-
1
-
-
84888142116
-
-
Bing Maps API. http://www.microsoft.com/maps/developers/web.aspx.
-
Bing Maps API
-
-
-
5
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: Automated identity theft attacks on social networks. In WWW'09.
-
WWW'09
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
6
-
-
85015988583
-
Aiding the detection of fake accounts in large scale social online services
-
Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In NSDI'12.
-
NSDI'12
-
-
Cao, Q.1
Sirivianos, M.2
Yang, X.3
Pregueiro, T.4
-
7
-
-
11144240583
-
A comparison of string distance metrics for name-matching tasks
-
W. W. Cohen, P. Ravikumar, and S. E. Fienberg. A comparison of string distance metrics for name-matching tasks. In IJCAI'03.
-
IJCAI'03
-
-
Cohen, W.W.1
Ravikumar, P.2
Fienberg, S.E.3
-
8
-
-
84970883135
-
-
S. Corpus, 2015. http://anoncvs.postgresql.org/cvsweb.cgi/pgsql/src/backend/snowball/stopwords/.
-
(2015)
-
-
Corpus, S.1
-
10
-
-
84951872859
-
On the reliability of profile matching across large online social networks
-
O. Goga, P. Loiseau, R. Sommer, R. Teixeira, and K. Gummadi. On the reliability of profile matching across large online social networks. In KDD, 2015.
-
(2015)
KDD
-
-
Goga, O.1
Loiseau, P.2
Sommer, R.3
Teixeira, R.4
Gummadi, K.5
-
11
-
-
84890114916
-
A defence scheme against identity theft attack based on multiple social networks
-
B.-Z. He, C.-M. Chen, Y.-P. Su, and H.-M. Sun. A defence scheme against identity theft attack based on multiple social networks. Expert Syst. Appl., 2014.
-
(2014)
Expert Syst. Appl.
-
-
He, B.-Z.1
Chen, C.-M.2
Su, Y.-P.3
Sun, H.-M.4
-
12
-
-
84970897093
-
-
Internetnews. Microsoft survey: Online 'reputation' counts, 2010. http://www.internetnews.com/webcontent/article.php/3861241/Microsoft+Survey+Online+Reputation+Counts.htm.
-
(2010)
Microsoft Survey: Online 'reputation' Counts
-
-
-
13
-
-
79952797371
-
Towards active detection of identity clone attacks on online social networks
-
L. Jin, H. Takabi, and J. B. Joshi. Towards active detection of identity clone attacks on online social networks. In CODASPY '11.
-
CODASPY '11
-
-
Jin, L.1
Takabi, H.2
Joshi, J.B.3
-
16
-
-
84970897089
-
-
Klout. Klout, 2014. http://klout.com/.
-
(2014)
Klout
-
-
-
18
-
-
3042535216
-
Distinctive image features from scale-invariant keypoints
-
D. G. Lowe. Distinctive image features from scale-invariant keypoints. Int. J. Comput. Vision, 2004.
-
(2004)
Int. J. Comput. Vision
-
-
Lowe, D.G.1
-
21
-
-
84871989753
-
Defending against large-scale crawls in online social networks
-
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. Defending against large-scale crawls in online social networks. In CoNEXT'12.
-
CoNEXT'12
-
-
Mondal, M.1
Viswanath, B.2
Clement, A.3
Druschel, P.4
Gummadi, K.P.5
Mislove, A.6
Post, A.7
-
22
-
-
84970883593
-
-
Nairobiwire. Sonko's facebook impersonator arrested, 2014. http://nairobiwire.com/2014/07/mike-sonko-arrested-swindling-public.html?utmsource=rss&utmmedium=rss&utmcampaign=mike-sonko-arrested-swindling-public.
-
(2014)
Sonko's Facebook Impersonator Arrested
-
-
-
24
-
-
84970882423
-
-
Phash. http://www.phash.org.
-
-
-
-
25
-
-
84970870536
-
Bazaar: Strengthening user reputations in online marketplaces
-
A. Post, V. Shah, and A. Mislove. Bazaar: Strengthening user reputations in online marketplaces. In NSDI'11.
-
NSDI'11
-
-
Post, A.1
Shah, V.2
Mislove, A.3
-
27
-
-
84970884090
-
-
Social Intelligence Corp. http://www.socialintel.com/.
-
-
-
-
28
-
-
84970891418
-
-
Spokeo. http://www.spokeo.com/.
-
-
-
-
33
-
-
85029269023
-
Towards detecting anomalous user behavior in online social networks
-
B. Viswanath, M. A. Bashir, M. Crovella, S. Guha, K. Gummadi, B. Krishnamurthy, and A. Mislove. Towards detecting anomalous user behavior in online social networks. In USENIX Security'14.
-
USENIX Security'14
-
-
Viswanath, B.1
Bashir, M.A.2
Crovella, M.3
Guha, S.4
Gummadi, K.5
Krishnamurthy, B.6
Mislove, A.7
-
34
-
-
84954166274
-
-
April Last accessed Sept 6, 2015
-
B. Viswanath, M. A. Bashir, M. B. Zafar, L. Espin, K. P. Gummadi, and A. Mislove. Trulyfollowing: Discover twitter accounts with suspicious followers. http://trulyfollowing.app-ns.mpi-sws.org/, April 2012. Last accessed Sept 6, 2015.
-
(2012)
Trulyfollowing: Discover Twitter Accounts with Suspicious Followers
-
-
Viswanath, B.1
Bashir, M.A.2
Zafar, M.B.3
Espin, L.4
Gummadi, K.P.5
Mislove, A.6
-
35
-
-
84858031353
-
Exploring the design space of social network-based sybil defenses
-
B. Viswanath, M. Mondal, A. Clement, P. Druschel, K. Gummadi, A. Mislove, and A. Post. Exploring the design space of social network-based sybil defenses. In COMSNETS'12.
-
COMSNETS'12
-
-
Viswanath, B.1
Mondal, M.2
Clement, A.3
Druschel, P.4
Gummadi, K.5
Mislove, A.6
Post, A.7
-
37
-
-
84970882429
-
Social turing tests: Crowdsourcing sybil detection
-
G. Wang, M. Mohanlal, C. Wilson, X. Wang, M. J. Metzger, H. Zheng, and B. Y. Zhao. Social turing tests: Crowdsourcing sybil detection. In NDSS'13.
-
NDSS'13
-
-
Wang, G.1
Mohanlal, M.2
Wilson, C.3
Wang, X.4
Metzger, M.J.5
Zheng, H.6
Zhao, B.Y.7
-
40
-
-
84860570360
-
Detecting and analyzing automated activity on twitter
-
C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In PAM'11.
-
PAM'11
-
-
Zhang, C.M.1
Paxson, V.2
|