共 185 条
[2]
Abu-Nimeh S., 2006, PHISHING ATTACKS MOB
[3]
Aburrous M., 2008, P 3 INT C INF COMM T
[4]
Acquisti A., 2007, P SIGCHI C HUM FACT
[5]
Adelsbach A, 2005, LECT NOTES COMPUT SC, V3439, P204
[6]
Aggarwal A., 2012, ecrime researchers summit (ecrime), 2012, P1, DOI DOI 10.1109/ECRIME.2012.6489521
[7]
Agten Pieter, 2015, P 22 NETW DISTR SYST
[8]
Algarni A, 2013, INT CONF INTERNET, P508, DOI 10.1109/ICIST.2013.6747602
[9]
Ali S.M., 2014, International Journal of Applied, V4
[10]
SoK: The Evolution of Sybil Defense via Social Networks
[J].
2013 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP),
2013,
:382-396