-
2
-
-
84877974891
-
-
Wechat. http://weixin.qq.com.
-
Wechat
-
-
-
3
-
-
78249282277
-
Abusing social networks for automated user profiling
-
S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection
-
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422-441. 2010.
-
(2010)
Lecture Notes in Computer Science
, vol.6307
, pp. 422-441
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
4
-
-
84860764042
-
Mockdroid: Trading privacy for application functionality on smartphones
-
New York, NY, USA
-
A. R. Beresford, A. Rice, N. Skehin, and R. Sohan. Mockdroid: trading privacy for application functionality on smartphones. In Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11, pages 49-54, New York, NY, USA, 2011.
-
(2011)
Proceedings of the 12th Workshop on Mobile Computing Systems and Applications, HotMobile '11
, pp. 49-54
-
-
Beresford, A.R.1
Rice, A.2
Skehin, N.3
Sohan, R.4
-
5
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
New York, NY, USA
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, WWW '09, pages 551-560, New York, NY, USA, 2009.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web, WWW '09
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
84889757331
-
Indirect content privacy surveys: Measuring privacy without asking about it
-
New York, NY, USA
-
A. Braunstein, L. Granka, and J. Staddon. Indirect content privacy surveys: measuring privacy without asking about it. In Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11, pages 15:1-15:14, New York, NY, USA, 2011.
-
(2011)
Proceedings of the Seventh Symposium on Usable Privacy and Security, SOUPS '11
-
-
Braunstein, A.1
Granka, L.2
Staddon, J.3
-
8
-
-
79955570859
-
Taintdroid: An information-flow tracking system for realtime privacy monitoring on smartphones
-
Berkeley, CA, USA
-
W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, J. Jung, P. McDaniel, and A. N. Sheth. Taintdroid: an information-flow tracking system for realtime privacy monitoring on smartphones. In Proceedings of the 9th USENIX conference on Operating systems design and implementation, OSDI'10, pages 1-6, Berkeley, CA, USA, 2010.
-
(2010)
Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation, OSDI'10
, pp. 1-6
-
-
Enck, W.1
Gilbert, P.2
Chun, B.-G.3
Cox, L.P.4
Jung, J.5
McDaniel, P.6
Sheth, A.N.7
-
9
-
-
41949126461
-
Why and how to perform fraud experiments
-
DOI 10.1109/MSP.2008.52, 4480466
-
M. Jakobsson, N. Johnson, and P. Finn. Why and how to perform fraud experiments. IEEE Security and Privacy, 6(2):66-68, Mar. 2008. (Pubitemid 351506258)
-
(2008)
IEEE Security and Privacy
, vol.6
, Issue.2
, pp. 66-68
-
-
Jakobsson, M.1
Johnson, N.2
Finn, P.3
-
10
-
-
85030411408
-
Guess who is texting you? Evaluating the security of smartphone messaging applications
-
S. Schrittwieser, P. Fruehwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. Weippl. Guess who is texting you? evaluating the security of smartphone messaging applications. In Network and Distributed System Security Symposium (NDSS 2012), 2012.
-
(2012)
Network and Distributed System Security Symposium (NDSS 2012)
-
-
Schrittwieser, S.1
Fruehwirt, P.2
Kieseberg, P.3
Leithner, M.4
Mulazzani, M.5
Huber, M.6
Weippl, E.7
-
11
-
-
85037359376
-
Taming information-stealing smartphone applications (on android)
-
Berlin, Heidelberg
-
Y. Zhou, X. Zhang, X. Jiang, and V. W. Freeh. Taming information-stealing smartphone applications (on android). In Proceedings of the 4th international conference on Trust and trustworthy computing, TRUST'11, pages 93-107, Berlin, Heidelberg, 2011.
-
(2011)
Proceedings of the 4th International Conference on Trust and Trustworthy Computing, TRUST'11
, pp. 93-107
-
-
Zhou, Y.1
Zhang, X.2
Jiang, X.3
Freeh, V.W.4
|