-
1
-
-
80955154992
-
-
last accessed on 2013-07-17
-
Anatomy of an attack. available online: http://httpblogs.rsa.com/anatomy- of-an-attack/, last accessed on 2013-07-17.
-
Anatomy of an Attack
-
-
-
2
-
-
84893233651
-
-
last accessed on 2013-07-17
-
Google hack attack was ultra sophisticated. available online: http://www.wired.com/threatlevel/2010/01/operationaurora/, last accessed on 2013-07-17.
-
Google Hack Attack Was Ultra Sophisticated
-
-
-
5
-
-
84893340465
-
-
last accessed on 2013-07-18
-
Whatsapp. available online: http://www.whatsapp.com/, last accessed on 2013-07-18.
-
-
-
-
6
-
-
84881224537
-
Sok: The evolution of sybil defense via social networks
-
L. Alvisi, A. Clement, A. Epasto, S. Lattanzi, and A. Panconesi. Sok: The evolution of sybil defense via social networks. IEEE Symposium on Security and Privacy, 2013.
-
(2013)
IEEE Symposium on Security and Privacy
-
-
Alvisi, L.1
Clement, A.2
Epasto, A.3
Lattanzi, S.4
Panconesi, A.5
-
7
-
-
78649246134
-
Privacy aspects of mashup architecture
-
2010 IEEE Second International Conference on
-
G. Bader, A. Anjomshoaa, and A. Tjoa. Privacy aspects of mashup architecture. In Social Computing (SocialCom), 2010 IEEE Second International Conference on, pages 1141-1146, 2010.
-
(2010)
Social Computing (SocialCom)
, pp. 1141-1146
-
-
Bader, G.1
Anjomshoaa, A.2
Tjoa, A.3
-
8
-
-
78249282277
-
Abusing social networks for automated user profiling
-
Springer
-
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel. Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, pages 422-441. Springer, 2010.
-
(2010)
Recent Advances in Intrusion Detection
, pp. 422-441
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
10
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, pages 551-560. ACM, 2009.
-
(2009)
Proceedings of the 18th International Conference on World Wide Web
, pp. 551-560
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
11
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
ACM
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93-102. ACM, 2011.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
12
-
-
76649137380
-
Social networks and context-aware spam
-
New York, NY, USA ACM
-
G. Brown, T. Howe, M. Ihbe, A. Prakash, and K. Borders. Social networks and context-aware spam. In Proceedings of the 2008 ACM conference on Computer supported cooperative work, CSCW'08, pages 403-412, New York, NY, USA, 2008. ACM.
-
(2008)
Proceedings of the 2008 ACM Conference on Computer Supported Cooperative Work, CSCW'08
, pp. 403-412
-
-
Brown, G.1
Howe, T.2
Ihbe, M.3
Prakash, A.4
Borders, K.5
-
13
-
-
79961035117
-
Analyzing inter-application communication in android
-
New York, NY, USA ACM
-
E. Chin, A. P. Felt, K. Greenwood, and D. Wagner. Analyzing inter-application communication in android. In Proceedings of the 9th international conference on Mobile systems, applications, and services, MobiSys'11, pages 239-252, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 9th International Conference on Mobile Systems, Applications, and Services, MobiSys'11
, pp. 239-252
-
-
Chin, E.1
Felt, A.P.2
Greenwood, K.3
Wagner, D.4
-
17
-
-
77957955892
-
Attack surfaces: A taxonomy for attacks on cloud services
-
N. Gruschka and M. Jensen. Attack surfaces: A taxonomy for attacks on cloud services. In IEEE CLOUD, pages 276-279, 2010.
-
(2010)
IEEE CLOUD
, pp. 276-279
-
-
Gruschka, N.1
Jensen, M.2
-
18
-
-
84856038557
-
Phishing as a tragedy of the commons
-
Lake Tahoe, CA
-
C. Herley and D. Florencio. Phishing as a Tragedy of the Commons. NSPW 2008, Lake Tahoe, CA, 2008.
-
(2008)
NSPW 2008
-
-
Herley, C.1
Florencio, D.2
-
19
-
-
70849122971
-
Towards automating social engineering using social networking sites
-
International Conference on IEEE
-
M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa. Towards automating social engineering using social networking sites. In Computational Science and Engineering, 2009. CSE'09. International Conference on, Volume 3, pages 117-124. IEEE, 2009.
-
(2009)
Computational Science and Engineering, 2009. CSE'09
, vol.3
, pp. 117-124
-
-
Huber, M.1
Kowalski, S.2
Nohlberg, M.3
Tjoa, S.4
-
20
-
-
84855658209
-
Social snapshots: Digital forensics for online social networks
-
M. Huber, M. Mulazzani, M. Leithner, S. Schrittwieser, G. Wondracek, and E. Weippl. Social snapshots: digital forensics for online social networks. In Proceedings of the 27th Annual Computer Security Applications Conference, 2011.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference
-
-
Huber, M.1
Mulazzani, M.2
Leithner, M.3
Schrittwieser, S.4
Wondracek, G.5
Weippl, E.6
-
22
-
-
79955551180
-
Friend-in-the-middle attacks: Exploiting social networking sites for spam
-
5
-
M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch. Friend-in-the-middle attacks: Exploiting social networking sites for spam. IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks, 5 2011.
-
(2011)
IEEE Internet Computing: Special Issue on Security and Privacy in Social Networks
-
-
Huber, M.1
Mulazzani, M.2
Weippl, E.3
Kitzler, G.4
Goluch, S.5
-
23
-
-
79959930140
-
Reverse social engineering attacks in online social networks
-
D. Irani, M. Balduzzi, D. Balzarotti, E. Kirda, and C. Pu. Reverse social engineering attacks in online social networks. Detection of Intrusions and Malware, and Vulnerability Assessment, pages 55-74, 2011.
-
(2011)
Detection of Intrusions and Malware, and Vulnerability Assessment
, pp. 55-74
-
-
Irani, D.1
Balduzzi, M.2
Balzarotti, D.3
Kirda, E.4
Pu, C.5
-
24
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Communications of the ACM, 50(10): 94-100, 2007.
-
(2007)
Communications of the ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
25
-
-
84893246018
-
Fake identities in social media: A case study on the sustainability of the facebook business model
-
K. Krombholz, D. Merkl, and E. Weippl. Fake identities in social media: A case study on the sustainability of the facebook business model. JoSSR, 4(2): 175-212, 2012.
-
(2012)
JoSSR
, vol.4
, Issue.2
, pp. 175-212
-
-
Krombholz, K.1
Merkl, D.2
Weippl, E.3
-
26
-
-
35048876774
-
Self-efficacy, training effectiveness, and deception detection: A longitudinal study of lie detection training
-
K. Marett, D. Biros, and M. Knode. Self-efficacy, Training Effectiveness, and Deception Detection: A Longitudinal Study of Lie Detection Training. lecture notes in computer science, 3073: 187-200, 2004.
-
(2004)
Lecture Notes in Computer Science
, vol.3073
, pp. 187-200
-
-
Marett, K.1
Biros, D.2
Knode, M.3
-
27
-
-
84867375385
-
Byod: Security and privacy considerations
-
K. Miller, J. Voas, and G. Hurlburt. Byod: Security and privacy considerations. IT Professional, 14(5): 53-55, 2012.
-
(2012)
IT Professional
, vol.14
, Issue.5
, pp. 53-55
-
-
Miller, K.1
Voas, J.2
Hurlburt, G.3
-
29
-
-
84863932631
-
Dark clouds on the horizon: Using cloud storage as attack vector and online slack space
-
Berkeley, CA, USA USENIX Association
-
M. Mulazzani, S. Schrittwieser, M. Leithner, M. Huber, and E. Weippl. Dark clouds on the horizon: using cloud storage as attack vector and online slack space. In Proceedings of the 20th USENIX conference on Security, SEC'11, pages 5-5, Berkeley, CA, USA, 2011. USENIX Association.
-
(2011)
Proceedings of the 20th USENIX Conference on Security, SEC'11
, pp. 5-5
-
-
Mulazzani, M.1
Schrittwieser, S.2
Leithner, M.3
Huber, M.4
Weippl, E.5
-
30
-
-
84893294050
-
-
last accessed on 2013-07-04
-
R. Nelson. Methods of Hacking: Social Engineering. online, 2008. Available at: http://www.isr.umd.edu/gemstone/infosec/ver2/papers/socialeng. html, last accessed on 2013-07-04.
-
(2008)
Methods of Hacking: Social Engineering
-
-
Nelson, R.1
-
31
-
-
84893295799
-
Phishing for the truth: A scenario-based experiment of usersâǎź behavioural response to emails
-
L. Janczewski, H. Wolfe, and S. Shenoi, editors Springer Berlin Heidelberg
-
K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram. Phishing for the truth: A scenario-based experiment of usersâǎ ź behavioural response to emails. In L. Janczewski, H. Wolfe, and S. Shenoi, editors, Security and Privacy Protection in Information Processing Systems, Volume 405 of IFIP Advances in Information and Communication Technology, pages 366-378. Springer Berlin Heidelberg, 2013.
-
(2013)
Security and Privacy Protection in Information Processing Systems, Volume 405 of IFIP Advances in Information and Communication Technology
, pp. 366-378
-
-
Parsons, K.1
McCormac, A.2
Pattinson, M.3
Butavicius, M.4
Jerram, C.5
-
32
-
-
84893290133
-
-
Jan. last accessed on: 2013-07-01
-
N. Perlroth. Chinese hackers infiltrate new york times computers, Jan. 2013. available at https://www.nytimes.com/2013/01/31/technology/chinese- hackers-infiltrate-new-york-times-computers.html, last accessed on: 2013-07-01.
-
(2013)
Chinese Hackers Infiltrate New York Times Computers
-
-
Perlroth, N.1
-
33
-
-
84863138661
-
Plagiarizing smartphone applications: Attack strategies and defense techniques
-
Berlin, Heidelberg Springer-Verlag
-
R. Potharaju, A. Newell, C. Nita-Rotaru, and X. Zhang. Plagiarizing smartphone applications: attack strategies and defense techniques. In Proceedings of the 4th international conference on Engineering Secure Software and Systems, ESSoS'12, pages 106-120, Berlin, Heidelberg, 2012. Springer-Verlag.
-
(2012)
Proceedings of the 4th International Conference on Engineering Secure Software and Systems, ESSoS'12
, pp. 106-120
-
-
Potharaju, R.1
Newell, A.2
Nita-Rotaru, C.3
Zhang, X.4
-
34
-
-
34748869064
-
An investigation of heuristics of human judgment in detecting deception and potential implications in countering social engineering
-
2007 IEEE
-
T. Qin and J. Burgoon. An Investigation of Heuristics of Human Judgment in Detecting Deception and Potential Implications in Countering Social Engineering. Intelligence and Security Informatics, 2007 IEEE, pages 152-159, 2007.
-
(2007)
Intelligence and Security Informatics
, pp. 152-159
-
-
Qin, T.1
Burgoon, J.2
-
35
-
-
81455143616
-
Who can you trust in the cloud? A review of security issues within cloud computing
-
New York, NY, USA ACM
-
J. C. Roberts, II and W. Al-Hamdani. Who can you trust in the cloud? a review of security issues within cloud computing. In Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD'11, pages 15-19, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 Information Security Curriculum Development Conference, InfoSecCD'11
, pp. 15-19
-
-
Roberts II, J.C.1
Al-Hamdani, W.2
-
36
-
-
85030411408
-
Guess who is texting you? Evaluating the security of smartphone messaging applications
-
2
-
S. Schrittwieser, P. Fruehwirt, P. Kieseberg, M. Leithner, M. Mulazzani, M. Huber, and E. Weippl. Guess Who Is Texting You? Evaluating the Security of Smartphone Messaging Applications. In Network and Distributed System Security Symposium (NDSS 2012), 2 2012.
-
(2012)
Network and Distributed System Security Symposium (NDSS 2012)
-
-
Schrittwieser, S.1
Fruehwirt, P.2
Kieseberg, P.3
Leithner, M.4
Mulazzani, M.5
Huber, M.6
Weippl, E.7
-
37
-
-
84893265725
-
-
last accessed on 2013-07-04
-
SocialEngineer. What is phishing - paypal phishing examples. available online: http://www.socialengineer.org/wiki/archives/Phishing/PhishingPayPal. html, last accessed on 2013-07-04.
-
What Is Phishing - Paypal Phishing Examples
-
-
-
39
-
-
72849151945
-
-
last accessed on: 2013-07-02
-
S. Stasiukonis. Social Engineering, the USB Way. 2006. available at http://www.darkreading.com/security/perimeter/showArticle.jhtml?articleID= 208803634, last accessed on: 2013-07-02.
-
(2006)
Social Engineering, the USB Way
-
-
Stasiukonis, S.1
-
40
-
-
77951996290
-
The psychology of password management: A tradeoff between security and convenience
-
May
-
L. Tam, M. Glassman, and M. Vandenwauver. The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol., 29(3): 233-244, May 2010.
-
(2010)
Behav. Inf. Technol.
, vol.29
, Issue.3
, pp. 233-244
-
-
Tam, L.1
Glassman, M.2
Vandenwauver, M.3
-
41
-
-
84873390405
-
The human element of information security
-
H. Thompson. The human element of information security. Security Privacy, IEEE, 11(1): 32-35, 2013.
-
(2013)
Security Privacy, IEEE
, vol.11
, Issue.1
, pp. 32-35
-
-
Thompson, H.1
|