Distributed Hash Table. In NSDI, 2010.
-
(2010)
NSDI
-
-
Lesniewski-Laas, C.1
Kaashoek, M.F.2
-
37
-
-
45749135561
-
Ostra: Leveraging social networks to thwart unwanted traffic
-
A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
-
(2008)
NSDI
-
-
Mislove, A.1
Post, A.2
Druschel, P.3
Gummadi, K.P.4
-
38
-
-
84893108948
-
You are who you know: Inferring user profiles in online social networks
-
A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are Who You Know: Inferring User Profiles in Online Social Networks. In ACM WSDM, 2010.
-
(2010)
ACM WSDM
-
-
Mislove, A.1
Viswanath, B.2
Gummadi, K.P.3
Druschel, P.4
-
40
-
-
79960871268
-
Keep your friends close: Incorporating trust into social-network-based sybil defenses
-
A. Mohaisen, N. Hopper, and Y. Kim. Keep Your Friends Close: Incorporating Trust into Social-Network-based Sybil Defenses. In INFOCOM, 2011.
-
(2011)
INFOCOM
-
-
Mohaisen, A.1
Hopper, N.2
Kim, Y.3
-
41
-
-
84904118229
-
Measuring the mixing time of social graphs
-
A. Mohaisen, A. Yun, and Y. Kim. Measuring the Mixing Time of Social Graphs. In ACM IMC, 2010.
-
(2010)
ACM IMC
-
-
Mohaisen, A.1
Yun, A.2
Kim, Y.3
-
42
-
-
80053160731
-
Limiting large-scale crawls of social networking sites
-
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. Limiting Large-scale Crawls of Social Networking Sites. In SIGCOMMPoster Session, 2011.
-
(2011)
SIGCOMMPoster Session
-
-
Mondal, M.1
Viswanath, B.2
Clement, A.3
Druschel, P.4
Gummadi, K.P.5
Mislove, A.6
Post, A.7
-
43
-
-
84856151953
-
Dirty jobs: The role of freelance labor in web service abuse
-
M. Motoyama, D. McCoy, K. Levchenko, G. M. Voelker, and S. Savage. Dirty Jobs: The Role of Freelance Labor in Web Service Abuse. In Proceedings of the USENIX Security Symposium, 2011.
-
(2011)
Proceedings of the USENIX Security Symposium
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Voelker, G.M.4
Savage, S.5
-
44
-
-
84862950548
-
Ghostbusting facebook: Detecting and characterizing phantom profiles in online social gaming applications
-
A. Nazir, S. Raza, C.-N. Chuah, and B. Schipper. Ghostbusting Facebook: Detecting and Characterizing Phantom Profiles in Online Social Gaming Applications. In WOSN, 2010.
-
(2010)
WOSN
-
-
Nazir, A.1
Raza, S.2
Chuah, C.-N.3
Schipper, B.4
-
45
-
-
0003780986
-
-
Technical report, Stanford InfoLab
-
L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank Citation Ranking: Bringing Order to the Web. Technical report, Stanford InfoLab, 1999.
-
(1999)
The PageRank Citation Ranking: Bringing Order to the Web
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
46
-
-
85080797133
-
Bazaar: Strengthening user reputations in online marketplaces
-
A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening User Reputations in Online Marketplaces. In USENIX NSDI, 2011.
-
(2011)
USENIX NSDI
-
-
Post, A.1
Shah, V.2
Mislove, A.3
-
47
-
-
77953317298
-
Sybil attacks against mobile users: Friendsand foes to the rescue
-
D. Quercia and S. Hailes. Sybil Attacks Against Mobile Users: Friendsand Foes to the Rescue. In INFOCOM, 2010.
-
(2010)
INFOCOM
-
-
Quercia, D.1
Hailes, S.2
-
49
-
-
81255135726
-
Outside the closed world: On using machine learning for network intrusion detection
-
R. Sommer and V. Paxson. Outside the closed world: On using machine learning for network intrusion detection. In IEEE S&P, 2010.
-
(2010)
IEEE S&P
-
-
Sommer, R.1
Paxson, V.2
-
50
-
-
82955161550
-
Suspended accounts in retrospect: An analysis of twitter spam
-
K. Thomas, C. Grier, V. Paxson, and D. Song. Suspended Accounts in Retrospect: An Analysis of Twitter Spam. In IMC, 2011.
-
(2011)
IMC
-
-
Thomas, K.1
Grier, C.2
Paxson, V.3
Song, D.4
-
54
-
-
82955161549
-
Uncovering social network sybils in the wild
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering Social Network Sybils in the Wild. In IMC, 2011.
-
(2011)
IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
56
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks. InIEEES&P, 2008.
-
(2008)
IEEES&P
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
57
-
-
35548992569
-
SybilGuard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
58
-
-
70449670722
-
DSybil: Optimal sybil-resistance for recommendation systems
-
H. Yu, C. Shi, M. Kaminsky, P. B. Gibbons, and F. Xiao. DSybil: Optimal Sybil-Resistance for Recommendation Systems. In IEEES&P, 2009.
-
(2009)
IEEES&P
-
-
Yu, H.1
Shi, C.2
Kaminsky, M.3
Gibbons, P.B.4
Xiao, F.5
-
60
-
-
79954733367
-
BotGraph: Large scale spamming botnet detection
-
Y. Zhao, Y. Xie, F. Yu, Q. Ke, Y. Yu, Y. Chen, and E. Gillum. BotGraph: Large Scale Spamming Botnet Detection. In NSDI, 2009.
-
(2009)
NSDI
-
-
Zhao, Y.1
Xie, Y.2
Yu, F.3
Ke, Q.4
Yu, Y.5
Chen, Y.6
Gillum, E.7
|