-
1
-
-
37249053884
-
Social network sites: Definition, history, and scholarship
-
D. Boyd and N. B. Ellison, Social Network Sites: Definition, History, and Scholarship, J. Computer-Mediated Commun., vol.13, no.1, 2007.
-
(2007)
J. Computer-Mediated Commun.
, vol.13
, Issue.1
-
-
Boyd, D.1
Ellison, N.B.2
-
2
-
-
63749129357
-
The (Potential) benefits of campaigning via social network sites
-
S. Utz, The (Potential) Benefits of Campaigning via Social Network Sites, J. Computer-Mediated Commun., vol.14, no.2, 2009, pp. 221-243
-
(2009)
J. Computer-Mediated Commun.
, vol.14
, Issue.2
, pp. 221-243
-
-
Utz, S.1
-
7
-
-
77956959304
-
-
MySpace, http://www.myspace.com
-
-
-
-
8
-
-
77956968332
-
-
Orkut, http://www.orkut.com
-
-
-
-
9
-
-
77956948644
-
-
Facebook Developers, http://www.facebook.com/developers
-
-
-
-
10
-
-
77956946758
-
-
Facebook Markup Language (FBML), http://wiki.developers.facebook.com/ index.php/FBML
-
-
-
-
11
-
-
77956952292
-
-
Facebook Query Language (FQL), http://wiki.developers.facebook.com/index. php/FQL
-
-
-
-
12
-
-
77956973290
-
-
Facebook JavaScript (FBJS), http://wiki.developers.facebook.com/index. php/FBJS
-
-
-
-
13
-
-
77956961003
-
-
Facebook API, http://wiki.developers.facebook.com/index.php/API
-
-
-
-
14
-
-
77956970982
-
-
Photo of the Day, http://www.facebook.com/apps/application.php?id= 8752912084
-
Photo of the Day
-
-
-
15
-
-
77956960565
-
-
Lucky Art, http://www.facebook.com/apps/application.php?id=49562151481
-
Lucky Art
-
-
-
17
-
-
77956946214
-
-
Friendster, http://www.friendster.com
-
-
-
-
18
-
-
77956961179
-
-
OpenSocial, http://www.opensocial.org
-
-
-
-
19
-
-
77956976468
-
-
Friendster Developers Platform, http://www.friendster.com/developer/ index.php/type=fbopen
-
-
-
-
21
-
-
56649085023
-
Antisocial networks: Turning a social network into a botnet
-
Springer-Verlag
-
E. Athanasopoulos et al., Antisocial Networks: Turning a Social Network into a Botnet, ISC 08, Proc. 11th Intl. Conf. Info. Sec., Berlin, Heidelberg, 2008, Springer-Verlag, pp. 146-160
-
(2008)
ISC 08, Proc. 11th Intl. Conf. Info. Sec., Berlin, Heidelberg
, pp. 146-160
-
-
Athanasopoulos, E.1
-
22
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove et al., Measurement and Analysis of Online Social Networks, IMC07, Proc. 7th ACM SIGCOMM Conf. Internet Measurement, New York, NY, 2007, pp. 29-42.
-
(2007)
IMC07, Proc. 7th ACM SIGCOMM Conf. Internet Measurement, New York, NY
, pp. 29-42
-
-
Mislove, A.1
-
23
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
ACM
-
Y.-Y. Ahn et al., Analysis of Topological Characteristics of Huge Online Social Networking Services, WWW 07: Proc. 16th Intl. Conf. World Wide Web, New York, NY, 2007, ACM, pp. 835-844
-
(2007)
WWW 07: Proc. 16th Intl. Conf. World Wide Web, New York, NY
, pp. 835-844
-
-
Ahn, Y.-Y.1
-
24
-
-
33749575022
-
Membership, growth, and evolution, KDD 06
-
Group Formation in Large Social Networks
-
L. Backstrom et al., Group Formation in Large Social Networks: Membership, Growth, and Evolution, KDD 06, Proc.12th ACM SIGKDD Intl. Conf. Knowledge Discovery and Data Mining, New York, NY, 2006, pp 44-54.
-
(2006)
Proc.12th ACM SIGKDD Intl. Conf. Knowledge Discovery and Data Mining, New York, NY
, pp. 44-54
-
-
Backstrom, L.1
-
26
-
-
77956967062
-
-
MySpace XSS QuickTime Worm, 2006, http://securitylabs.websense.com/ content/Alerts/1319.aspx
-
(2006)
MySpace XSS QuickTime Worm
-
-
-
27
-
-
34547381072
-
Puppetnets: Misusing web browsers as a distributed attack infrastructure, CCS06
-
New York, NY
-
V. T. Lam et al., Puppetnets: Misusing Web Browsers as a Distributed Attack Infrastructure, CCS06: Proc. 13th ACM Conf. Comp. and Commun. Sec., New York, NY, 2006, pp. 221-234
-
(2006)
Proc. 13th ACM Conf. Comp. and Commun. Sec.
, pp. 221-234
-
-
Lam, V.T.1
-
28
-
-
34848911641
-
Social phishing
-
T. N. Jagatic et al., Social Phishing, Commun. ACM, vol.50, no.10, 2007, pp. 94-100.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
-
29
-
-
50249103030
-
Security issues and recommendations for online social networks
-
G. Hogben, Security Issues and Recommendations for Online Social Networks, tech. rep., ENISA, Oct. 2007.
-
(2007)
Tech. Rep., ENISA
-
-
Hogben, G.1
-
30
-
-
76649137380
-
Social networks and context-aware spam, CSCW 08
-
G. Brown et al., Social Networks and Context-Aware Spam, CSCW 08: Proc. ACM 2008 Conf. Comp. Supported Cooperative Work, New York, NY, 2008, pp. 403-412
-
Proc. ACM 2008 Conf. Comp. Supported Cooperative Work, New York, NY
, vol.2008
, pp. 403-412
-
-
Brown, G.1
-
31
-
-
33745816410
-
Why phishing works, CHI 06
-
R. Dhamija, J. D. Tygar, and M. Hearst, Why Phishing Works, CHI 06, Proc. SIGCHI Conf. Human Factors in Computing Dystems, New York, NY, 2006, pp. 581-590
-
(2006)
Proc. SIGCHI Conf. Human Factors in Computing Dystems, New York, NY
, pp. 581-590
-
-
Dhamija, R.1
Tygar, J.D.2
Hearst, M.3
-
32
-
-
33749016498
-
III, Information revelation and privacy in online social networks
-
ACM Wksp. Privacy in the Electronic Society, New York, NY, 2005
-
R. Gross, A. Acquisti, and H. J. Heinz, III, Information Revelation and Privacy in Online Social Networks, WPES05: Proc. 2005 ACM Wksp. Privacy in the Electronic Society, New York, NY, 2005, pp. 71-80.
-
(2005)
WPES05: Proc.
, pp. 71-80
-
-
Gross, R.1
Acquisti, A.2
Heinz, H.J.3
-
33
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge et al., All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks, WWW 09, Proc. 18th Intl. Conf. World Wide Web, New York, NY, 2009, pp. 551-560
-
(2009)
WWW 09, Proc. 18th Intl. Conf. World Wide Web, New York, NY
, pp. 551-560
-
-
Bilge, L.1
-
34
-
-
77952650934
-
-
BBC News
-
BBC News: Identity at risk on Facebook, 2008; http://news.bbc.co.uk/ 2/hi/programmes/click-online/7375772.stm
-
(2008)
Identity at Risk on Facebook
-
-
-
36
-
-
70450193106
-
Eight friends are enough: Social graph approximation via public listings
-
New York, NY
-
J. Bonneau et al., Eight Friends Are Enough: Social Graph Approximation via Public Listings, SNS09: Proc. 2nd EuroSys Wksp. Social Network Sys., New York, NY, 2009, pp. 13-18.
-
(2009)
SNS09: Proc. 2nd EuroSys Wksp. Social Network Sys.
, pp. 13-18
-
-
Bonneau, J.1
-
39
-
-
84874367188
-
-
Web 2.0 Security and Privacy Wksp., Oakland, CA, May 2009.
-
B. E. Ur and V. Ganapathy, Evaluating Attack Amplification in Online Social Networks, W2SP 09: 2009 Web 2.0 Security and Privacy Wksp., Oakland, CA, May 2009.
-
(2009)
Evaluating Attack Amplification in Online Social Networks W2SP 09
-
-
Ur, B.E.1
Ganapathy, V.2
|