-
2
-
-
54849439913
-
Internet social network communities: Risk taking, trust, and privacy concerns
-
Fogel, J., Nehmad, E.: Internet social network communities: Risk taking, trust, and privacy concerns. Comput. Hum. Behav. 25(1), 153-160 (2009)
-
(2009)
Comput. Hum. Behav.
, vol.25
, Issue.1
, pp. 153-160
-
-
Fogel, J.1
Nehmad, E.2
-
3
-
-
33749016498
-
Information revelation and privacy in online social networks
-
Gross, R., Acquisti, A., Heinz III, H.J.: Information revelation and privacy in online social networks. In: ACM Workshop on Privacy in the Electronic Society, WPES (2005)
-
ACM Workshop on Privacy in the Electronic Society, WPES (2005)
-
-
Gross, R.1
Acquisti, A.2
Heinz III, H.J.3
-
4
-
-
34848911641
-
Social phishing
-
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. ACM Commun. 50(10), 94-100 (2007)
-
(2007)
ACM Commun.
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
5
-
-
41949126461
-
Why and how to perform fraud experiments
-
DOI 10.1109/MSP.2008.52, 4480466
-
Jakobsson, M., Finn, P., Johnson, N.: Why and How to Perform Fraud Experiments. IEEE Security & Privacy 6(2), 66-68 (2008) (Pubitemid 351506258)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Johnson, N.2
Finn, P.3
-
7
-
-
76649137380
-
Social networks and context-aware spam
-
Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social networks and context-aware spam. In: ACM Conference on Computer Supported Cooperative Work, CSCW (2008)
-
ACM Conference on Computer Supported Cooperative Work, CSCW (2008)
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
8
-
-
78249239633
-
-
September
-
News, H.: Spam-Bots werten soziale Netze aus (September 2009), http://www. heise.de/security/Spam-Bots-werten-soziale-Netze-aus-/news/ meldung/145344
-
(2009)
Spam-Bots Werten Soziale Netze Aus
-
-
News, H.1
-
10
-
-
85031577008
-
The Finger User Information Protocol
-
December
-
Zimmerman, D.: The Finger User Information Protocol. RFC 1288 (Draft Standard) (December 1991)
-
(1991)
RFC 1288 (Draft Standard)
-
-
Zimmerman, D.1
-
13
-
-
78249269327
-
-
Python Software Foundation: Python 2.6 urllib module, http://docs.python.org/ library/urllib.html
-
Python 2.6 Urllib Module
-
-
-
14
-
-
70849091591
-
Large online social footprints-an emerging threat
-
Irani, D., Webb, S., Li, K., Pu, C.: Large online social footprints-an emerging threat. IEEE International Conference on Computational Science and Engineering 3, 271-276 (2009)
-
(2009)
IEEE International Conference on Computational Science and Engineering
, vol.3
, pp. 271-276
-
-
Irani, D.1
Webb, S.2
Li, K.3
Pu, C.4
-
15
-
-
77956116647
-
-
April
-
Facebook: Statistics (April 2010), http://www.facebook.com/press/info. php?statistics
-
(2010)
Statistics
-
-
-
16
-
-
35348884906
-
A large-scale study of web password habits
-
Florencio, D., Herley, C.: A large-scale study of web password habits. In: 16th International Conference on World Wide Web (WWW), New York, NY, USA (2007)
-
16th International Conference on World Wide Web (WWW), New York, NY, USA (2007)
-
-
Florencio, D.1
Herley, C.2
-
17
-
-
35248831179
-
CAPTCHA: Using Hard AI Problems for Security
-
Biham, E. (ed.) EUROCRYPT 2003. Springer, Heidelberg
-
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: CAPTCHA: Using Hard AI Problems for Security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2656
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
22
-
-
84865622599
-
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks
-
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: 18th International Conference on World Wide Web, WWW (2009)
-
18th International Conference on World Wide Web, WWW (2009)
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
24
-
-
70849116903
-
(Under)mining Privacy in Social Networks
-
Chew, M., Balfanz, D., Laurie, B.: (Under)mining Privacy in Social Networks. In: Proceedings of Web 2.0 Security and Privacy Workshop, W2SP (2008)
-
Proceedings of Web 2.0 Security and Privacy Workshop, W2SP (2008)
-
-
Chew, M.1
Balfanz, D.2
Laurie, B.3
-
25
-
-
51849140921
-
Whose space is MySpace? A content analysis of MySpace profiles
-
August
-
Jones, S., Millermaier, S., Goya-Martinez, M., Schuler, J.: Whose space is MySpace? A content analysis of MySpace profiles. First Monday 12(9) (August 2008)
-
(2008)
First Monday
, vol.12
, Issue.9
-
-
Jones, S.1
Millermaier, S.2
Goya-Martinez, M.3
Schuler, J.4
-
28
-
-
35348837824
-
Parallel Crawling for Online Social Networks
-
Chau, D.H., Pandit, S., Wang, S., Faloutsos, C.: Parallel Crawling for Online Social Networks. In: 16th International Conference on World Wide Web, WWW(2007)
-
16th International Conference on World Wide Web, WWW(2007)
-
-
Chau, D.H.1
Pandit, S.2
Wang, S.3
Faloutsos, C.4
-
29
-
-
42149117427
-
Measurement and Analysis of Online Social Networks
-
Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and Analysis of Online Social Networks. In: ACM SIGCOMM Conference on Internet Measurement, IMC (2007)
-
ACM SIGCOMM Conference on Internet Measurement, IMC (2007)
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
30
-
-
70349153347
-
User Interactions in Social Networks and their Implications
-
ACM, New York
-
Wilson, C., Boe, B., Sala, A., Puttaswamy, K.P.N., Zhao, B.Y.: User Interactions in Social Networks and their Implications. In: 4th ACM European Conference on Computer Systems (EuroSys). ACM, New York (2009)
-
(2009)
4th ACM European Conference on Computer Systems (EuroSys)
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K.P.N.4
Zhao, B.Y.5
-
31
-
-
26444473661
-
Messin' with Texas deriving mother's maiden names using public records
-
Applied Cryptography and Network Security: Third International Conference, ACNS 2005. Proceedings
-
Griffith, V., Jakobsson, M.: Messin' with texas, deriving mother's maiden names using public records. In: Ioannidis, J., Keromytis, A.D., Yung, M. (eds.) ACNS 2005. LNCS, vol. 3531, pp. 91-103. Springer, Heidelberg (2005) (Pubitemid 41422110)
-
(2005)
Lecture Notes in Computer Science
, vol.3531
, pp. 91-103
-
-
Griffith, V.1
Jakobsson, M.2
-
36
-
-
77955214796
-
A Practical Attack to De-Anonymize Social Network Users
-
Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-Anonymize Social Network Users. In: IEEE Symposium on Security and Privacy (2010)
-
IEEE Symposium on Security and Privacy (2010)
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
|