메뉴 건너뛰기




Volumn , Issue , 2013, Pages 335-340

Bind your phone number with caution: Automated user profiling through address book matching on smartphone

Author keywords

address book matching; privacy; smartphone applications; user profiling

Indexed keywords

ADDRESS BOOK MATCHING; COST-EFFICIENT; MOBILE PLATFORM; PRIVACY ISSUE; SMART-PHONE APPLICATIONS; USER EXPERIENCE; USER PRIVACY; USER PROFILING;

EID: 84877990396     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2484313.2484356     Document Type: Conference Paper
Times cited : (19)

References (11)
  • 2
    • 84877974891 scopus 로고    scopus 로고
    • Wechat. http://weixin.qq.com.
    • Wechat
  • 3
    • 78249282277 scopus 로고    scopus 로고
    • Abusing social networks for automated user profiling
    • S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection
    • M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In S. Jha, R. Sommer, and C. Kreibich, editors, Recent Advances in Intrusion Detection, volume 6307 of Lecture Notes in Computer Science, pages 422-441. 2010.
    • (2010) Lecture Notes in Computer Science , vol.6307 , pp. 422-441
    • Balduzzi, M.1    Platzer, C.2    Holz, T.3    Kirda, E.4    Balzarotti, D.5    Kruegel, C.6
  • 9
    • 41949126461 scopus 로고    scopus 로고
    • Why and how to perform fraud experiments
    • DOI 10.1109/MSP.2008.52, 4480466
    • M. Jakobsson, N. Johnson, and P. Finn. Why and how to perform fraud experiments. IEEE Security and Privacy, 6(2):66-68, Mar. 2008. (Pubitemid 351506258)
    • (2008) IEEE Security and Privacy , vol.6 , Issue.2 , pp. 66-68
    • Jakobsson, M.1    Johnson, N.2    Finn, P.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.