-
1
-
-
76549135267
-
-
Sophos Facebook ID Probe (2008), http://www.sophos.com/pressoffice/news/ articles/2007/08/facebook.html
-
(2008)
Sophos Facebook ID Probe
-
-
-
2
-
-
77952944272
-
-
Facebook Statistics (2010), http://www.facebook.com/press/info.php? statistics
-
(2010)
Facebook Statistics
-
-
-
3
-
-
79960021555
-
-
Sophos Security Threat 2010 (2010), http://www.sophos.com/sophos/docs/ eng/papers/sophos-security-threat-report-jan-2010-wpna.pdf
-
(2010)
Sophos Security Threat 2010
-
-
-
4
-
-
78249282277
-
Abusing Social Networks for Automated User Profiling
-
Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. Springer, Heidelberg
-
Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., Kruegel, C.: Abusing Social Networks for Automated User Profiling. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 422-441. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6307
, pp. 422-441
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
5
-
-
84865622599
-
All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks
-
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: 18th International Conference on World Wide Web, WWW (2009)
-
18th International Conference on World Wide Web, WWW (2009)
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
84947273682
-
The sybil attack
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251
-
-
Douceur, J.R.1
-
7
-
-
79956048530
-
Expansion and lack thereof in randomly perturbed graphs
-
Flaxman, A.: Expansion and lack thereof in randomly perturbed graphs. Internet Mathematics 4(2), 131-147 (2007)
-
(2007)
Internet Mathematics
, vol.4
, Issue.2
, pp. 131-147
-
-
Flaxman, A.1
-
8
-
-
67249153096
-
Evolutionary study of phishing
-
IEEE, Los Alamitos
-
Irani, D., Webb, S., Giffin, J., Pu, C.: Evolutionary study of phishing. In: eCrime Researchers Summit, pp. 1-10. IEEE, Los Alamitos (2008)
-
(2008)
eCrime Researchers Summit
, pp. 1-10
-
-
Irani, D.1
Webb, S.2
Giffin, J.3
Pu, C.4
-
9
-
-
84904822464
-
Study of Trend-Stuffing on Twitter through Text Classification
-
Irani, D., Webb, S., Pu, C., Li, K.: Study of Trend-Stuffing on Twitter through Text Classification. In: Collaboration, Electronic messaging, Anti-Abuse and Spam Conference, CEAS (2010)
-
Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, CEAS (2010)
-
-
Irani, D.1
Webb, S.2
Pu, C.3
Li, K.4
-
10
-
-
34848911641
-
Social phishing
-
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94-100 (2007)
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
11
-
-
41949126461
-
Why and How to Perform Fraud Experiments
-
Jakobsson, M., Finn, P., Johnson, N.: Why and How to Perform Fraud Experiments. IEEE Security & Privacy 6(2), 66-68 (2008)
-
(2008)
IEEE Security & Privacy
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Finn, P.2
Johnson, N.3
-
13
-
-
85084095622
-
Honeybot, your man in the middle for automated social engineering
-
Lauinger, T., Pankakoski, V., Balzarotti, D., Kirda, E.: Honeybot, your man in the middle for automated social engineering. In: LEET 2010, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Jose (2010)
-
LEET 2010, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, San Jose (2010)
-
-
Lauinger, T.1
Pankakoski, V.2
Balzarotti, D.3
Kirda, E.4
-
14
-
-
2342548557
-
-
Wiley, Chichester
-
Mitnick, K., Simon, W.L., Wozniak, S.: The Art of Deception: Controlling the Human Element of Security. Wiley, Chichester (2002)
-
(2002)
The Art of Deception: Controlling the Human Element of Security
-
-
Mitnick, K.1
Simon, W.L.2
Wozniak, S.3
-
15
-
-
84948481845
-
An algorithm for suffix stripping
-
Porter, M.: An algorithm for suffix stripping. Program 14(3), 130-137 (1980)
-
(1980)
Program
, vol.14
, Issue.3
, pp. 130-137
-
-
Porter, M.1
-
16
-
-
78751502334
-
Detecting Spammers on Social Networks
-
Stringhini, G., Kruegel, C., Vigna, G.: Detecting Spammers on Social Networks. In: Annual Computer Security Applications Conference, ACSAC (2010)
-
Annual Computer Security Applications Conference, ACSAC (2010)
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
17
-
-
84904794911
-
Social Honeypots: Making Friends with a Spammer Near You
-
Webb, S., Caverlee, J., Pu, C.: Social Honeypots: Making Friends with a Spammer Near You. In: Conference on Email and Anti-Spam, CEAS (2008)
-
Conference on Email and Anti-Spam, CEAS (2008)
-
-
Webb, S.1
Caverlee, J.2
Pu, C.3
-
18
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
ACM, New York
-
Yu, H., Kaminsky, M., Gibbons, P., F.: Sybilguard: defending against sybil attacks via social networks. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 267-278. ACM, New York (2006)
-
(2006)
Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.F.3
-
19
-
-
45749116664
-
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
-
Yu, H., Kaminsky, M., Gibbons, P. B., Flaxman, A.: SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In: IEEE Symposium on Security and Privacy (2008)
-
IEEE Symposium on Security and Privacy (2008)
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|