-
1
-
-
77951175240
-
-
Alexa
-
Alexa, "Top 500 Global Sites," http://www.alexa.com/ topsites, 2009.
-
(2009)
Top 500 Global Sites
-
-
-
2
-
-
84899224263
-
-
"Facebook," http://www.facebook.com, 2009.
-
(2009)
Facebook
-
-
-
3
-
-
35348848696
-
Wherefore art thou R3579X?: Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg, "Wherefore Art Thou R3579X?: Anonymized Social Networks, Hidden Patterns, and Structural Steganography," in 16th Conference on World Wide Web (WWW'07), 2007.
-
(2007)
16th Conference on World Wide Web (WWW'07)
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
6
-
-
77954584058
-
To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles
-
E. Zheleva and L. Getoor, "To Join or Not To Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles," in 18th International Conference on World Wide Web (WWW), 2009.
-
(2009)
18th International Conference on World Wide Web (WWW)
-
-
Zheleva, E.1
Getoor, L.2
-
8
-
-
34250634485
-
Protecting browser state from web privacy attacks
-
C. Jackson, A. Bortz, D. Boneh, and J. C. Mitchell, "Protecting Browser State From Web Privacy Attacks," in 15th International Conference on World Wide Web (WWW), 2006.
-
(2006)
15th International Conference on World Wide Web (WWW)
-
-
Jackson, C.1
Bortz, A.2
Boneh, D.3
Mitchell, J.C.4
-
15
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
18
-
-
41949126461
-
Why and how to perform fraud experiments
-
March-April
-
M. Jakobsson, P. Finn, and N. Johnson, "Why and How to Perform Fraud Experiments," Security & Privacy, IEEE, vol. 6, no. 2, pp. 66-68, March-April 2008.
-
(2008)
Security & Privacy, IEEE
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
20
-
-
77955188460
-
-
"LinkedIn," http://www.linkedin.com, 2009.
-
(2009)
LinkedIn
-
-
-
21
-
-
77955218027
-
-
Computational Crawling LP
-
Computational Crawling LP, "801egs," http://www.801egs. com, 2009.
-
(2009)
801egs
-
-
-
22
-
-
37249087196
-
Web camouflage: Protecting your clients from browser-sniffing attacks
-
M. Jakobsson and S. Stamm, "Web Camouflage: Protecting Your Clients from Browser-Sniffing Attacks," IEEE Security and Privacy, vol. 5, no. 6, 2007.
-
(2007)
IEEE Security and Privacy
, vol.5
, Issue.6
-
-
Jakobsson, M.1
Stamm, S.2
-
23
-
-
77955214562
-
-
G. Maone, "NoScript," https://addons.mozilla.org/de/flrefox/ addon/722, 2009.
-
(2009)
NoScript
-
-
Maone, G.1
-
25
-
-
33847256529
-
The devil and packet trace anonymization
-
R. Pang, M. Allman, V. Paxson, and J. Lee, "The Devil and Packet Trace Anonymization," SIGCOMM Comput. Commun. Rev., vol. 36, no. 1, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev.
, vol.36
, Issue.1
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
26
-
-
77955220391
-
Playing devil's advocate: Inferring sensitive information from anonymized traces
-
S. Coulis, C. Wright, F. Monrose, M. Collins, and M. Reiter, "Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Traces," in Symposium on Network and Distributed Systems Security (NDSS), 2007.
-
(2007)
Symposium on Network and Distributed Systems Security (NDSS)
-
-
Coulis, S.1
Wright, C.2
Monrose, F.3
Collins, M.4
Reiter, M.5
-
27
-
-
77952609376
-
-
University of Texas at Dallas, Tech. Rep. UTDCS03-09
-
R. Heatherly, M. Kantarcioglu, and B. Thuraisingham, "Preventing Private Information Inference Attacks on Social Networks," University of Texas at Dallas, Tech. Rep. UTDCS03-09, 2009.
-
(2009)
Preventing Private Information Inference Attacks on Social Networks
-
-
Heatherly, R.1
Kantarcioglu, M.2
Thuraisingham, B.3
-
28
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," in 7th ACM SIGCOMM Internet Measurement Conference (IMC), 2007.
-
(2007)
7th ACM SIGCOMM Internet Measurement Conference (IMC)
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
30
-
-
76649137380
-
Social networks and context-aware spam
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders, "Social networks and context-aware spam," in ACM 2008 Conference on Computer Supported Cooperative Work (CSCW), 2008.
-
(2008)
ACM 2008 Conference on Computer Supported Cooperative Work (CSCW)
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
31
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strafe, D. Balzarotti, and E. Kirda, "All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks," in 18th International Conference on World Wide Web (WWW), 2009.
-
(2009)
18th International Conference on World Wide Web (WWW)
-
-
Bilge, L.1
Strafe, T.2
Balzarotti, D.3
Kirda, E.4
-
32
-
-
77955196696
-
Evaluating attack amplification in online social networks
-
B. E. Ur and V. Ganapathy, "Evaluating Attack Amplification in Online Social Networks," in Web 2.0 Securit and Privacy, 2009.
-
(2009)
Web 2.0 Securit and Privacy
-
-
Ur, B.E.1
Ganapathy, V.2
|