Sciweavers

219 search results - page 6 / 44
» Detecting spammers on social networks
Sort
View
INFOCOM
2012
IEEE
12 years 12 months ago
SybilDefender: Defend against sybil attacks in large social networks
—Distributed systems without trusted identities are particularly vulnerable to sybil attacks, where an adversary creates multiple bogus identities to compromise the running of th...
Wei Wei, Fengyuan Xu, Chiu Chiang Tan, Qun Li
ASUNAM
2010
IEEE
14 years 11 months ago
Detecting Highly Overlapping Communities with Model-Based Overlapping Seed Expansion
Abstract--As research into community finding in social networks progresses, there is a need for algorithms capable of detecting overlapping community structure. Many algorithms hav...
Aaron McDaid, Neil Hurley
117
Voted
INFOCOM
2011
IEEE
14 years 28 days ago
Adaptive algorithms for detecting community structure in dynamic social networks
—Social networks exhibit a very special property: community structure. Understanding the network community structure is of great advantages. It not only provides helpful informat...
Nam P. Nguyen, Thang N. Dinh, Ying Xuan, My T. Tha...
96
Voted
WIMOB
2008
IEEE
15 years 3 months ago
Exploiting Self-Reported Social Networks for Routing in Ubiquitous Computing Environments
— Mobile, delay-tolerant, ad hoc and pocket-switched networks may form an important part of future ubiquitous computing environments. Understanding how to efficiently and effect...
Greg Bigwood, D. Rehunathan, Martin Bateman, Trist...
85
Voted
CEAS
2006
Springer
15 years 1 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...