1 |
J. Douceur, "The Sybil attack," in Peer-to-Peer Systems, ser. Lecture notes in Computer Science. vol. 2429, pp. 251-260, 2002.
|
2 |
H. Yu, C. Shi, M. Kaminsky, P. Gibbsons and F.Xiao, "Dsybil: Optimal Sybil-Resistance for Recommendation Systems," Proceedings of the 30th IEEE Symposium on Security and Privacy, pp. 283-298, Jan. 2009.
|
3 |
Giseop Noh, Young-myoung Kang, Hayoung Oh, Chong-kwon Kim, "Robust Sybil attack defense with information level in online Recommender Systems," Proceedings of the Expert Systems with Applications vol. 41, no. 4, pp. 1781-1791, Mar. 2014.
DOI
|
4 |
Fangzhao Wu et al., "Social Spammer and Spam Message Co-Detection in Microblogging with Social Context Regularization", Proceedings of the 24th ACM International on Conference on Information and Knowledge Management, pp. 1601-1610, Oct. 2015.
|
5 |
Arp D, et al., "Drebin: Effective and explainable detection of android malware in your pocket", Proceedings of the 21th Annual Network and Distributed System Security Symposium (NDSS '14), Feb. 2014.
|
6 |
Kang H, Jang Jw, Mohaisen A, Kim HK, "Detecting and Classifying Android Malware using Static Analysis along with Creator Information", International Journal of Distributed Sensor Networks, vol. 11 no. 6, pp. 1-9, June. 2015.
|
7 |
Jaehoon Lee et al., "Robust Recommender System considering additional short-answer evaluation on a Review Comments", Korea Institute of Information Security & Cryptology, Aug. 2015.
|
8 |
Taewan Noh et al., "STA : Sybil Type-aware Robust Recommender System", KIISE Transactions on Computing Practices, Vol. 21, No. 10, pp. 670-679, Oct. 2015.
DOI
|
9 |
Neil Zhenqiang Gong, Mario Frank, and Prateek Mittal, "SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection", IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 9, NO. 6, JUNE 2014.
|
10 |
Zhuo Zhang and Kulkarni, S.R., "Detection of shilling attacks in recommender systems via spectral clustering", Information Fusion (FUSION), 2014 17th International Conference on, Oct. 2014.
|
11 |
Hayoung Oh, Jiyoung Lim, Kijoon Chae and Jungchan Nah, "Home Gateway with Automated Real-Time Intrusion Detection for Secure Home Networks", Lecture Notes in Computer Science Volume 3983, pp 440-447, Jan. 2006.
|
12 |
Kyoungae Hwang, Hayoung Oh, Jiyoung Lim, Kijoon Chae and Jungchan Nah, "Traffic Attributes Correlation Mechanism based on Self-Organizing Maps for Real-Time Intrusion Detection", Information Processing Society Journal, Volume 12C, Issue 5, pp.649-658, Oct. 2005.
|
13 |
Hayoung Oh, "Unsupervised Scheme for Reverse Social Engineering Detection in Online Social Networks", KIPS Tr. Software and Data Eng, Vol. 4, No. 3, pp.129-134, April. 2015.
DOI
|
14 |
Changchang Liu et al., "Exploiting Temporal Dynamics in Sybil Defenses", ACM CCS, pp.805-816, Jan. 2015.
|