-
1
-
-
84855680528
-
The real face of koobface: The largest web 2.0 botnet explained
-
July
-
J. Baltazar, J. Costoya, and R. Flores. The real face of Koobface: The largest web 2.0 botnet explained. Trend Micro Research, July 2009.
-
(2009)
Trend Micro Research
-
-
Baltazar, J.1
Costoya, J.2
Flores, R.3
-
2
-
-
79953102821
-
Twitter mood predicts the stock market
-
J. Bollen, H. Mao, and X. Zeng. Twitter mood predicts the stock market. Journal of Computational Science, 2(1):1 – 8, 2011.
-
(2011)
Journal of Computational Science
, vol.2
, Issue.1
, pp. 1-8
-
-
Bollen, J.1
Mao, H.2
Zeng, X.3
-
3
-
-
84855692796
-
The socialbot network: When bots socialize for fame and money
-
New York, NY, USA, ACM
-
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC’11, pages 93–102, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC’11
, pp. 93-102
-
-
Boshmaf, Y.1
Muslukhov, I.2
Beznosov, K.3
Ripeanu, M.4
-
7
-
-
70849122971
-
Towards automating social engineering using social networking sites
-
M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa. Towards automating social engineering using social networking sites. Computational Science and Engineering, IEEE International Conference on, 3:117–124, 2009.
-
(2009)
Computational Science and Engineering, IEEE International Conference on
, vol.3
, pp. 117-124
-
-
Huber, M.1
Kowalski, S.2
Nohlberg, M.3
Tjoa, S.4
-
8
-
-
34848911641
-
Social phishing
-
T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94–100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.N.1
Johnson, N.A.2
Jakobsson, M.3
Menczer, F.4
-
9
-
-
82955190606
-
Analyzing facebook privacy settings: User expectations vs. Reality
-
New York, NY, USA, ACM
-
Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: user expectations vs. reality. In Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, IMC’11, pages 61–70, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC’11
, pp. 61-70
-
-
Liu, Y.1
Gummadi, K.P.2
Krishnamurthy, B.3
Mislove, A.4
-
10
-
-
32344435632
-
Adversarial learning
-
New York, NY, USA, ACM
-
D. Lowd and C. Meek. Adversarial learning. In Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining, KDD’05, pages 641–647, New York, NY, USA, 2005. ACM.
-
(2005)
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, KDD’05
, pp. 641-647
-
-
Lowd, D.1
Meek, C.2
-
11
-
-
41949086982
-
The venn of identity: Options and issues in federated identity management
-
E. Maler and D. Reed. The venn of identity: Options and issues in federated identity management. IEEE Security and Privacy, 6:16–23, 2008.
-
(2008)
IEEE Security and Privacy
, vol.6
, pp. 16-23
-
-
Maler, E.1
Reed, D.2
-
12
-
-
80053160731
-
Limiting large-scale crawls of social networking sites
-
New York, NY, USA, ACM
-
M. Mondal, B. Viswanath, A. Clement, P. Druschel, K. P. Gummadi, A. Mislove, and A. Post. Limiting large-scale crawls of social networking sites. In Proceedings of the ACM SIGCOMM 2011 conference on SIGCOMM, SIGCOMM’11, pages 398–399, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the ACM SIGCOMM 2011 Conference on SIGCOMM, SIGCOMM’11
, pp. 398-399
-
-
Mondal, M.1
Viswanath, B.2
Clement, A.3
Druschel, P.4
Gummadi, K.P.5
Mislove, A.6
Post, A.7
-
13
-
-
85076285223
-
Re: CapTChas: Understanding captchasolving services in an economic context
-
Berkeley, CA, USA, USENIX Association
-
M. Motoyama, K. Levchenko, C. Kanich, D. McCoy, G. M. Voelker, and S. Savage. Re: Captchas: understanding captchasolving services in an economic context. In Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, pages 28–28, Berkeley, CA, USA, 2010. USENIX Association.
-
(2010)
Proceedings of the 19th USENIX Conference on Security, USENIX Security’10
, pp. 28
-
-
Motoyama, M.1
Levchenko, K.2
Kanich, C.3
McCoy, D.4
Voelker, G.M.5
Savage, S.6
-
15
-
-
79955135282
-
Truthy: Mapping the spread of astroturf in microblog streams
-
New York, NY, USA, ACM
-
J. Ratkiewicz, M. Conover, M. Meiss, B. Gonçalves, S. Patil, A. Flammini, and F. Menczer. Truthy: mapping the spread of astroturf in microblog streams. In Proceedings of the 20th international conference companion on World wide web, WWW’11, pages 249–252, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 20th International Conference Companion on World Wide Web, WWW’11
, pp. 249-252
-
-
Ratkiewicz, J.1
Conover, M.2
Meiss, M.3
Gonçalves, B.4
Patil, S.5
Flammini, A.6
Menczer, F.7
-
16
-
-
79959891780
-
Facebook immune system
-
New York, NY, USA, ACM
-
T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS’11, pages 8:1–8:8, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 4th Workshop on Social Network Systems, SNS’11
, pp. 81-88
-
-
Stein, T.1
Chen, E.2
Mangla, K.3
-
17
-
-
78751502334
-
Detecting spammers on social networks
-
New York, NY, USA, ACM
-
G. Stringhini, C. Kruegel, and G. Vigna. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC’10, pages 1–9, New York, NY, USA, 2010. ACM.
-
(2010)
Proceedings of the 26th Annual Computer Security Applications Conference, ACSAC’10
, pp. 1-9
-
-
Stringhini, G.1
Kruegel, C.2
Vigna, G.3
-
18
-
-
78751558943
-
A billion keys, but few locks: The crisis of web single sign-on
-
September 20–22
-
S.-T. Sun, Y. Boshmaf, K. Hawkey, and K. Beznosov. A Billion Keys, but Few Locks: The Crisis of Web Single Sign-On. In Proceedings of the New Security Paradigms Workshop (NSPW), pages 61–72, September 20–22 2010.
-
(2010)
Proceedings of the New Security Paradigms Workshop (NSPW)
, pp. 61-72
-
-
Sun, S.-T.1
Boshmaf, Y.2
Hawkey, K.3
Beznosov, K.4
-
19
-
-
84968906807
-
-
January
-
The Web Ecology Project. The 2011 socialbots competition. http://www.webecologyproject.org/category/competition/, January 2011.
-
(2011)
The 2011 Socialbots Competition
-
-
-
21
-
-
35248831179
-
CAPTCHA: Using hard AI problems for security
-
L. von Ahn, M. Blum, N. J. Hopper, and J. Langford. Captcha: Using hard AI problems for security. In EUROCRYPT, pages 294–311, 2003.
-
(2003)
EUROCRYPT
, pp. 294-311
-
-
von Ahn, L.1
Blum, M.2
Hopper, N.J.3
Langford, J.4
-
22
-
-
79956032303
-
Malware propagation in online social networks: Nature, dynamics, and defense implications
-
New York, NY, USA, ACM
-
G. Yan, G. Chen, S. Eidenbenz, and N. Li. Malware propagation in online social networks: nature, dynamics, and defense implications. In Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11, pages 196–206, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS ’11
, pp. 196-206
-
-
Yan, G.1
Chen, G.2
Eidenbenz, S.3
Li, N.4
-
23
-
-
82955161549
-
Uncovering social network sybils in the wild
-
Berlin, Germany, November
-
Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. In IMC, Berlin, Germany, November 2011.
-
(2011)
IMC
-
-
Yang, Z.1
Wilson, C.2
Wang, X.3
Gao, T.4
Zhao, B.Y.5
Dai, Y.6
-
24
-
-
84858064917
-
Sybil defenses via social networks: A tutorial and survey
-
October
-
H. Yu. Sybil defenses via social networks: a tutorial and survey. SIGACT News, 42:80–101, October 2011.
-
(2011)
SIGACT News
, vol.42
, pp. 80-101
-
-
Yu, H.1
-
25
-
-
79952907127
-
Detecting and analyzing automated activity on twitter
-
Berlin, Heidelberg, Springer-Verlag
-
C. M. Zhang and V. Paxson. Detecting and analyzing automated activity on twitter. In Proceedings of the 12th international conference on Passive and active measurement, PAM’11, pages 102–111, Berlin, Heidelberg, 2011. Springer-Verlag.
-
(2011)
Proceedings of the 12th International Conference on Passive and Active Measurement, PAM’11
, pp. 102-111
-
-
Zhang, C.M.1
Paxson, V.2
|