메뉴 건너뛰기




Volumn 18, Issue 5, 2014, Pages 11-19

Anti-reconnaissance tools: Detecting targeted socialbots

Author keywords

reconnaissance; social network; socialbots

Indexed keywords

INTERNET;

EID: 84906736685     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2014.81     Document Type: Article
Times cited : (35)

References (20)
  • 2
    • 80052169144 scopus 로고    scopus 로고
    • Advanced persistent threats and how to monitor and deter them
    • C. Tankard, "Advanced Persistent Threats and How to Monitor and Deter Them," Network Security, vol. 8, no. 8, 2011, pp. 16-19.
    • (2011) Network Security , vol.8 , Issue.8 , pp. 16-19
    • Tankard, C.1
  • 3
    • 84864567494 scopus 로고    scopus 로고
    • Information leakage through online social networking: Opening the doorway for advanced persistence threats
    • N. Molok, S. Chang, and A. Ahmad, "Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats," Proc. 8th Australian Information Security Management Conf., 2010, pp. 70-80.
    • (2010) Proc. 8th Australian Information Security Management Conf. , pp. 70-80
    • Molok, N.1    Chang, S.2    Ahmad, A.3
  • 4
    • 84881054482 scopus 로고    scopus 로고
    • Organizational intrusion: Organization mining using socialbots
    • (SocialInformatics 12)
    • A. Elishar et al., "Organizational Intrusion: Organization Mining Using Socialbots," Proc. Int'l Conf. Social Informatics (SocialInformatics 12), 2012, pp. 7-12.
    • (2012) Proc. Int'l Conf. Social Informatics , pp. 7-12
    • Elishar, A.1
  • 7
    • 84887050003 scopus 로고    scopus 로고
    • SybilInfer: Detecting sybil nodes using social networks
    • Jan.
    • G. Danezis and M. Prateek, SybilInfer: Detecting Sybil Nodes using Social Networks, tech. report, Microsoft, Jan. 2009.
    • (2009) Tech. Report, Microsoft
    • Danezis, G.1    Prateek, M.2
  • 8
    • 45749116664 scopus 로고    scopus 로고
    • Sybillimit: A Near-Optimal social network defense against sybil attacks
    • H. Yu et al., "Sybillimit: A Near-Optimal Social Network Defense against Sybil Attacks," Proc. IEEE Symp. Security and Privacy, 2008, pp. 3-17.
    • (2008) Proc. IEEE Symp. Security and Privacy , pp. 3-17
    • Yu, H.1
  • 10
    • 84857662478 scopus 로고    scopus 로고
    • Will you be my friend? Responses to friendship requests from strangers
    • S. Patil, "Will You Be My Friend? Responses to Friendship Requests from Strangers," Proc. 2012 ACM iConference, 2012, pp. 634-635.
    • (2012) Proc. 2012 ACM iConference , pp. 634-635
    • Patil, S.1
  • 11
    • 84906760215 scopus 로고    scopus 로고
    • blog
    • A. Acquisti, "Why Privacy Matters," blog, 2013; www. esl-bits. net/listening/Media/2013-10-21/Alessandro. Acquisti/index. html.
    • (2013) Why Privacy Matters
    • Acquisti, A.1
  • 12
    • 0038483826 scopus 로고    scopus 로고
    • Emergence of scaling in random networks
    • A. L. Barabási and R. Albert, "Emergence of Scaling in Random Networks," Science, vol. 286, no. 5439, 1999, pp. 509-512.
    • (1999) Science , vol.286 , Issue.5439 , pp. 509-512
    • Barabási, A.L.1    Albert, R.2
  • 14
    • 84893354350 scopus 로고    scopus 로고
    • TONIC: Target oriented network intelligence collection for the social web
    • R. Stern et al., "TONIC: Target Oriented Network Intelligence Collection for the Social Web," Proc. 27th AAAI Conf. Artificial Intelligence, 2013, pp. 1184-1190.
    • (2013) Proc. 27th AAAI Conf. Artificial Intelligence , pp. 1184-1190
    • Stern, R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.