-
1
-
-
77952944272
-
-
Facebook, (Online; accessed 5-January-2010)
-
Facebook. Facebook statistics (2010), http://www.facebook.com/press/info.php? statistics (Online; accessed 5-January-2010)
-
(2010)
Facebook statistics
-
-
-
4
-
-
70450193106
-
Eight friends are enough: Social graph approximation via public listings
-
ACM, New York
-
Bonneau, J., Anderson, J., Anderson, R., Stajano, F.: Eight friends are enough: social graph approximation via public listings. In: Proceedings of the Second ACM Euro Sys Workshop on Social Network Systems, pp. 13-18. ACM, New York (2009)
-
(2009)
Proceedings of the Second ACM Euro Sys Workshop on Social Network Systems
, pp. 13-18
-
-
Bonneau, J.1
Anderson, J.2
Anderson, R.3
Stajano, F.4
-
5
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
In, April
-
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International World Wide Web Conference (April 2009)
-
(2009)
18th International World Wide Web Conference
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
34848911641
-
Social phishing
-
Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94-100 (2007)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
7
-
-
76649137380
-
Social networks and context-aware spam
-
ACM, New York
-
Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social networks and context-aware spam. In: Proceedings of the ACM 2008 conference on Computer supported cooperative work, pp. 403-412. ACM, New York (2008)
-
(2008)
Proceedings of the ACM 2008 conference on Computer supported cooperative work
, pp. 403-412
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
8
-
-
70849122971
-
Towards automating social engineering using social networking sites
-
Huber, M., Kowalski, S., Nohlberg, M., Tjoa, S.: Towards automating social engineering using social networking sites. In: IEEE International Conference on Computational Science and Engineering, vol. 3, pp. 117-124 (2009)
-
(2009)
IEEE International Conference on Computational Science and Engineering
, vol.3
, pp. 117-124
-
-
Huber, M.1
Kowalski, S.2
Nohlberg, M.3
Tjoa, S.4
-
9
-
-
84885065367
-
-
STAR Lab Technical Report, Department of Electrical and Computer Engineering, Tennessee Tech University
-
He, X.: A Performance Analysis of Secure HTTP Protocol. STAR Lab Technical Report, Department of Electrical and Computer Engineering, Tennessee Tech University (2003)
-
(2003)
A Performance Analysis of Secure HTTP Protocol
-
-
He, X.1
-
11
-
-
84870159064
-
Trust and privacy concern within social networking sites: A comparison of Facebook and My Space
-
in, Keystone, Colorado, USA
-
Dwyer, C., Hiltz, S.R., Passerini, K.: Trust and privacy concern within social networking sites: A comparison of Facebook and My Space. In: Americas Conference on Information Systems (AMCIS), Keystone, Colorado, USA (2007)
-
(2007)
Americas Conference on Information Systems (AMCIS)
-
-
Dwyer, C.1
Hiltz, S.R.2
Passerini, K.3
-
14
-
-
78650030311
-
-
Alexa, (Online accessed January 20, 2010) dpkt-python packet creation/parsing library
-
Alexa. Site info: Facebook (2010), http://www.alexa.com/siteinfo/facebook.com# trafficstats (Online accessed January 20, 2010) dpkt-python packet creation/parsing library, http://code.google.com/p/dpkt/
-
(2010)
Site info: Facebook
-
-
|