메뉴 건너뛰기




Volumn , Issue , 2010, Pages

SocialFilter: Introducing social trust to collaborative spam mitigation

Author keywords

[No Author keywords available]

Indexed keywords


EID: 85018515597     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (7)

References (30)
  • 1
    • 85091905146 scopus 로고    scopus 로고
    • Cloudmark
    • Cloudmark. www.cloudmark.com/en/home.html.
  • 2
    • 85091913880 scopus 로고    scopus 로고
    • Cooperative Network Security Community
    • Cooperative Network Security Community. http://www.dshield.org/.
  • 4
    • 85091897457 scopus 로고    scopus 로고
    • Facebook connect
    • Facebook connect. developers.facebook.com/connect.php.
  • 6
    • 85091947547 scopus 로고    scopus 로고
    • The SpamHaus Project
    • The SpamHaus Project. www.spamhaus.org/.
  • 8
    • 0038589165 scopus 로고    scopus 로고
    • The Anatomy of a Large-scale Hypertextual Web Search Engine
    • S. Brin and L. Page. The Anatomy of a Large-scale Hypertextual Web Search Engine. In Computer Networks and ISDN Systems, 1998.
    • (1998) Computer Networks and ISDN Systems
    • Brin, S.1    Page, L.2
  • 9
    • 84885797269 scopus 로고    scopus 로고
    • Sybilproof Reputation Mechanisms
    • A. Cheng and E. Friedman. Sybilproof Reputation Mechanisms. In P2PEcon, 2005.
    • (2005) P2PEcon
    • Cheng, A.1    Friedman, E.2
  • 10
    • 4544304744 scopus 로고    scopus 로고
    • The Sybil Attack
    • March
    • J. R. Douceur. The Sybil Attack. In IPTPS, March 2002.
    • (2002) IPTPS
    • Douceur, J. R.1
  • 11
    • 78650115969 scopus 로고    scopus 로고
    • A Walk in Facebook: Uniform Sampling of Users in Online Social Networks
    • M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Facebook: Uniform Sampling of Users in Online Social Networks. In INFOCOM, 2010.
    • (2010) INFOCOM
    • Gjoka, M.1    Kurant, M.2    Butts, C. T.3    Markopoulou, A.4
  • 12
    • 35248830148 scopus 로고    scopus 로고
    • Trust Propagation in Small Worlds
    • Springer
    • E. Gray, J.-M. Seigneur, Y. Chen, and C. Jensen. Trust Propagation in Small Worlds. In LNCS, pages 239-254. Springer, 2003.
    • (2003) LNCS , pp. 239-254
    • Gray, E.1    Seigneur, J.-M.2    Chen, Y.3    Jensen, C.4
  • 14
    • 77950193920 scopus 로고    scopus 로고
    • A Survey of Attack and Defense Techniques for Reputation Systems
    • K. Hoffman, D. Zage, and C. Nita-Rotaru. A Survey of Attack and Defense Techniques for Reputation Systems. In ACM Computing Surveys, 2008.
    • (2008) ACM Computing Surveys
    • Hoffman, K.1    Zage, D.2    Nita-Rotaru, C.3
  • 15
    • 84880467894 scopus 로고    scopus 로고
    • The EigenTrust Algorithm for Reputation Management in P2P Networks
    • S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust Algorithm for Reputation Management in P2P Networks. In WWW, 2003.
    • (2003) WWW
    • Kamvar, S. D.1    Schlosser, M. T.2    Garcia-Molina, H.3
  • 18
    • 45749135561 scopus 로고    scopus 로고
    • Ostra: Leveraging Social Networks to Thwart Unwanted Traffic
    • A. Mislove, A. Post, P. Druschel, and K. P. Gummadi. Ostra: Leveraging Social Networks to Thwart Unwanted Traffic. In NSDI, 2008.
    • (2008) NSDI
    • Mislove, A.1    Post, A.2    Druschel, P.3    Gummadi, K. P.4
  • 19
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A System for Detecting Network Intruders in Real-Time
    • V. Paxson. Bro: A System for Detecting Network Intruders in Real-Time. In Computer Networks, 1999.
    • (1999) Computer Networks
    • Paxson, V.1
  • 20
    • 33847737144 scopus 로고    scopus 로고
    • Understanding the Network-level Behavior of Spammers
    • A. Ramachandran and N. Feamster. Understanding the Network-level Behavior of Spammers. In ACM SIGCOMM, 2006.
    • (2006) ACM SIGCOMM
    • Ramachandran, A.1    Feamster, N.2
  • 21
    • 70449656128 scopus 로고    scopus 로고
    • RepuScore: Collaborative Reputation Management Framework for Email Infrastructure
    • G. Singaraju and B. B. Kang. RepuScore: Collaborative Reputation Management Framework for Email Infrastructure. In USENIX LISA, 2007.
    • (2007) USENIX LISA
    • Singaraju, G.1    Kang, B. B.2
  • 22
    • 84904799723 scopus 로고    scopus 로고
    • Tracking Email Reputation for Authenticated Sender Identities
    • G. Singaraju, J. Moss, and B. B. Kang. Tracking Email Reputation for Authenticated Sender Identities. In CEAS, 2008.
    • (2008) CEAS
    • Singaraju, G.1    Moss, J.2    Kang, B. B.3
  • 25
    • 55149090014 scopus 로고    scopus 로고
    • Experience with an Object Reputation System for Peer-to-Peer Filesharing
    • K. Walsh and E. G. Sirer. Experience with an Object Reputation System for Peer-to-Peer Filesharing. In NSDI, 2006.
    • (2006) NSDI
    • Walsh, K.1    Sirer, E. G.2
  • 27
    • 70449694823 scopus 로고    scopus 로고
    • A Near-Optimal Social Network Defense Against Sybil Attacks
    • H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. A Near-Optimal Social Network Defense Against Sybil Attacks. In IEEE S&P, 2008.
    • (2008) IEEE S&P
    • Yu, H.1    Gibbons, P.2    Kaminsky, M.3    Xiao, F.4
  • 29
    • 51349149626 scopus 로고    scopus 로고
    • ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System
    • Z. Zhong, L. Ramaswamy, and K. Li. ALPACAS: A Large-scale Privacy-Aware Collaborative Anti-spam System. In IEEE INFOCOM, 2008.
    • (2008) IEEE INFOCOM
    • Zhong, Z.1    Ramaswamy, L.2    Li, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.