Author:
Kim Tiffany Hyun-Jin,Gligor Virgil,Perrig Adrian
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Sophos Facebook ID Probe,
http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html
2. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: Proceedings of WWW (2009)
3. Economist. Duly notarised (September 2011),
http://www.economist.com/blogs/babbage/2011/09/internet-security
4. Edwards, J., Ogilvie, S.: Contract Enforcement, Institutions and Social Capital: the Maghribi Traders Reappraised. CSEIFO Working Paper (March 2008)
5. Friedkin, N.E.: A Test of Structural Features of Granovetter’s Strength of Weak Ties Theory. Social Networks (1980)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献