메뉴 건너뛰기




Volumn 16, Issue 5, 2014, Pages 28-33

Trust and privacy exploitation in online social networks

Author keywords

information network; Internet Web technologies; mobile; networking; privacy; security

Indexed keywords

INFORMATION NETWORKS; MOBILE; NETWORKING; ON-LINE SOCIAL NETWORKS; SECURITY;

EID: 84907551758     PISSN: 15209202     EISSN: None     Source Type: Journal    
DOI: 10.1109/MITP.2014.79     Document Type: Article
Times cited : (13)

References (9)
  • 1
    • 77952804826 scopus 로고    scopus 로고
    • Cell phones as mobile computing devices
    • K.Y. Wong, "Cell Phones as Mobile Computing Devices," IT Professional, vol. 12, no. 3, 2010, pp. 40-45.
    • (2010) IT Professional , vol.12 , Issue.3 , pp. 40-45
    • Wong, K.Y.1
  • 2
    • 77949552450 scopus 로고    scopus 로고
    • The near-me area network
    • K.Y. Wong, "The Near-Me Area Network," IEEE Internet Computing, vol. 14, no. 2, 2010, pp. 74-77.
    • (2010) IEEE Internet Computing , vol.14 , Issue.2 , pp. 74-77
    • Wong, K.Y.1
  • 3
    • 84907491102 scopus 로고    scopus 로고
    • Ice IX malware tricks facebook users to enter credit cards details
    • 3 Apr.
    • E. Protalinski, "Ice IX Malware Tricks Facebook Users to Enter Credit Cards Details," ZDNet, 3 Apr. 2012; http://www.zdnet.com/blog/security/malware-tricksfacebook- users-into-exposing-credit-cards/11297.
    • (2012) ZDNet
    • Protalinski, E.1
  • 6
    • 78650880229 scopus 로고    scopus 로고
    • Detecting and characterizing social spam campaigns
    • H. Gao et al., "Detecting and Characterizing Social Spam Campaigns," Proc. 10th Ann. Conf. Internet Measurement, 2010, pp. 35-47.
    • (2010) Proc. 10th Ann. Conf. Internet Measurement , pp. 35-47
    • Gao, H.1
  • 7
    • 84907491101 scopus 로고    scopus 로고
    • Hackers use twitter to control botnet
    • 13 Aug.
    • R. Singel, "Hackers Use Twitter to Control Botnet," Wired, 13 Aug. 2009, www.wired.com/threatlevel/2009/08/ botnet-tweets.
    • (2009) Wired
    • Singel, R.1
  • 8
    • 56649085023 scopus 로고    scopus 로고
    • Antisocial networks: Turning a social network into a botnet
    • Springer
    • E. Athanasopolous et al., "Antisocial Networks: Turning a Social Network into a Botnet," Information Security, Springer, 2008, pp. 146-160.
    • (2008) Information Security , pp. 146-160
    • Athanasopolous, E.1
  • 9
    • 84907491100 scopus 로고    scopus 로고
    • Identity hijacking on social media
    • Oct.
    • J. Kim, "Identity Hijacking on Social Media," blog, Oct. 2012; www.futureofsocialnetwork.com/2012/10/ identity-hijacking-on-social-media.html.
    • (2012) Blog
    • Kim, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.