-
1
-
-
84869777926
-
Practical study on advanced persistent threats
-
CCIS 339, Springer
-
I. Jeun, Y. Lee, and D. A. Won, "Practical Study on Advanced Persistent Threats," Computer Applications for Security, Control, and System Eng., CCIS 339, Springer, 2012, pp. 144-152.
-
(2012)
Computer Applications for Security, Control, and System Eng.
, pp. 144-152
-
-
Jeun, I.1
Lee, Y.2
Won, D.A.3
-
2
-
-
80052169144
-
Advanced persistent threats and how to monitor and deter them
-
C. Tankard, "Advanced Persistent Threats and How to Monitor and Deter Them," Network Security, vol. 8, no. 8, 2011, pp. 16-19.
-
(2011)
Network Security
, vol.8
, Issue.8
, pp. 16-19
-
-
Tankard, C.1
-
3
-
-
84864567494
-
Information leakage through online social networking: Opening the doorway for advanced persistence threats
-
N. Molok, S. Chang, and A. Ahmad, "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats," Proc. 8th Australian Information Security Management Conf., 2010, pp. 70-80.
-
(2010)
Proc. 8th Australian Information Security Management Conf.
, pp. 70-80
-
-
Molok, N.1
Chang, S.2
Ahmad, A.3
-
4
-
-
84881054482
-
Organizational intrusion: Organization mining using socialbots
-
(SocialInformatics 12)
-
A. Elishar et al., "Organizational Intrusion: Organization Mining Using Socialbots," Proc. Int'l Conf. Social Informatics (SocialInformatics 12), 2012, pp. 7-12.
-
(2012)
Proc. Int'l Conf. Social Informatics
, pp. 7-12
-
-
Elishar, A.1
-
7
-
-
84887050003
-
SybilInfer: Detecting sybil nodes using social networks
-
Jan.
-
G. Danezis and M. Prateek, SybilInfer: Detecting Sybil Nodes using Social Networks, tech. report, Microsoft, Jan. 2009.
-
(2009)
Tech. Report, Microsoft
-
-
Danezis, G.1
Prateek, M.2
-
8
-
-
45749116664
-
Sybillimit: A Near-Optimal social network defense against sybil attacks
-
H. Yu et al., "Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks," Proc. IEEE Symp. Security and Privacy, 2008, pp. 3-17.
-
(2008)
Proc. IEEE Symp. Security and Privacy
, pp. 3-17
-
-
Yu, H.1
-
10
-
-
84857662478
-
Will you be my friend? Responses to friendship requests from strangers
-
S. Patil, "Will You Be My Friend? Responses to Friendship Requests from Strangers," Proc. 2012 ACM iConference, 2012, pp. 634-635.
-
(2012)
Proc. 2012 ACM iConference
, pp. 634-635
-
-
Patil, S.1
-
11
-
-
84906760215
-
-
blog
-
A. Acquisti, "Why Privacy Matters," blog, 2013; www. esl-bits. net/listening/Media/2013-10-21/Alessandro. Acquisti/index. html.
-
(2013)
Why Privacy Matters
-
-
Acquisti, A.1
-
12
-
-
0038483826
-
Emergence of scaling in random networks
-
A. L. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, 1999, pp. 509-512.
-
(1999)
Science
, vol.286
, Issue.5439
, pp. 509-512
-
-
Barabási, A.L.1
Albert, R.2
-
14
-
-
84893354350
-
TONIC: Target oriented network intelligence collection for the social web
-
R. Stern et al., "TONIC: Target Oriented Network Intelligence Collection for the Social Web," Proc. 27th AAAI Conf. Artificial Intelligence, 2013, pp. 1184-1190.
-
(2013)
Proc. 27th AAAI Conf. Artificial Intelligence
, pp. 1184-1190
-
-
Stern, R.1
-
15
-
-
84874813921
-
Intruder or welcome friend: Inferring group membership in online social networks
-
O. Lesser et al., "Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks," Proc. 6th Int'l Conf. Social Computing, Behavioral-Cultural Modeling and Prediction, LNCS 7812, 2013, pp. 368-376.
-
(2013)
Proc. 6th Int'l Conf. Social Computing, Behavioral-Cultural Modeling and Prediction, LNCS 7812
, pp. 368-376
-
-
Lesser, O.1
|