-
1
-
-
84859133265
-
Trends prediction using social diffusion models
-
Altshuler, Y., Pan, W., & Pentland, A. S
-
Altshuler, Y., Pan, W., & Pentland, A. S. (2012). Trends prediction using social diffusion models. In Social computing, behavioral-cultural modeling and prediction (pp. 97–104). Springer.
-
(2012)
In Social computing, behavioral-cultural modeling and prediction (pp. 97–104). Springer
-
-
-
2
-
-
56649085023
-
Antisocial networks: Turning a social network into a botnet
-
Athanasopoulos, E., Makridakis, A., Antonatos, S., Antoniades, D., Ioannidis, S., Anagnostakis, K., et al. (2008). Antisocial networks: Turning a social network into a botnet. Information security (pp. 146–160).
-
(2008)
Information security
, pp. 146-160
-
-
Athanasopoulos, E.1
Makridakis, A.2
Antonatos, S.3
Antoniades, D.4
Ioannidis, S.5
Anagnostakis, K.6
-
3
-
-
84912027959
-
-
BGU Social Networks Security Research Group. (2013). BGU social networks dataset collection
-
BGU Social Networks Security Research Group. (2013). BGU social networks dataset collection. http://proj.ise.bgu.ac.il/sns/datasets.html.
-
-
-
-
4
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference
-
Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2011). The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference, ACM (pp. 93–102).
-
(2011)
ACM
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
5
-
-
84912022105
-
-
Anonymized Internet Traces, Dataset:
-
CAIDA. (2012). Anonymized Internet Traces 2012 Dataset. http://www.caida.org/data/passive/passive_2012_dataset.xml.
-
(2012)
(2012)
-
-
-
6
-
-
84881054482
-
Organizational intrusion: Organization mining using socialbots
-
Elishar, A., Fire, M., Kagan, D., & Elovici, Y
-
Elishar, A., Fire, M., Kagan, D., & Elovici, Y. (2012). Organizational intrusion: Organization mining using socialbots. In Proceedings of ASE international conference on social informatics, Washington DC, USA, December.
-
(2012)
In Proceedings of ASE international conference on social informatics, Washington DC, USA, December
-
-
-
7
-
-
68349123169
-
The ethics of internet research
-
Eynon, R., Fry, J., & Schroeder, R, (pp. 23–42). Sage, London
-
Eynon, R., Fry, J., & Schroeder, R. (2008). The ethics of internet research. In Handbook of online research methods (pp. 23–42). Sage, London.
-
(2008)
In Handbook of online research methods
-
-
-
8
-
-
68349101174
-
New techniques in online research: Challenges for research ethics
-
Eynon, R., Schroeder, R., & Fry, J. (2009). New techniques in online research: Challenges for research ethics. Twenty-First Century Society, 4(2), 187–199.
-
(2009)
Twenty-First Century Society
, vol.4
, Issue.2
, pp. 187-199
-
-
Eynon, R.1
Schroeder, R.2
Fry, J.3
-
9
-
-
0035841472
-
Ethical issues in qualitative research on internet communities
-
Eysenbach, G., & Till, J. E. (2001). Ethical issues in qualitative research on internet communities. BMJ, 323(7321), 1103–1105.
-
(2001)
BMJ
, vol.323
, Issue.7321
, pp. 1103-1105
-
-
Eysenbach, G.1
Till, J.E.2
-
11
-
-
84856196261
-
Link prediction in social networks using computationally efficient topological features
-
Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., & Elovici, Y, (pp. 73–80). IEEE
-
Fire, M., Tenenboim, L., Lesser, O., Puzis, R., Rokach, L., & Elovici, Y. (2011). Link prediction in social networks using computationally efficient topological features. In IEEE third international conference on privacy, security, risk and trust (PASSAT) and IEEE third international conference on social computing (SocialCom) (pp. 73–80). IEEE.
-
(2011)
In IEEE third international conference on privacy, security, risk and trust (PASSAT) and IEEE third international conference on social computing (SocialCom)
-
-
-
12
-
-
84893273434
-
Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies
-
Fire, M., Katz, G., & Elovici, Y. (2012). Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies. Human Journal, 1(1), 26–39.
-
(2012)
Human Journal
, vol.1
, Issue.1
, pp. 26-39
-
-
Fire, M.1
Katz, G.2
Elovici, Y.3
-
13
-
-
84906052349
-
Social privacy protector—protecting users’ privacy in social networks
-
Fire, M., Kagan, D., Elishar, A., & Elovici, Y. (2012a). Social privacy protector—protecting users’ privacy in social networks. In SOTICS 2012, the second international conference on social eco-informatics (pp. 46–50).
-
(2012)
In SOTICS 2012, the second international conference on social eco-informatics
, pp. 46-50
-
-
Fire, M.1
Kagan, D.2
Elishar, A.3
Elovici, Y.4
-
14
-
-
84871965752
-
Data mining opportunities in geosocial networks for improving road safety
-
Fire, M., Kagan, D., Puzis, R., Rokach, L., & Elovici, Y, 2012 (pp. 1–4). IEEE
-
Fire, M., Kagan, D., Puzis, R., Rokach, L., & Elovici, Y. (2012b). Data mining opportunities in geosocial networks for improving road safety. In IEEE 27th convention of electrical and electronics engineers in Israel (IEEEI), 2012 (pp. 1–4). IEEE.
-
(2012)
In IEEE 27th convention of electrical and electronics engineers in Israel (IEEEI)
-
-
-
16
-
-
1342307809
-
Ethical dilemmas in research on internet communities
-
Flicker, S., Haans, D., & Skinner, H. (2004). Ethical dilemmas in research on internet communities. Qualitative Health Research, 14(1), 124–134.
-
(2004)
Qualitative Health Research
, vol.14
, Issue.1
, pp. 124-134
-
-
Flicker, S.1
Haans, D.2
Skinner, H.3
-
17
-
-
80053013660
-
Forcing johnny to login safely—long-term user study of forcing and training login mechanisms
-
Atluri V., Díaz C., (eds), 6879, Springer, Berlin:
-
Herzberg, A., & Margulies, R. (2011). Forcing johnny to login safely—long-term user study of forcing and training login mechanisms. In V. Atluri, C. Díaz (Ed.), ESORICS, lecture notes in computer science (vol. 6879, pp. 452–471). Springer, Berlin
-
(2011)
ESORICS, lecture notes in computer science
-
-
Herzberg, A.1
Margulies, R.2
-
18
-
-
79955551180
-
Friend-in-the-middle attacks: Exploiting social networking sites for spam
-
Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle attacks: Exploiting social networking sites for spam. Internet Computing, IEEE, 15(3), 28–34.
-
(2011)
Internet Computing, IEEE
, vol.15
, Issue.3
, pp. 28-34
-
-
Huber, M.1
Mulazzani, M.2
Weippl, E.3
Kitzler, G.4
Goluch, S.5
-
19
-
-
84855658209
-
Social snapshots: Digital forensics for online social networks
-
Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E, (pp. 113–122). ACM
-
Huber, M., Mulazzani, M., Leithner, M., Schrittwieser, S., Wondracek, G., & Weippl, E. (2011a). Social snapshots: Digital forensics for online social networks. In Proceedings of the 27th annual computer security applications conference (pp. 113–122). ACM.
-
(2011)
Proceedings of the 27th annual computer security applications conference
-
-
-
20
-
-
71649097455
-
Gaydar: Facebook friendships expose sexual orientation
-
Jernigan, C., & Mistree, B. F. (2009). Gaydar: Facebook friendships expose sexual orientation. First Monday, 14(10).
-
(2009)
First Monday
, vol.14
, Issue.10
-
-
Jernigan, C.1
Mistree, B.F.2
-
21
-
-
79958043518
-
-
Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos E. P. (2011). Detecting social network profile cloning. In IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 295–300). IEEE
-
Kontaxis, G., Polakis, I., Ioannidis, S., & Markatos E. P. (2011). Detecting social network profile cloning. In IEEE international conference on pervasive computing and communications workshops (PERCOM workshops) (pp. 295–300). IEEE
-
-
-
-
22
-
-
84911995672
-
-
Kunegis, J. (2013). KONECT—the Koblenz Network Collection
-
Kunegis, J. (2013). KONECT—the Koblenz Network Collection. http://konect.uni-koblenz.de.
-
-
-
-
23
-
-
77954619566
-
What is twitter, a social network or a news media?
-
Kwak, H., Lee, C., Park, H., & Moon, S, (pp. 591–600). ACM
-
Kwak, H., Lee, C., Park, H., & Moon, S. (2010). What is twitter, a social network or a news media? In Proceedings of the 19th international conference on world wide web (pp. 591–600). ACM.
-
(2010)
In Proceedings of the 19th international conference on world wide web
-
-
-
24
-
-
82955190606
-
Analyzing facebook privacy settings: User expectations vs. reality
-
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A, (pp. 61–70). ACM
-
Liu, Y., Gummadi, K. P., Krishnamurthy, B., & Mislove, A. (2011). Analyzing facebook privacy settings: User expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference (pp. 61–70). ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM conference on internet measurement conference
-
-
-
26
-
-
84911995671
-
-
Margulies, R., & Herzberg, A. (2013). Conducting ethical yet realistic usable security studies. In Cyber-security research ethics dialog and strategy workshop (CREDS)
-
Margulies, R., & Herzberg, A. (2013). Conducting ethical yet realistic usable security studies. In Cyber-security research ethics dialog and strategy workshop (CREDS).
-
-
-
-
27
-
-
84911995670
-
-
Microsoft-Research. (2013). LETOR: Learning to rank for information retrieval
-
Microsoft-Research. (2013). LETOR: Learning to rank for information retrieval. http://research.microsoft.com/en-us/projects/mslr/.
-
-
-
-
28
-
-
42149117427
-
-
Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29–42). ACM
-
Mislove, A., Marcon, M., Gummadi, K. P., Druschel, P., & Bhattacharjee, B. (2007). Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (pp. 29–42). ACM.
-
-
-
-
29
-
-
77950886667
-
-
Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM international conference on web search and data mining (pp. 251–260). ACM
-
Mislove, A., Viswanath, B., Gummadi, K. P., & Druschel, P. (2010). You are who you know: Inferring user profiles in online social networks. In Proceedings of the third ACM international conference on web search and data mining (pp. 251–260). ACM.
-
-
-
-
31
-
-
80054758441
-
-
Narayanan, A., Shi, E., & Rubinstein, B. I. (2011). Link prediction by de-anonymization: How we won the kaggle social network challenge. In The 2011 international joint conference on neural networks (IJCNN) (pp. 1825–1834). IEEE
-
Narayanan, A., Shi, E., & Rubinstein, B. I. (2011). Link prediction by de-anonymization: How we won the kaggle social network challenge. In The 2011 international joint conference on neural networks (IJCNN) (pp. 1825–1834). IEEE.
-
-
-
-
32
-
-
84879483810
-
We know where you live: Privacy characterization of foursquare behavior
-
Pontes, T., Vasconcelos, M. A., Almeida, J. M., Kumaraguru, P., & Almeida, V. (2012). We know where you live: Privacy characterization of foursquare behavior. In UbiComp (pp. 898–905).
-
(2012)
In UbiComp
, pp. 898-905
-
-
Pontes, T.1
Vasconcelos, M.A.2
Almeida, J.M.3
Kumaraguru, P.4
Almeida, V.5
-
33
-
-
85076213516
-
Efficient and scalable socware detection in online social networks. In Proceedings of the 21st USENIX conference on Security symposium
-
Rahman, M. S., Huang, T. K., Madhyastha, H. V., & Faloutsos, M. (2012). Efficient and scalable socware detection in online social networks. In Proceedings of the 21st USENIX conference on Security symposium, USENIX Association (pp. 32–32).
-
(2012)
USENIX Association
, pp. 32
-
-
Rahman, M.S.1
Huang, T.K.2
Madhyastha, H.V.3
Faloutsos, M.4
-
34
-
-
84874918773
-
Virtual world research ethics and the private/public distinction
-
Rosenberg, A. (2010). Virtual world research ethics and the private/public distinction. International Journal of Internet Research Ethics, 3(12), 23–36.
-
(2010)
International Journal of Internet Research Ethics
, vol.3
, Issue.12
, pp. 23-36
-
-
Rosenberg, A.1
-
35
-
-
80755172908
-
Busting frame busting: a study of clickjacking vulnerabilities at popular sites
-
Rydstedt, G., Bursztein, E., Boneh, D., & Jackson, C. (2010). Busting frame busting: a study of clickjacking vulnerabilities at popular sites. In IEEE Oakland Web 2.
-
(2010)
In IEEE Oakland Web
, pp. 2
-
-
Rydstedt, G.1
Bursztein, E.2
Boneh, D.3
Jackson, C.4
-
36
-
-
84911995668
-
-
Stanford. (2013). Stanford large network dataset collection
-
Stanford. (2013). Stanford large network dataset collection. http://snap.stanford.edu/data/.
-
-
-
-
37
-
-
84912043998
-
-
Taylor, C. (2012). Startup claims 80 bots
-
Taylor, C. (2012). Startup claims 80 bots. http://techcrunch.com/2012/07/30/startup-claims-80-of-its-facebook-ad-clicks-are-coming-from-bots/.
-
-
-
-
38
-
-
33750897224
-
Web crawling ethics revisited: Cost, privacy, and denial of service
-
Thelwall, M., & Stuart, D. (2006). Web crawling ethics revisited: Cost, privacy, and denial of service. Journal of the American Society for Information Science and Technology, 57(13), 1771–1779.
-
(2006)
Journal of the American Society for Information Science and Technology
, vol.57
, Issue.13
, pp. 1771-1779
-
-
Thelwall, M.1
Stuart, D.2
-
39
-
-
81755188521
-
Researching personal information on the public web methods and ethics
-
Wilkinson, D., & Thelwall, M. (2011). Researching personal information on the public web methods and ethics. Social Science Computer Review, 29(4), 387–401.
-
(2011)
Social Science Computer Review
, vol.29
, Issue.4
, pp. 387-401
-
-
Wilkinson, D.1
Thelwall, M.2
-
40
-
-
84912011719
-
-
Zafarani, R., & Liu, H. (2009). Social computing data repository at asu. , Arizona State University, School of Computing, Informatics and Decision Systems Engineering
-
Zafarani, R., & Liu, H. (2009). Social computing data repository at asu. http://socialcomputing.asu.edu, Arizona State University, School of Computing, Informatics and Decision Systems Engineering.
-
-
-
-
41
-
-
78149496553
-
But the data is already public: On the ethics of research in Facebook
-
Zimmer, M. (2010). But the data is already public: On the ethics of research in Facebook. Ethics and Information Technology, 12(4), 313–325.
-
(2010)
Ethics and Information Technology
, vol.12
, Issue.4
, pp. 313-325
-
-
Zimmer, M.1
|