{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:59:53Z","timestamp":1775638793582,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642374005","type":"print"},{"value":"9783642374012","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_21","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T04:03:25Z","timestamp":1363925005000},"page":"196-207","source":"Crossref","is-referenced-by-count":59,"title":["Collusion Detection in Online Rating Systems"],"prefix":"10.1007","author":[{"given":"Mohammad","family":"Allahbakhsh","sequence":"first","affiliation":[]},{"given":"Aleksandar","family":"Ignjatovic","sequence":"additional","affiliation":[]},{"given":"Boualem","family":"Benatallah","sequence":"additional","affiliation":[]},{"given":"Seyed-Mehdi-Reza","family":"Beheshti","sequence":"additional","affiliation":[]},{"given":"Elisa","family":"Bertino","sequence":"additional","affiliation":[]},{"given":"Norman","family":"Foo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","unstructured":"Agrawal, R., Srikant, R.: Fast algorithms for mining association rules in large databases. In: Proceedings of VLDB 1994, pp. 487\u2013499 (1994)"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Allahbakhsh, M., Ignjatovic, A., Benatallah, B., Beheshti, S.-M.-R., Foo, N., Bertino, E.: Detecting, Representing and Querying Collusion in Online Rating Systems. ArXiv e-prints (November 2012)","DOI":"10.1007\/978-3-642-37401-2_21"},{"key":"21_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/978-3-642-35063-4_16","volume-title":"Web Information Systems Engineering - WISE 2012","author":"S.-M.-R. Beheshti","year":"2012","unstructured":"Beheshti, S.-M.-R., Benatallah, B., Motahari-Nezhad, H.R., Allahbakhsh, M.: A framework and a language for on-line analytical processing on graphs. In: Wang, X.S., Cruz, I., Delis, A., Huang, G. (eds.) WISE 2012. LNCS, vol.\u00a07651, pp. 213\u2013227. Springer, Heidelberg (2012)"},{"issue":"15","key":"21_CR4","doi-asserted-by":"publisher","first-page":"3517","DOI":"10.1016\/j.comnet.2011.06.028","volume":"55","author":"G. Ciccarelli","year":"2011","unstructured":"Ciccarelli, G., Cigno, R.L.: Collusion in peer-to-peer systems. Computer Networks\u00a055(15), 3517\u20133532 (2011)","journal-title":"Computer Networks"},{"key":"21_CR5","doi-asserted-by":"crossref","unstructured":"Flanagin, A., Metzger, M., Pure, R., Markov, A.: User-generated ratings and the evaluation of credibility and product quality in ecommerce transactions. In: HICSS 2011, pp. 1\u201310. IEEE (2011)","DOI":"10.1109\/HICSS.2011.474"},{"key":"21_CR6","unstructured":"Harmon, A.: Amazon glitch unmasks war of reviewers. NY Times (February 14, 2004)"},{"issue":"1","key":"21_CR7","doi-asserted-by":"publisher","first-page":"61","DOI":"10.2307\/41166371","volume":"49","author":"J.M.J. Brown","year":"2006","unstructured":"Brown, J.M.J.: Reputation in online auctions: The market for trust. California Management Review\u00a049(1), 61\u201381 (2006)","journal-title":"California Management Review"},{"key":"21_CR8","doi-asserted-by":"crossref","unstructured":"Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in p2p networks. In: Proceedings of the WWW 2003, pp. 640\u2013651 (2003)","DOI":"10.1145\/775240.775242"},{"key":"21_CR9","unstructured":"Kerr, R.: Coalition detection and identification. In: The 9th International Conference on Autonomous Agents and Multiagent Systems, pp. 1657\u20131658 (2010)"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Lee, H., Kim, J., Shin, K.: Simplified clique detection for collusion-resistant reputation management scheme in p2p networks. In: ISCIT 2010, pp. 273\u2013278 (2010)","DOI":"10.1109\/ISCIT.2010.5664851"},{"key":"21_CR11","volume-title":"The dynamics of viral marketing","author":"J. Leskovec","year":"2007","unstructured":"Leskovec, J., Adamic, L.A., Huberman, B.A.: The dynamics of viral marketing, vol.\u00a01. ACM, New York (2007)"},{"key":"21_CR12","first-page":"939","volume-title":"Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM 2010","author":"E. Lim","year":"2010","unstructured":"Lim, E., et al.: Detecting product review spammers using rating behaviors. In: Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM 2010, pp. 939\u2013948. ACM, New York (2010)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance, N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st International Conference on World Wide Web. ACM (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"21_CR14","doi-asserted-by":"crossref","unstructured":"Qio, L., et al.: An empirical study of collusion behavior in the maze p2p file-sharing system. In: Proceedings of the ICDCS 2007, p. 56 (2007)","DOI":"10.1109\/ICDCS.2007.84"},{"issue":"4","key":"21_CR15","doi-asserted-by":"publisher","first-page":"262","DOI":"10.1002\/asi.4630340406","volume":"34","author":"G. Salton","year":"1983","unstructured":"Salton, G., Buckley, C., Fox, E.A.: Automatic query formulations in information retrieval. Journal of the American Society for Information Science\u00a034(4), 262\u2013280 (1983)","journal-title":"Journal of the American Society for Information Science"},{"key":"21_CR16","unstructured":"Salton, G., McGill, M.: Introduction to modern information retrieval. McGraw-Hill computer science series. McGraw-Hill (1983)"},{"issue":"2","key":"21_CR17","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1109\/MSP.2011.942344","volume":"29","author":"Y. Sun","year":"2012","unstructured":"Sun, Y., Liu, Y.: Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Processing Magazine\u00a029(2), 87\u201397 (2012)","journal-title":"IEEE Signal Processing Magazine"},{"key":"21_CR18","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1007\/s10660-010-9064-y","volume":"10","author":"G. Swamynathan","year":"2010","unstructured":"Swamynathan, G., Almeroth, K., Zhao, B.: The design of a reliable reputation system. Electronic Commerce Research\u00a010, 239\u2013270 (2010), 10.1007\/s10660-010-9064-y","journal-title":"Electronic Commerce Research"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Yang, Y., Feng, Q., Sun, Y.L., Dai, Y.: Reptrap: a novel attack on feedback-based reputation systems. In: Proceedings of SecureComm 2008, pp. 8:1\u20138:11 (2008)","DOI":"10.1145\/1460877.1460888"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:27:02Z","timestamp":1745976422000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_21","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013]]}}}