Author:
Kim Tiffany Hyun-Jin,Yamada Akira,Gligor Virgil,Hong Jason,Perrig Adrian
Publisher
Springer Berlin Heidelberg
Reference14 articles.
1. Sophos Facebook ID Probe,
http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html
2. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: Proceedings of WWW (2009)
3. Economist. Duly notarised (September 2011),
http://www.economist.com/blogs/babbage/2011/09/internet-security
4. Granovetter, M.S.: The Strength of Weak Ties. The American Journal of Socialogy 78(6), 1360–1380 (1973)
5. Hamiel, N., Moyer, S.: Satan Is on My Friends List: Attacking Social Networks. In: Black Hat Conference (2008)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Testing Assessment of Group Collaborations in OSNs;Lecture Notes in Social Networks;2018-09-18
2. Harvesting the low-hanging fruits;Proceedings of the 2016 New Security Paradigms Workshop;2016-09-26
3. Thwarting Fake OSN Accounts by Predicting their Victims;Proceedings of the 8th ACM Workshop on Artificial Intelligence and Security;2015-10-16
4. "You Never Call, You Never Write";Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing;2015-02-28
5. Challenges of Establishing Trust in Online Entities and Beyond;Proceedings of the 4th International Workshop on Trustworthy Embedded Devices - TrustED '14;2014