Social Networking Statistics, URL (last checked 14 Dec 2012) http://www.internetsafety101.org/Socialnetworkingstats.htm.
 E. F. Walter, S. Battiston and F. Schweitzer, “Persona- lized and Dynamic Trust in Social Networks,” Proceed- ings of The Third ACM Conference on Recommender Systems, Association for Computing Machinery, New York, pp. 197-204.
 E. F. Walter, S. Battiston and F. Schweitzer, “A Model of a Trust-Based Recommendation System on a Social Network,” Autonomous Agents and Multi-Agent Systems, Vol. 16, No. 1, 2008, pp. 57-74. doi:10.1007/s10458-007-9021-x
 Uniform Resource Locator, “Weighted Graphs.” (last checked 02 Dec 2012) http://courses.cs.vt.edu/~cs3114/Fall10/Notes/T22.WeightedGraphs.pdf.
 A. K. Trivedi, R. Arora, R. Kapoor, Sudip Sanyal and Su- gata Sanyal, “A Semi-Distributed Reputation-Based In- trusion Detection System for Mobile Ad hoc Networks,” Journal of Information Assurance and Security, Vol. 1, No. 4, 2006, pp. 265-274.
 A. K. Trivedi, R. Kapoor, R. Arora, Sudip Sanyal and Sugata Sanyal, “RISM—Reputation Based Intrusion Detection System for Mobile Ad hoc Networks,” Third International Conference on Computers and Devices for Communications, Institute of Radio Physics and Electronics, University of Calcutta, Kolkata, 18-20 December 2006, pp. 234-237.
 P. A. Chirita, J. Diederich and W. Nejdl, “MailRank: Using Ranking for Spam Detection,” Proceedings of the 14th ACM international conference on Information and Knowledge Management, Bremen, 31 October-5 Novem- ber 2005.
 B. Markines, C. Cattuto and F. Menczer, “Social Spam Detection,” Proceedings of the 5th International Work- shop on Adversarial Information Retrieval on the Web, Madrid, 21-21 April 2009. doi:10.1145/1531914.1531924
 R. Bhadauria and S. Sanyal, “Survey on Security Issues in Cloud Computing and Associated Mitigation Tech- niques,” International Journal of Computer Applications, Vol. 47, No. 18, Foundation of Computer Science, New York, 2012, pp. 47-66. doi:10.5120/7292-0578
 R. A. Vasudevan, A. Abraham, S. Sanyal and D. P. Agra- wal, “Jigsaw-Based Secure Data Transfer over Computer Networks,” IEEE International Conference on Informa- tion Technology: Coding and Computing, Las Vegas, Vol. 1, 2004, pp. 2-6.
 A. Abraham, R. Jain, S. Sanyal and S. Y. Han, “SCIDS: A Soft Computing Intrusion Detection System,” In: A. Sen, et al., Eds., 6th International Workshop on Distri- buted Computing, Lecture Notes in Computer Science, Vol. 3326, Springer Verlag, Berlin, pp. 252-257.
 S. Sanyal, D. Gada, R. Gogri, P. Rathod, Z. Dedhia and N. Mody, “Security Scheme for Distributed DoS in Mobile Ad Hoc Networks,” Technical Report, School of Tech- nology & Computer Science, Tata Institute Of Funda- mental Research 2004.
 S. Pal, S. Khatua, N. Chaki and S. Sanyal, “A New Trust- ed and Collaborative Agent Based Approach for Ensuring Cloud Security,” Annals of Faculty Engineering Hune- doara International Journal of Engineering, Vol. 10, No. 1, 2012, pp. 71-78.
 P. Rathod, N. Mody, D. G., Rajat G., Z. Dedhia, S. San- yal and A. Abraham, “Security Scheme for Malicious Node Detection in Mobile Ad Hoc Networks,” In: A. Sen et al., Eds., 6th International Workshop on Distributed Computing, Lecture Notes in Computer Science, Vol. 3326, Springer Verlag, Berlin, 2004, pp. 541-542.
 Uniform Resource Locator, “Social Graph.” (last checked on 11 Dec 2012) http://en.wikipedia.org/wiki/Social_graph.
 Uniform Resource Locator, “Recommender System.” (last checked 10 Dec 2012) http://en.wikipedia.org/wiki/Recommender_system.
 V. Goyal, V. Kumar, M. Singh, A. Abraham and S. Sanyal, “CompChall: Addressing Password Guessing Attacks,” IEEE International Conference on In- formation Technology: Coding and Computing, Vol. 1, 4-6 April 2005, pp 739-744.