Author:
Reid Fergal,Harrigan Martin
Reference30 articles.
1. Altshuler Y, Aharony N, Elovici Y, Pentland A, Cebrian M (2011) Stealing reality: when criminals become data scientists (or vice versa). IEEE Int Syst 26(6):22–30
2. Anderson A, Cannell D, Gibbons T, Grote G, Henn J, Kennedy J, Muir M, Potter N, Whitby R (1966) An electronic cash and credit system. American Management Association, New York
3. Back A (2002) Hashcash – a denial of service counter-measure.
http://www.hashcash.org/papers/hashcash.pdf
, Retrieved 12 Nov 2011
4. Backstrom L, Dwork C, Kleinberg J (2007) Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography. In: Proceedings of the 16th International Conference on World Wide Web, Banff. ACM, New York, pp 181–190
5. Barabási A, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512
Cited by
316 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献