-
1
-
-
77952944272
-
-
"Facebook statistics," http://www.facebook.com/press/info.php? statistics.
-
Facebook Statistics
-
-
-
10
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
New York, NY, USA: ACM
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," in WWW '09: Proceedings of the 18th international conference on World wide web. New York, NY, USA: ACM, 2009, pp. 551-560.
-
(2009)
WWW '09: Proceedings of the 18th International Conference on World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer, "Social phishing," Commun. ACM, vol. 50, no. 10, pp. 94-100, 2007. (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
13
-
-
85076289299
-
Xbook: Redesigning privacy control in social networking platforms
-
August [Online]. Available
-
K. Singh, S. Bhola, and W. Lee, "xbook: Redesigning privacy control in social networking platforms," in Proceedings of the 18th Usenix Security Symposium, August 2009. [Online]. Available: http://www.cc.gatech.edu/grads/k/ ksingh/publication/sec09-xbook.pdf
-
(2009)
Proceedings of the 18th Usenix Security Symposium
-
-
Singh, K.1
Bhola, S.2
Lee, W.3
-
15
-
-
57049132798
-
Beyond user-to-user access control for online social networks
-
Berlin, Heidelberg: Springer-Verlag [Online]. Available: http://dx.doi.org/10.1007/978-3-540-88625-9-12
-
M. Shehab, A. C. Squicciarini, and G. J. Ahn, "Beyond user-to-user access control for online social networks," in ICICS '08: Proceedings of the 10th International Conference on Information and Communications Security. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 174-189. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-88625-9-12
-
(2008)
ICICS '08: Proceedings of the 10th International Conference on Information and Communications Security
, pp. 174-189
-
-
Shehab, M.1
Squicciarini, A.C.2
Ahn, G.J.3
-
16
-
-
70349253956
-
Flybynight: Mitigating the privacy risks of social networking
-
New York, NY, USA: ACM
-
M. M. Lucas and N. Borisov, "Flybynight: mitigating the privacy risks of social networking," in WPES '08: Proceedings of the 7th ACM workshop on Privacy in the electronic society. New York, NY, USA: ACM, 2008, pp. 1-8.
-
(2008)
WPES '08: Proceedings of the 7th ACM Workshop on Privacy in the Electronic Society
, pp. 1-8
-
-
Lucas, M.M.1
Borisov, N.2
-
17
-
-
70849131766
-
Facecloak: An architecture for user privacy on social networking sites
-
August
-
W. Luo, Q. Xie, and U. Hengartner, "Facecloak: An architecture for user privacy on social networking sites," in Proceedings of 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09), August 2009.
-
(2009)
Proceedings of 2009 IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)
-
-
Luo, W.1
Xie, Q.2
Hengartner, U.3
|