1. Backes, M., Gomez-Rodriguez, M., Manoharan, P., Surma, B.: Reconciling privacy and utility in continuous-time diffusion networks. In: 2017 IEEE 30th Computer Security Foundations Symposium (CSF), pp. 292–304 (2017)
2. Brach, P., Epasto, A., Panconesi, A., Sankowski, P.: Spreading rumours without the network. In: COSN 2014—Proceedings of the 2014 ACM Conference on Online Social Networks, pp. 107–118 (2014). https://doi.org/10.1145/2660460.2660472
3. Buchbinder, N., Feldman, M., Naor, J., Schwartz, R.: A tight linear time (1/2)-approximation for unconstrained submodular maximization. In: 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pp. 649–658 (2012)
4. Budak, C., Agrawal, D., El Abbadi, A.: Limiting the spread of misinformation in social networks. In: Proceedings of the 20th International Conference on World Wide Web, pp. 665–674. ACM (2011)
5. Carnes, T., Nagarajan, C., Wild, S.M., van Zuylen, A.: Maximizing influence in a competitive social network: a follower’s perspective. In: Proceedings of the Ninth International Conference on Electronic Commerce, pp. 351–360 (2007)