-
2
-
-
84875221487
-
-
March
-
Twitter, Twitter Numbers, March 2011. < http://blog.twitter.com/2011/ 03/numbers.html >.
-
(2011)
Twitter, Twitter Numbers
-
-
-
3
-
-
71149088987
-
Users of the world, unite! the challenges and opportunities of social media
-
A.M. Kaplan, and M. Haenlein Users of the world, unite! The challenges and opportunities of social media Business Horizons 53 1 2010 59 68
-
(2010)
Business Horizons
, vol.53
, Issue.1
, pp. 59-68
-
-
Kaplan, A.M.1
Haenlein, M.2
-
6
-
-
84855680533
-
Civil movements: The impact of Facebook and Twitter
-
F. Salem, and R. Mourtada Civil movements: the impact of Facebook and Twitter The Arab Social Media Report 1 2 2011
-
(2011)
The Arab Social Media Report
, vol.1
, Issue.2
-
-
Salem, F.1
Mourtada, R.2
-
9
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
ACM New York, NY, USA
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu The socialbot network: when bots socialize for fame and money Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11 2011 ACM New York, NY, USA 93 102
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC '11
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
10
-
-
85084095251
-
Key challenges in defending against malicious socialbots
-
USENIX Association Berkeley, CA, USA
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu Key challenges in defending against malicious socialbots Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET'12 2012 USENIX Association Berkeley, CA, USA
-
(2012)
Proceedings of the 5th USENIX Conference on Large-scale Exploits and Emergent Threats, LEET'12
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
13
-
-
84863569052
-
Socialbots: Voices from the fronts
-
http://doi.acm.org/10.1145/2090150.2090161 >
-
T. Hwang, I. Pearce, and M. Nanis Socialbots: voices from the fronts Interactions 19 2 2012 38 45 http://dx.doi.org/10.1145/2090150.2090161. < http://doi.acm.org/10.1145/2090150.2090161 >
-
(2012)
Interactions
, vol.19
, Issue.2
, pp. 38-45
-
-
Hwang, T.1
Pearce, I.2
Nanis, M.3
-
14
-
-
84858064917
-
Sybil defenses via social networks: A tutorial and survey
-
H. Yu Sybil defenses via social networks: a tutorial and survey SIGACT News 42 2011 80 101
-
(2011)
SIGACT News
, vol.42
, pp. 80-101
-
-
Yu, H.1
-
15
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, T. Pregueiro, Aiding the detection of fake accounts in large scale social online services, in: Proc. NSDI, 2012.
-
(2012)
Proc. NSDI
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
18
-
-
34250729630
-
Hacking human: Data-archaeology and surveillance in social networks
-
J. Nolan, and M. Levesque Hacking human: data-archaeology and surveillance in social networks SIGGROUP Bulletin 25 2 2005 33 37
-
(2005)
SIGGROUP Bulletin
, vol.25
, Issue.2
, pp. 33-37
-
-
Nolan, J.1
Levesque, M.2
-
21
-
-
79955135282
-
Truthy: Mapping the spread of astroturf in microblog streams
-
ACM New York, NY, USA
-
J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer Truthy: mapping the spread of astroturf in microblog streams Proceedings of the 20th International Conference Companion on World Wide Web, WWW '11 2011 ACM New York, NY, USA 249 252
-
(2011)
Proceedings of the 20th International Conference Companion on World Wide Web, WWW '11
, pp. 249-252
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Patil, S.5
Flammini, A.6
Menczer, F.7
-
22
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
ACM New York, NY, USA
-
G. Yan, G. Chen, S. Eidenbenz, and N. Li Malware propagation in online social networks: nature, dynamics, and defense implications Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11 2011 ACM New York, NY, USA 196 206
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11
, pp. 196-206
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
-
23
-
-
84855680528
-
The real face of Koobface: The largest web 2.0 botnet explained
-
JULY
-
J. Baltazar, J. Costoya, and R. Flores The real face of Koobface: the largest web 2.0 botnet explained Trend Micro Research July 2009
-
(2009)
Trend Micro Research
-
-
Baltazar, J.1
Costoya, J.2
Flores, R.3
-
24
-
-
34848911641
-
Social phishing
-
DOI 10.1145/1290958.1290968, 1290968
-
T.N. Jagatic, N.A. Johnson, M. Jakobsson, and F. Menczer Social phishing Communications of the ACM 50 10 2007 94 100 (Pubitemid 47505005)
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
26
-
-
84875224136
-
-
Jet Bots, 2011. < http://allbots.info >.
-
(2011)
Jet Bots
-
-
-
27
-
-
82955238527
-
Botnet judo: Fighting spam with itself
-
A. Pitsillidis, K. Levchenko, C. Kreibich, C. Kanich, G.M. Voelker, V. Paxson, N. Weaver, S. Savage, Botnet judo: fighting spam with itself, in: NDSS, 2010.
-
(2010)
NDSS
-
-
Pitsillidis, A.1
Levchenko, K.2
Kreibich, C.3
Kanich, C.4
Voelker, G.M.5
Paxson, V.6
Weaver, N.7
Savage, S.8
-
28
-
-
78650005374
-
The underground on 140 characters or less
-
ACM New York, NY, USA < >
-
C. Grier, K. Thomas, V. Paxson, and M. Zhang @spam: The underground on 140 characters or less Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10 2010 ACM New York, NY, USA 27 37 < http://doi.acm.org/10.1145/1866307.1866311 >
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 27-37
-
-
Grier, C.1
Thomas, K.2
Paxson, V.3
Zhang, M.4
-
29
-
-
78751502334
-
Detecting spammers on social networks
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1920261.1920263 >
-
G. Stringhini, C. Kruegel, and G. Vigna Detecting spammers on social networks Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10 2010 ACM New York, NY, USA 1 9 http://dx.doi.org/10.1145/ 1920261.1920263. < http://doi.acm.org/10.1145/1920261.1920263 >
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC '10
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
30
-
-
82955161549
-
Uncovering social network sybils in the wild
-
doi:10.1145/2068816.2068841 ACM, New York, NY, USA
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B.Y. Zhao, Y. Dai, Uncovering social network sybils in the wild, in: Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11), ACM, New York, NY, USA, 2011, pp. 259-268. < http://dx.doi.org/10.1145/2068816.2068841 >, < http://doi.acm.org/10.1145/2068816.2068841 >.
-
(2011)
Proceedings of the ACM SIGCOMM Conference on Internet Measurement Conference (IMC '11)
, pp. 259-268
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
31
-
-
79959891780
-
Facebook immune system
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1989656.1989664 >
-
T. Stein, E. Chen, and K. Mangla Facebook immune system Proceedings of the 4th Workshop on Social Network Systems, SNS '11 2011 ACM New York, NY, USA 8:1 8:8 http://dx.doi.org/10.1145/1989656.1989664. < http://doi.acm.org/10. 1145/1989656.1989664 >
-
(2011)
Proceedings of the 4th Workshop on Social Network Systems, SNS '11
, pp. 81-88
-
-
Stein, T.1
Chen, E.2
Mangla, K.3
-
33
-
-
52649118019
-
Mining (social) network graphs to detect random link attacks
-
doi:10.1109/ICDE.2008.4497457 ICDE 2008
-
N. Shrivastava, A. Majumder, R. Rastogi, Mining (social) network graphs to detect random link attacks, in: IEEE 24th International Conference on Data Engineering, 2008. ICDE 2008, 2008, pp. 486-495, http://dx.doi.org/10.1109/ICDE. 2008.4497457.
-
(2008)
IEEE 24th International Conference on Data Engineering, 2008
, pp. 486-495
-
-
Shrivastava, N.1
Majumder, A.2
Rastogi, R.3
-
34
-
-
78149337076
-
An analysis of social network-based Sybil defenses
-
ACM New York, NY, USA
-
B. Viswanath, A. Post, K.P. Gummadi, and A. Mislove An analysis of social network-based Sybil defenses Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, SIGCOMM '10 2010 ACM New York, NY, USA 363 374
-
(2010)
Proceedings of the ACM SIGCOMM 2010 Conference on SIGCOMM, SIGCOMM '10
, pp. 363-374
-
-
Viswanath, B.1
Post, A.2
Gummadi, K.P.3
Mislove, A.4
-
35
-
-
74049087026
-
Co mmunity detection in graphs
-
doi:10.1016/j.physrep.2009.11.002
-
S. Fortunato Co mmunity detection in graphs Physics Reports 486 3-5 2010 75 174 http://dx.doi.org/10.1016/j.physrep.2009.11.002. < http://www.sciencedirect.com/science/article/pii/S0370157309002841 >
-
(2010)
Physics Reports
, vol.486
, Issue.35
, pp. 75-174
-
-
Fortunato, S.1
-
36
-
-
51649205391
-
Spread of information through a population with socio-structural bias: I. Assumption of transitivity
-
doi:10.1007/BF02476440
-
A. Rapoport Spread of information through a population with socio-structural bias: I. Assumption of transitivity Bulletin of Mathematical Biology 15 1953 523 533 http://dx.doi.org/10.1007/BF02476440. < http://dx.doi.org/10.1007/BF02476440 >
-
(1953)
Bulletin of Mathematical Biology
, vol.15
, pp. 523-533
-
-
Rapoport, A.1
-
40
-
-
70349826468
-
Can friends be trusted? Exploring privacy in online social networks
-
IEEE Computer Society Washington, DC, USA. doi:10.1109/ASONAM.2009.61
-
F. Nagle, and L. Singh Can friends be trusted? Exploring privacy in online social networks Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining 2009 IEEE Computer Society Washington, DC, USA 312 315 http://dx.doi.org/10.1109/ASONAM.2009.61. < http://portal.acm.org/citation.cfm?id=1602240.1602706 >
-
(2009)
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining
, pp. 312-315
-
-
Nagle, F.1
Singh, L.2
-
41
-
-
78650033912
-
Ifriendu: Leveraging 3-cliques to enhance infiltration attacks in online social networks
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1866307.1866410 >
-
R. Potharaju, B. Carbunar, and C. Nita-Rotaru ifriendu: Leveraging 3-cliques to enhance infiltration attacks in online social networks Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10 2010 ACM New York, NY, USA 723 725 http://dx.doi.org/10.1145/1866307.1866410. < http://doi.acm.org/10.1145/1866307.1866410 >
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 723-725
-
-
Potharaju, R.1
Carbunar, B.2
Nita-Rotaru, C.3
-
42
-
-
79959930140
-
Reverse social engineering attacks in online social networks
-
D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu Reverse social engineering attacks in online social networks Detection of Intrusions and Malware, and Vulnerability Assessment 2011 55 74
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 55-74
-
-
Irani, D.1
Balduzzi, M.2
Balzarotti, D.3
Kirda, E.4
Pu, C.5
-
43
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM New York, NY, USA
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda All your contacts are belong to us: automated identity theft attacks on social networks WWW '09: Proceedings of the 18th International Conference on World Wide Web 2009 ACM New York, NY, USA 551 560 http://dx.doi.org/10.1145/1526709.1526784
-
(2009)
WWW '09: Proceedings of the 18th International Conference on World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
45
-
-
76649137380
-
Social networks and context-aware spam
-
ACM New York, NY, USA
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders Social networks and context-aware spam CSCW '08: Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work 2008 ACM New York, NY, USA 403 412 http://dx.doi.org/10.1145/1460563.1460628
-
(2008)
CSCW '08: Proceedings of the ACM 2008 Conference on Computer Supported Cooperative Work
, pp. 403-412
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
48
-
-
84875222780
-
-
The 2011 Socialbots Competition, January
-
The Web Ecology Project, The 2011 Socialbots Competition, January 2011. < http://www.webecologyproject.org/category/competition/ >.
-
(2011)
The Web Ecology Project
-
-
-
49
-
-
82955190606
-
Analyzing Facebook privacy settings: User expectations vs. reality
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/2068816.2068823 >
-
Y. Liu, K.P. Gummadi, B. Krishnamurthy, and A. Mislove Analyzing Facebook privacy settings: user expectations vs. reality Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11 2011 ACM New York, NY, USA 61 70 http://dx.doi.org/10.1145/2068816.2068823. < http://doi.acm.org/10.1145/2068816.2068823 >
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC '11
, pp. 61-70
-
-
Liu, Y.1
Gummadi, K.P.2
Krishnamurthy, B.3
Mislove, A.4
-
50
-
-
35248831179
-
Captcha: Using hard AI problems for security
-
L. von Ahn, M. Blum, N.J. Hopper, J. Langford, Captcha: using hard AI problems for security, in: EUROCRYPT, 2003, pp. 294-311.
-
(2003)
EUROCRYPT
, pp. 294-311
-
-
Von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
51
-
-
77954730576
-
Captcha smuggling: Hijacking web browsing sessions to create captcha farms
-
ACM New York, NY, USA
-
M. Egele, L. Bilge, E. Kirda, and C. Kruegel Captcha smuggling: hijacking web browsing sessions to create captcha farms SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing 2010 ACM New York, NY, USA 1865 1870 http://dx.doi.org/10.1145/1774088.1774483
-
(2010)
SAC '10: Proceedings of the 2010 ACM Symposium on Applied Computing
, pp. 1865-1870
-
-
Egele, M.1
Bilge, L.2
Kirda, E.3
Kruegel, C.4
-
52
-
-
76549097748
-
Remotely telling humans and computers apart: An unsolved problem
-
J. Camenisch, D. Kesdogan, IFIP Advances in Information and Communication Technology Springer Boston < >
-
C. Hernandez-Castro, and A. Ribagorda Remotely telling humans and computers apart: An unsolved problem J. Camenisch, D. Kesdogan, iNetSection 2009? Open Research Problems in Network Security IFIP Advances in Information and Communication Technology vol. 309 2009 Springer Boston 9 26 < http://dx.doi.org/10.1007/978-3-642-05437-2-2 >
-
(2009)
INetSection 2009? Open Research Problems in Network Security
, vol.309
, pp. 9-26
-
-
Hernandez-Castro, C.1
Ribagorda, A.2
-
54
-
-
85076285223
-
Re: CAPTCHAs: Understanding captcha-solving services in an economic context
-
USENIX Association Berkeley, CA, USA < >
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G.M. Voelker, and S. Savage Re: CAPTCHAs: understanding captcha-solving services in an economic context Proceedings of the 19th USENIX Conference on Security, USENIX Security'10 2010 USENIX Association Berkeley, CA, USA 28 < http://portal.acm.org/citation.cfm?id=1929820.1929858 >
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security'10
, pp. 28
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
57
-
-
84856151953
-
Dir ty jobs: The role of freelance labor in web service abuse
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, G.M. Voelker, Dir ty jobs: the role of freelance labor in web service abuse, in: Proceedings of the 20th USENIX Security Symposium, 2011. < http://www.usenix.org/events/Section 11/tech/full-papers/Motoyama.pdf >.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
59
-
-
42149117427
-
Measurement and analysis of online social networks
-
ACM New York, NY, USA
-
A. Mislove, M. Marcon, K.P. Gummadi, P. Druschel, and B. Bhattacharjee Measurement and analysis of online social networks IMC '07: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement 2007 ACM New York, NY, USA 29 42 http://dx.doi.org/10.1145/1298306.1298311
-
(2007)
IMC '07: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
60
-
-
84875226695
-
-
November
-
Facebook, Facebook Graph API, November 2011. < https://developers. facebook.com/docs/reference/api/ >.
-
(2011)
Facebook, Facebook Graph API
-
-
-
62
-
-
84911514327
-
Eliza-a computer program for the study of natural language communication between man and machine
-
http://doi.acm.org/10.1145/365153.365168 >
-
J. Weizenbaum Eliza-a computer program for the study of natural language communication between man and machine Communications of the ACM 9 1966 36 45 http://dx.doi.org/10.1145/365153.365168. < http://doi.acm.org/10.1145/365153. 365168 >
-
(1966)
Communications of the ACM
, vol.9
, pp. 36-45
-
-
Weizenbaum, J.1
-
63
-
-
85084095622
-
Honeybot, your man in the middle for automated social engineering
-
USENIX Association
-
T. Lauinger, V. Pankakoski, D. Balzarotti, and E. Kirda Honeybot, your man in the middle for automated social engineering Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More 2010 USENIX Association 11
-
(2010)
Proceedings of the 3rd USENIX Conference on Large-scale Exploits and Emergent Threats: Botnets, Spyware, Worms, and More
, pp. 11
-
-
Lauinger, T.1
Pankakoski, V.2
Balzarotti, D.3
Kirda, E.4
-
64
-
-
43149110606
-
Too much of a good thing? the relationship between number of friends and interpersonal impressions on Facebook
-
http://dx.doi.org/10.1111/j.1083-6101.2008.00409.x >
-
S.T. Tong, B. Van Der Heide, L. Langwell, and J.B. Walther Too much of a good thing? The relationship between number of friends and interpersonal impressions on Facebook Journal of Computer-Mediated Communication 13 3 2008 531 549 http://dx.doi.org/10.1111/j.1083-6101.2008.00409.x. < http://dx.doi.org/10.1111/j.1083-6101.2008.00409.x >
-
(2008)
Journal of Computer-Mediated Communication
, vol.13
, Issue.3
, pp. 531-549
-
-
Tong, S.T.1
Van Der Heide, B.2
Langwell, L.3
Walther, J.B.4
-
65
-
-
57349111694
-
Planetary-scale views on a large instant-messaging network
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1367497.1367620 >
-
J. Leskovec, and E. Horvitz Planetary-scale views on a large instant-messaging network Proceeding of the 17th International Conference on World Wide Web 2008 ACM New York, NY, USA 915 924 http://dx.doi.org/10.1145/ 1367497.1367620. < http://doi.acm.org/10.1145/1367497.1367620 >
-
(2008)
Proceeding of the 17th International Conference on World Wide Web
, pp. 915-924
-
-
Leskovec, J.1
Horvitz, E.2
-
67
-
-
84875231020
-
Stegobot: A covert social network botnet
-
S. Nagaraja, A. Houmansadr, P. Agarwal, V. Kumar, P. Piyawongwisal, N. Borisov, Stegobot: A covert social network botnet, in: Proceedings of the Information Hiding Conference, 2011.
-
(2011)
Proceedings of the Information Hiding Conference
-
-
Nagaraja, S.1
Houmansadr, A.2
Agarwal, P.3
Kumar, V.4
Piyawongwisal, P.5
Borisov, N.6
-
68
-
-
34547160289
-
A face(book) in the crowd: Social Searching vs. social browsing
-
DOI 10.1145/1180875.1180901, Proceedings of the 20th Anniversary ACM Conference on Computer Supported Cooperative Work, CSCW 2006
-
C. Lampe, N. Ellison, and C. Steinfield A face(book) in the crowd: social searching vs. social browsing Proceedings of the 2006 20th Anniversary Conference on Computer Supported Cooperative Work, CSCW '06 2006 ACM New York, NY, USA 167 170 http://dx.doi.org/10.1145/1180875.1180901. < http://doi.acm.org/10.1145/1180875.1180901 > (Pubitemid 47112404)
-
(2006)
Proceedings of the ACM Conference on Computer Supported Cooperative Work, CSCW
, pp. 167-170
-
-
Lampe, C.1
Ellison, N.2
Steinfield, C.3
-
69
-
-
34548285057
-
The benefits of Facebook "friends:" Social capital and college students' use of online social network sites
-
http://dx.doi.org/10.1111/j.1083-6101.2007.00367.x >
-
N.B. Ellison, C. Steinfield, and C. Lampe The benefits of Facebook "friends:" social capital and college students' use of online social network sites Journal of Computer-Mediated Communication 12 4 2007 1143 1168 http://dx.doi.org/10.1111/j.1083-6101.2007.00367.x. < http://dx.doi.org/10. 1111/j.1083-6101.2007.00367.x >
-
(2007)
Journal of Computer-Mediated Communication
, vol.12
, Issue.4
, pp. 1143-1168
-
-
Ellison, N.B.1
Steinfield, C.2
Lampe, C.3
-
70
-
-
70349176747
-
Changes in use and perception of Facebook
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1460563.1460675 >
-
C. Lampe, N.B. Ellison, and C. Steinfield Changes in use and perception of Facebook Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW '08 2008 ACM New York, NY, USA 721 730 http://dx.doi.org/10.1145/1460563.1460675. < http://doi.acm.org/10.1145/ 1460563.1460675 >
-
(2008)
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW '08
, pp. 721-730
-
-
Lampe, C.1
Ellison, N.B.2
Steinfield, C.3
-
71
-
-
70349190306
-
Research ethics in the Facebook era: Privacy, anonymity, and oversight
-
ACM New York, NY, USA
-
N. Bos, K. Karahalios, M. Musgrove-Chávez, E.S. Poole, J.C. Thomas, and S. Yardi Research ethics in the Facebook era: privacy, anonymity, and oversight CHI EA '09: Proceedings of the 27th International Conference Extended Abstracts on Human Factors in Computing Systems 2009 ACM New York, NY, USA 2767 2770 http://dx.doi.org/10.1145/1520340.1520402
-
(2009)
CHI EA '09: Proceedings of the 27th International Conference Extended Abstracts on Human Factors in Computing Systems
, pp. 2767-2770
-
-
Bos, N.1
Karahalios, K.2
Musgrove-Chávez, M.3
Poole, E.S.4
Thomas, J.C.5
Yardi, S.6
-
75
-
-
0003919677
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
C.P. Robert, and G. Casella Monte Carlo Statistical Methods (Springer Texts in Statistics) 2005 Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
(2005)
Monte Carlo Statistical Methods (Springer Texts in Statistics)
-
-
Robert, C.P.1
Casella, G.2
-
76
-
-
77953303843
-
Walking in Facebook: A case study of unbiased sampling of osns
-
San Diego, CA
-
M. Gjoka, M. Kurant, C.T. Butts, A. Markopoulou, Walking in Facebook: a case study of unbiased sampling of osns, in: Proceedings of IEEE INFOCOM '10, San Diego, CA, 2010.
-
(2010)
Proceedings of IEEE INFOCOM '10
-
-
Gjoka, M.1
Kurant, M.2
Butts, C.T.3
Markopoulou, A.4
-
77
-
-
32344435632
-
Adversarial learning
-
DOI 10.1145/1081870.1081950, KDD-2005 - Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
D. Lowd, and C. Meek Adversarial learning Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD '05 2005 ACM New York, NY, USA 641 647 http://dx.doi.org/10.1145/1081870.1081950. < http://doi.acm.org/10.1145/1081870.1081950 > (Pubitemid 43218333)
-
(2005)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
78
-
-
85093847546
-
Peer-to-peer botnets: Overview and case study
-
USENIX Association Berkeley, CA, USA < >
-
J.B. Grizzard, V. Sharma, C. Nunnery, B.B. Kang, and D. Dagon Peer-to-peer botnets: overview and case study Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets 2007 USENIX Association Berkeley, CA, USA 1 < http://dl.acm.org/citation.cfm?id=1323128. 1323129 >
-
(2007)
Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets
, pp. 1
-
-
Grizzard, J.B.1
Sharma, V.2
Nunnery, C.3
Kang, B.B.4
Dagon, D.5
-
83
-
-
0014413249
-
The tragedy of the commons
-
G. Hardin The tragedy of the commons Science 162 1968 1243 1248 < http://www.sciencemag.org/cgi/reprint/162/3859/1243.pdf >
-
(1968)
Science
, vol.162
, pp. 1243-1248
-
-
Hardin, G.1
-
84
-
-
85005305538
-
The market for "lemons": Quality uncertainty and the market mechanism
-
G.A. Akerlof The market for "lemons": quality uncertainty and the market mechanism The Quarterly Journal of Economics 84 3 1970 488 500
-
(1970)
The Quarterly Journal of Economics
, vol.84
, Issue.3
, pp. 488-500
-
-
Akerlof, G.A.1
-
85
-
-
85076490024
-
Show me the money: Characterizing spam-advertised revenue
-
USENIX Association Berkeley, CA, USA < >
-
C. Kanich, N. Weavery, D. McCoy, T. Halvorson, C. Kreibichy, K. Levchenko, V. Paxson, G.M. Voelker, and S. Savage Show me the money: characterizing spam-advertised revenue Proceedings of the 20th USENIX Conference on Security, SEC'11 2011 USENIX Association Berkeley, CA, USA 15 < http://dl.acm.org/citation.cfm?id=2028067.2028082 >
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 15
-
-
Kanich, C.1
Weavery, N.2
McCoy, D.3
Halvorson, T.4
Kreibichy, C.5
Levchenko, K.6
Paxson, V.7
Voelker, G.M.8
Savage, S.9
-
86
-
-
77954569610
-
The anatomy of a large-scale social search engine
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1772690.1772735 >
-
D. Horowitz, and S.D. Kamvar The anatomy of a large-scale social search engine Proceedings of the 19th International Conference on World Wide Web, WWW '10 2010 ACM New York, NY, USA 431 440 http://dx.doi.org/10.1145/1772690. 1772735. < http://doi.acm.org/10.1145/1772690.1772735 >
-
(2010)
Proceedings of the 19th International Conference on World Wide Web, WWW '10
, pp. 431-440
-
-
Horowitz, D.1
Kamvar, S.D.2
-
87
-
-
37549016365
-
A model of a trust-based recommendation system on a social network
-
http://dx.doi.org/10.1007/s10458-007-9021-x >
-
F. Walter, S. Battiston, and F. Schweitzer A model of a trust-based recommendation system on a social network Autonomous Agents and Multi-Agent Systems 16 2008 57 74 http://dx.doi.org/10.1007/s10458-007-9021-x. < http://dx.doi.org/10.1007/s10458-007-9021-x >
-
(2008)
Autonomous Agents and Multi-Agent Systems
, vol.16
, pp. 57-74
-
-
Walter, F.1
Battiston, S.2
Schweitzer, F.3
-
88
-
-
62949102030
-
Friendstore: Cooperative online backup using trusted nodes
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1435497.1435504 >
-
D.N. Tran, F. Chiang, and J. Li Friendstore: cooperative online backup using trusted nodes Proceedings of the 1st Workshop on Social Network Systems, SocialNets '08 2008 ACM New York, NY, USA 37 42 http://dx.doi.org/10.1145/ 1435497.1435504. < http://doi.acm.org/10.1145/1435497.1435504 >
-
(2008)
Proceedings of the 1st Workshop on Social Network Systems, SocialNets '08
, pp. 37-42
-
-
Tran, D.N.1
Chiang, F.2
Li, J.3
-
89
-
-
84875209971
-
-
F. Schreiber, S. Martínez, L. Vigil, Sybil, 1981
-
F. Schreiber, S. Martínez, L. Vigil, Sybil, 1981.
-
-
-
-
91
-
-
79551699813
-
A survey of DHT security techniques
-
G. Urdaneta, G. Pierre, and M. van Steen A survey of DHT security techniques ACM Computing Surveys 43 2 2011 < http://www.globule.org/publi/ SDST-acmcs2009.html >
-
(2011)
ACM Computing Surveys
, vol.43
, Issue.2
-
-
Urdaneta, G.1
Pierre, G.2
Van Steen, M.3
-
92
-
-
3042785862
-
The Sybil attack in sensor networks: Analysis defenses
-
IPSN 2004, 2004
-
J. Newsome, E. Shi, D. Song, A. Perrig, The Sybil attack in sensor networks: analysis defenses, in: Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004, 2004, pp. 259-268. < http://dx.doi.org/10.1109/IPSN.2004.1307346 >.
-
(2004)
Third International Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
93
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
H. Yu, M. Kaminsky, P.B. Gibbons, and A. Flaxman Sybilguard: defending against Sybil attacks via social networks SIGCOMM Computer Communication Review 36 2006 267 278 (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
94
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against Sybil attacks
-
IEEE Computer Society Washington, DC, USA doi:10.1109/SP.2008.13
-
H. Yu, P.B. Gibbons, M. Kaminsky, and F. Xiao Sybillimit: a near-optimal social network defense against Sybil attacks Proceedings of the 2008 IEEE Symposium on Security and Privacy 2008 IEEE Computer Society Washington, DC, USA 3 17 http://dx.doi.org/10.1109/SP.2008.13. < http://portal.acm.org/citation. cfm?id=1397759.1398053 >
-
(2008)
Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
95
-
-
85180633166
-
SybilInfer: Detecting Sybil nodes using social networks
-
G. Danezis, P. Mittal, SybilInfer: detecting Sybil nodes using social networks, in: NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
96
-
-
84887052468
-
Sybil-resilient online content voting
-
USENIX Association Berkeley, CA, USA
-
N. Tran, B. Min, J. Li, and L. Subramanian Sybil-resilient online content voting Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09 2009 USENIX Association Berkeley, CA, USA 15 28
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation, NSDI'09
, pp. 15-28
-
-
Tran, N.1
Min, B.2
Li, J.3
Subramanian, L.4
-
97
-
-
79960849345
-
Optimal Sybil-resilient node admission control
-
N. Tran, J. Li, L. Subramanian, S. Chow, Optimal Sybil-resilient node admission control, in: INFOCOM, 2011 Proceedings IEEE, 2011, pp. 3218-3226.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 3218-3226
-
-
Tran, N.1
Li, J.2
Subramanian, L.3
Chow, S.4
-
98
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D.R. Karger, M.F. Kaashoek, F. Dabek, and H. Balakrishnan Chord: a scalable peer-to-peer lookup protocol for internet applications IEEE/ACM Transactions on Networking (TON) 11 1 2003 17 32 http://dx.doi.org/10.1109/TNET.2002.808407
-
(2003)
IEEE/ACM Transactions on Networking (TON)
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
103
-
-
80053160731
-
Limiting large-scale crawls of social networking sites
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/2018436.2018487 >
-
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K.P. Gummadi, A. Mislove, and A. Post Limiting large-scale crawls of social networking sites Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM, SIGCOMM '11 2011 ACM New York, NY, USA 398 399 http://dx.doi.org/10.1145/2018436.2018487. < http://doi.acm.org/10.1145/2018436.2018487 >
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM, SIGCOMM '11
, pp. 398-399
-
-
Mondal, M.1
Viswanath, B.2
Clement, A.3
Druschel, P.4
Gummadi, K.P.5
Mislove, A.6
Post, A.7
-
106
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
DOI 10.1109/MSP.2008.50, 4480459
-
E. Maler, and D. Reed The venn of identity: Options and issues in federated identity management IEEE Security and Privacy 6 2008 16 23 http://dx.doi.org/10.1109/MSP.2008.50 (Pubitemid 351506252)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
107
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
doi:10.1145/1900546.1900556
-
S.-T. Sun, Y. Boshmaf, K. Hawkey, K. Beznosov, A billion keys, but few locks: the crisis of web single sign-on, in: Proceedings of the New Security Paradigms Workshop (NSPW), 2010, pp. 61-72, http://dx.doi.org/10.1145/1900546. 1900556. < http://doi.acm.org/10.1145/1900546.1900556 >.
-
(2010)
Proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 61-72
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
108
-
-
34948838524
-
ZoneAlarm: Creating usable security products for consumers
-
L.F. Cranor, S. Garfinkel, O'Reilly Media, Inc. (Chapter 27)
-
J. Berson ZoneAlarm: creating usable security products for consumers L.F. Cranor, S. Garfinkel, Security and Usability: Designing Secure Systems that People Can Use 2005 O'Reilly Media, Inc. 563 575 (Chapter 27)
-
(2005)
Security and Usability: Designing Secure Systems That People Can Use
, pp. 563-575
-
-
Berson, J.1
-
109
-
-
84925930275
-
The focused organization of social ties
-
S.L. Feld The focused organization of social ties The American Journal of Sociology 86 5 1981 1015 1035 < http://www.jstor.org/stable/2778746 >
-
(1981)
The American Journal of Sociology
, vol.86
, Issue.5
, pp. 1015-1035
-
-
Feld, S.L.1
-
110
-
-
70349153347
-
User interactions in social networks and their implications
-
ACM New York, NY, USA. < http://doi.acm.org/10.1145/1519065.1519089 >
-
C. Wilson, B. Boe, A. Sala, K.P. Puttaswamy, and B.Y. Zhao User interactions in social networks and their implications Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys '09 2009 ACM New York, NY, USA 205 218 http://dx.doi.org/10.1145/1519065.1519089. < http://doi.acm.org/ 10.1145/1519065.1519089 >
-
(2009)
Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys '09
, pp. 205-218
-
-
Wilson, C.1
Boe, B.2
Sala, A.3
Puttaswamy, K.P.4
Zhao, B.Y.5
|