{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:51:06Z","timestamp":1743097866188,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642228896"},{"type":"electronic","value":"9783642228902"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22890-2_8","type":"book-chapter","created":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T01:54:58Z","timestamp":1314150898000},"page":"86-97","source":"Crossref","is-referenced-by-count":0,"title":["TRAP: Open Decentralized Distributed Spam Filtering"],"prefix":"10.1007","author":[{"given":"Nahid","family":"Shahmehri","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David","family":"Byers","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Rahul","family":"Hiran","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"8_CR1","unstructured":"Distributed checksum clearinghouses, http:\/\/www.rhyolite.com\/dcc"},{"key":"8_CR2","first-page":"373","volume-title":"14th ACM International Conference on Information and Knowledge Management","author":"P. Chirita","year":"2005","unstructured":"Chirita, P., Diederich, J., Nejdl, W.: MailRank: Using Ranking for Spam Detection. In: 14th ACM International Conference on Information and Knowledge Management, pp. 373\u2013380. ACM, Bremen (2005)"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Damiani, E., Vimercati, S.D.C.D., Paraboschi, S., Samarati, P.: P2P-Based Collaborative Spam Detection and Filtering. Peer-to-Peer Computing, pp. 176\u2013183 (2004)","DOI":"10.1109\/PTP.2004.1334945"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Douceur, J.R.: In: Druschel, P., Kaashoek, M.F., Rowstron, A.I.T. (eds.) The Sybil Attack: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp. 251\u2013260. Springer, London (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Duma, C., Karresand, M., Shahmehri, N., Caronni, G.: A Trust-Aware, P2P-Based Overlay for Intrusion Detection. In: 17th International Workshop on Database and Expert Systems Applications, pp. 692\u2013697. Krakow, Poland (2006)","DOI":"10.1109\/DEXA.2006.21"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Duma, C., Shahmehri, N., Caronni, G.: Dynamic Trust Metrics for Peer-to-Peer Systems. In: Sixteenth International Workshop on Database and Expert Systems Applications, Copenhagen, Denmark, pp. 776\u2013781 (2005)","DOI":"10.1109\/DEXA.2005.80"},{"key":"8_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/11755593_7","volume-title":"Trust Management","author":"N. Foukia","year":"2006","unstructured":"Foukia, N., Zhou, L., Neuman, C.: Multilateral Decisions for Collaborative Defense Against Unsolicited Bulk E-mail: Trust Management. In: St\u00f8len, K., Winsborough, W., Martinelli, F., et al. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 77\u201392. Springer, Heidelberg (2006)"},{"key":"8_CR8","unstructured":"FreePastry, http:\/\/www.freepastry.org"},{"key":"8_CR9","doi-asserted-by":"crossref","unstructured":"Gong, Y., Chen, Q.: Research of Spam Filtering Based on Bayesian Algorithm. In: International Conference on Computer Application and System Modeling (ICCASM), Taiyuan, China, PP. V4-678\u2013V4-680 (2010)","DOI":"10.1109\/ICCASM.2010.5620432"},{"key":"8_CR10","unstructured":"Gray, A., Haahr, M.: Personalised, Collaborative Spam Filtering. In: First Conference on Email and Anti-Spam, CA, USA (2004)"},{"key":"8_CR11","doi-asserted-by":"crossref","unstructured":"Hoffman, K., Zage, D., Nita-Rotaru, C.: A Survey of Attack and Defense Techniques for Reputation Systems. ACM Computing Surveys, 1:1\u20131:31 (2009)","DOI":"10.1145\/1592451.1592452"},{"key":"8_CR12","unstructured":"Internet Traffic Report, http:\/\/www.internettrafficreport.com"},{"key":"8_CR13","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1109\/MC.2006.257","volume":"39","author":"J.S. Kong","year":"2006","unstructured":"Kong, J.S., Rezaei, B.A., Sarshar, N., Roychowdhury, V.P., Boykin, P.O.: Collaborative Spam Filtering using E-Mail Networks. Computer\u00a039, 67\u201373 (2006)","journal-title":"Computer"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Lee, Y., Kim, J.: Characterization of Large-Scale SMTP Traffic: The Coexistence of the Poisson Process and Self-Similarity. In: 2008 IEEE International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, MASCOTS (2008)","DOI":"10.1109\/MASCOT.2008.4770573"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TPDS.2008.143","volume":"20","author":"K. Li","year":"2009","unstructured":"Li, K., Zhong, Z., Ramaswamy, L.: Privacy-Aware Collaborative Spam Filtering. IEEE Transactions on Parallel and Distributed Systems\u00a020, 725\u2013739 (2009)","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"8_CR16","unstructured":"Measuring the popularity of SMTP server implementations on the Internet, http:\/\/www.stillhq.com\/research\/smtpsurveys_feb2010.html"},{"key":"8_CR17","doi-asserted-by":"publisher","first-page":"55","DOI":"10.4304\/jsw.3.5.55-64","volume":"3","author":"J. McGibney","year":"2008","unstructured":"McGibney, J., Botvich, D.: A Trust Based System for Enhanced Spam Filtering. Journal of Software\u00a03, 55\u201364 (2008)","journal-title":"Journal of Software"},{"key":"8_CR18","unstructured":"MAAWG: Messaging Anti-Abuse Working Group, http:\/\/www.maawg.org"},{"key":"8_CR19","unstructured":"Mills, D.: Network Time Protocol Version 4 Reference and Implementation Guide. Technical report (2006)"},{"key":"8_CR20","unstructured":"Milter.org, https:\/\/www.milter.org"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Mo, G., Zhao, W., Cao, H., Dong, J.: Multi-Agent Interaction Based Collaborative P2P System for Fighting Spam. In: 2006 IEEE\/WIC\/ACM International Conference on Intelligent Agent Technology, Washington, DC, USA, pp. 428\u2013431 (2007)","DOI":"10.1109\/IAT.2006.91"},{"key":"8_CR22","unstructured":"Postfix, http:\/\/www.postfix.org"},{"key":"8_CR23","unstructured":"Vipul\u2019s Razor, http:\/\/razor.sourceforge.net"},{"key":"8_CR24","unstructured":"Pyzor, http:\/\/sourceforge.net\/apps\/trac\/pyzor"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Rowstron, A.I.T., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems. In: IFIP\/ACM International Conference on Distributed Systems Platforms, pp. 329\u2013350. Springer, Heidelberg (2001)","DOI":"10.1007\/3-540-45518-3_18"},{"key":"8_CR26","unstructured":"The Apache SpamAssassin Project, http:\/\/spamassassin.apache.org"},{"key":"8_CR27","unstructured":"A Reputation-Based Approach for Efficient Filtration of Spam, http:\/\/www.cloudmark.com"},{"key":"8_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1007\/3-540-36532-X_4","volume-title":"Software Security \u2013 Theories and Systems","author":"D.S. Wallach","year":"2003","unstructured":"Wallach, D.S.: A survey of peer-to-peer security issues. In: Okada, M., Babu, C. S., Scedrov, A., Tokuda, H. (eds.) ISSS 2002. LNCS, vol.\u00a02609, pp. 42\u201357. Springer, Heidelberg (2003)"},{"key":"8_CR29","doi-asserted-by":"publisher","first-page":"843","DOI":"10.1109\/TKDE.2004.1318566","volume":"16","author":"L. Xiong","year":"2004","unstructured":"Xiong, L., Liu, L.: Peertrust: Supporting Reputation-Based Trust For Peer-To-Peer Electronic Communities. IEEE Transactions on Knowledge and Data Engineering\u00a016, 843\u2013857 (2004)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"8_CR30","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-44892-6_1","volume-title":"Middleware 2003","author":"F. Zhou","year":"2003","unstructured":"Zhou, F., Zhuang, L., Zhao, B.Y., Huang, L., Joseph, A.D., Kubiatowicz, J.: Approximate Object Location and Spam Filtering on Peer-to-Peer Systems. In: Endler, M., Schmidt, D.C. (eds.) Middleware 2003. LNCS, vol.\u00a02672, pp. 1\u201320. Springer, Heidelberg (2003)"}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22890-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T05:55:29Z","timestamp":1741499729000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22890-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642228896","9783642228902"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22890-2_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}