|
[1] J. R. Douceur., ``The sybil attack.'' IPTPS, 2002. [2] H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, ``SybilGuard: Defending Against Sybil Attacks via Social Networks,'' in Proc., ser. SIGCOMM ''06. New York, NY, USA: ACM, 2006, pp. 267--278. [Online]. Available: http: //doi.acm.org/10.1145/1159913.1159945 [3] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, ``SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks,'' Networking, IEEE/ACM Transactions on, vol. 18, no. 3, pp. 885--898, 2010. [4] N. Tran, B. Min, J. Li, and L. Subramanian, ``Sybil-Resilient Online Content Rating,'' in Proceedings of the 6th USENIX symposium on Networked systems design and implementation, ser. NSDI''09. Berkeley, CA, USA: USENIX Association, 2009, pp. 15--28. [Online]. Available: http://dl.acm.org/citation.cfm?id=1558977.1558979 [5] N. Tran, J. Li, L. Subramanian, and S. Chow, ``Optimal Sybil-resilient node admission control,'' in INFOCOM, 2011 Proceedings IEEE, 2011, pp. 3218--3226. [6] W. Wei, F. Xu, C. Tan, and Q. Li, ``SybilDefender: Defend Against Sybil Attacks in Large Social Networks,'' in INFOCOM, 2012 Proceedings IEEE, 2012, pp. 1951-- 1959. [7] G. Danezis and P. Mittal, ``SybilInfer: Detecting Sybil Nodes using Social Networks,'' 2009. [8] L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, ``All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks,'' in Proceedings of the 18th international conference on World wide web, ser. WWW ''09. New York, NY, USA: ACM, 2009, pp. 551--560. [Online]. Available: http://doi.acm.org/10.1145/1526709.1526784 [9] M. Mitzenmacher and E. Upfal., ``Probability and Computing,'' Cambridge University Press, 2005. [10] Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai, ``Uncovering Social Network Sybils in the Wild,'' in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, ser. IMC ''11. New York, NY, USA: ACM, 2011, pp. 259--268. [Online]. Available: http://doi.acm.org/10.1145/ 2068816.2068841 [11] S. Ghorbani and Y. Ganjali, ``Will You Be My Friend? Privacy Implications of Accepting Friendships in Online Social Networks,'' in Information Society (i-Society), 2012 International Conference on, 2012, pp. 340--345. [12] J. Yang and J. Leskovec, ``Defining and Evaluating Network Communities based on Ground-truth,'' CoRR, vol. abs/1205.6233, 2012.
|