{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T23:38:06Z","timestamp":1725838686776},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319256443"},{"type":"electronic","value":"9783319256450"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25645-0_34","type":"book-chapter","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T12:24:45Z","timestamp":1448281485000},"page":"459-466","source":"Crossref","is-referenced-by-count":5,"title":["First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks"],"prefix":"10.1007","author":[{"given":"Li","family":"Xu","sequence":"first","affiliation":[]},{"given":"Limei","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Sheng","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"34_CR1","doi-asserted-by":"crossref","unstructured":"Boldrini, C., Conti, M., Passarella, A.: Contentplace: social-aware data dissemination in opportunistic networks. In: Proc. ACM Int. Symp. Model. Anal. Simul. Wireless Mobile Syst., pp. 203\u2013210 (2008)","DOI":"10.1145\/1454503.1454541"},{"issue":"12","key":"34_CR2","doi-asserted-by":"publisher","first-page":"2254","DOI":"10.1109\/TPDS.2012.83","volume":"23","author":"E Bulut","year":"2012","unstructured":"Bulut, E., Szymanski, B.K.: Exploiting Friendship Relations for Efficient Routing in Mobile Social Networks. IEEE Transactions on Parallel and Distributed Systems 23(12), 2254\u20132265 (2012)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"34_CR3","doi-asserted-by":"crossref","unstructured":"Fall, K.: A delay-tolerant network architecture for challenged internets. In: Proc. ACM SIGCOMM 2003 (2003)","DOI":"10.1145\/863955.863960"},{"issue":"11","key":"34_CR4","doi-asserted-by":"publisher","first-page":"2132","DOI":"10.1109\/TMC.2012.188","volume":"12","author":"L Gao","year":"2013","unstructured":"Gao, L., Li, M., Bonti, A., Zhou, W., Yu, S.: Multidimensional Routing Protocol in Human-Associated Delay-Tolerant Networks. IEEE Transactions on Mobile Computing 12(11), 2132\u20132144 (2013)","journal-title":"IEEE Transactions on Mobile Computing"},{"issue":"12","key":"34_CR5","first-page":"2130","volume":"99","author":"N Kayastha","year":"2011","unstructured":"Kayastha, N., Niyato, D., Wang, P., Hossain, E.: Architectures, and Protocol Design Issues for Mobile Social Networks: a Survey. Journal: Proceedings of the IEEE-PIEEE 99(12), 2130\u20132158 (2011)","journal-title":"Journal: Proceedings of the IEEE-PIEEE"},{"issue":"10","key":"34_CR6","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1109\/12.888036","volume":"49","author":"E Kranakis","year":"2000","unstructured":"Kranakis, E., Pelc, A.: Better adaptive diagnosis of hypercubes. IEEE Transactions on Computers 49(10), 1013\u20131020 (2000)","journal-title":"IEEE Transactions on Computers"},{"issue":"2","key":"34_CR7","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1080\/00207160.2014.900548","volume":"92","author":"L Lin","year":"2015","unstructured":"Lin, L., Xu, L., Zhou, S.: Conditional Diagnosability of Shuffle-Cubes under the Comparison Model. International Journal of Computer Mathematics 92(2), 230\u2013249 (2015)","journal-title":"International Journal of Computer Mathematics"},{"key":"34_CR8","doi-asserted-by":"crossref","unstructured":"Lin, L., Xu, L., Zhou, S., Wu, W.: The social feature-based priority relation graph of mobile social networks. In: 2014 IEEE 17th International Conference on Computational Science and Engineering (CSE), pp. 1921\u20131926. IEEE (2014)","DOI":"10.1109\/CSE.2014.352"},{"key":"34_CR9","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.tcs.2014.06.041","volume":"548","author":"L Lin","year":"2014","unstructured":"Lin, L., Zhou, S., Xu, L., Wang, D.: Conditional Diagnosability of Arrangement Graphs under the PMC Model. Theoretical Computer Science 548, 79\u201397 (2014)","journal-title":"Theoretical Computer Science"},{"issue":"8","key":"34_CR10","doi-asserted-by":"publisher","first-page":"2352","DOI":"10.1109\/TPDS.2014.2347961","volume":"26","author":"L Lin","year":"2015","unstructured":"Lin, L., Zhou, S., Xu, L., Wang, D.: The extra connectivity and conditional diagnosability of alternating group networks. IEEE Transactions on Parallel and Distributed Systems 26(8), 2352\u20132362 (2015)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"2","key":"34_CR11","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1109\/TMC.2008.107","volume":"8","author":"M Musolesi","year":"2009","unstructured":"Musolesi, M., Mascolo, C.: CAR: Context-Aware Adaptive Routing for Delay-Rolerant Mobile Networks. IEEE Transactions on Mobile Computing 8(2), 246\u2013260 (2009)","journal-title":"IEEE Transactions on Mobile Computing"},{"key":"34_CR12","first-page":"036122-1","volume":"68","author":"MEJ Newman","year":"2003","unstructured":"Newman, M.E.J., Park, J.: Why Social Networks are Different from Other Types of Networks. PHYSICAL REVIEW E 68, 036122-1\u2013036122-8 (2003)","journal-title":"PHYSICAL REVIEW E"},{"issue":"6","key":"34_CR13","doi-asserted-by":"publisher","first-page":"848","DOI":"10.1109\/PGEC.1967.264748","volume":"EC\u201316","author":"FP Preparata","year":"1967","unstructured":"Preparata, F.P., Metze, G., Chien, R.T.: On the Connection Assignment Problem of Diagnosable Systems. IEEE Transactions on Electronic Computers EC\u201316(6), 848\u2013854 (1967)","journal-title":"IEEE Transactions on Electronic Computers"},{"issue":"7","key":"34_CR14","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1109\/12.2234","volume":"37","author":"Y Saad","year":"1988","unstructured":"Saad, Y., Schultz, M.: Topological Properties of Hypercubes. IEEE Transactions on Computers 37(7), 867\u2013872 (1988)","journal-title":"IEEE Transactions on Computers"},{"issue":"9","key":"34_CR15","doi-asserted-by":"publisher","first-page":"1706","DOI":"10.1109\/TPDS.2012.281","volume":"24","author":"Y Wang","year":"2013","unstructured":"Wang, Y., Yang, W.-S., Wu, J.: Analysis of a Hypercube-based Social Feature Multi-Path Routing in Delay Tolerant Networks. IEEE Transactions on Parallel and Distributed Systems 24(9), 1706\u20131716 (2013)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"34_CR16","doi-asserted-by":"publisher","first-page":"1302","DOI":"10.1126\/science.1070120","volume":"296","author":"DJ Watts","year":"2002","unstructured":"Watts, D.J., Dodds, P.S., Newman, M.E.J.: Identity and Search in Social Networks. Science 296, 1302\u20131305 (2002)","journal-title":"Science"},{"key":"34_CR17","doi-asserted-by":"crossref","unstructured":"Wu, J., Wang, Y.: Social feature-based multi-path routing in delay tolerant networks, In: Proceedings IEEE INFOCOM 2012, pp. 1368\u20131376 (2012)","DOI":"10.1109\/INFCOM.2012.6195500"},{"issue":"2","key":"34_CR18","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1109\/TC.2012.209","volume":"63","author":"J Wu","year":"2014","unstructured":"Wu, J., Wang, Y.: Hypercube-based Multi-path Social Feature Routing in Human Contact Networks. IEEE Transactions on Computers 63(2), 383\u2013396 (2014)","journal-title":"IEEE Transactions on Computers"},{"issue":"7","key":"34_CR19","doi-asserted-by":"publisher","first-page":"1682","DOI":"10.1109\/TC.2013.55","volume":"63","author":"M Xiao","year":"2014","unstructured":"Xiao, M., Wu, J., Huang, L.: Community-Aware Opportunistic Routing in Mobile Social Networks. IEEE Transactions on Computers 63(7), 1682\u20131695 (2014)","journal-title":"IEEE Transactions on Computers"},{"key":"34_CR20","volume-title":"Combinatorrial Theory in Networks","author":"J-M Xu","year":"2013","unstructured":"Xu, J.-M.: Combinatorrial Theory in Networks. Science Press, Beijing (2013)"}],"container-title":["Lecture Notes in Computer Science","Network and System Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25645-0_34","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T16:45:03Z","timestamp":1559321103000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25645-0_34"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319256443","9783319256450"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25645-0_34","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}