共 19 条
[11]
Jakobsson M., 2006, 15 INT C WORLD WID W
[13]
Lauinger T., 2010, LEET 2010 3 USENIX W
[14]
Mitnick K.D., 2003, The Art of Deception: controlling the Human Element of Security
[15]
AN ALGORITHM FOR SUFFIX STRIPPING
[J].
PROGRAM-AUTOMATED LIBRARY AND INFORMATION SYSTEMS,
1980, 14 (03)
:130-137
[16]
Stringhini G., 2010, ANN COMP SEC APPL C
[17]
Webb S., 2008, C EM ANT CEAS
[19]
SybilLimit: A near-optimal social network defense against sybil attacks
[J].
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY,
2008,
:3-+