Publisher
Springer International Publishing
Reference25 articles.
1. Biggio, B., Fumera, G., Pillai, I., & Roli, F. (2011). A survey and experimental evaluation of image spam filtering techniques. Pattern Recognition Letters, 32(10), 1436–1446. Retrieved from
http://linkinghub.elsevier.com/retrieve/pii/S0167865511000936
.
2. Zhou, F., Zhuang, L., Zhao, B. Y., Huang, L., Joseph, A. D., & Kubiatowicz, J. (2003). Approximate object location and spam filtering on peer-to-peer systems. In Proceedings of the ACM/IFIP/USENIX 2003 International Conference on Middleware (pp. 1–20). Rio de Janeiro, Brazil: U. C. Berkeley. Retrieved from
https://dl.acm.org/citation.cfm?id=1515915.1515917
.
3. Gupta, R., Singha, N., & Singh, Y. N. (2016). Reputation based probabilistic resource allocation for avoiding free riding and formation of common interest groups in unstructured P2P networks. Peer-to-Peer Networking and Applications, 9(6), 1101–1113. Retrieved from
http://link.springer.com/10.1007/s12083-015-0389-0
.
4. Jin, X., & Chan, S.-H. G. (2010). Detecting malicious nodes in peer-to-peer streaming by peer-based monitoring. ACM Transactions on Multimedia Computing, Communications, and Applications, 6(2), 1–18. Retrieved from
http://portal.acm.org/citation.cfm?doid=1671962.1671965
.
5. Kurdi, H. (2015). HonestPeer: An enhanced EigenTrust algorithm for reputation management in fP2Pg systems. The Journal of King Saud University Computer and Information Sciences, 27(3), 315–322. Retrieved from
https://slideheaven.com/distributed-classification-for-image-spam-detection.html
.