Author:
White Jonathan,Park Joon S.,Kamhoua Charles A.,Kwiat Kevin A.
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Human-Computer Interaction,Media Technology,Communication,Information Systems
Reference30 articles.
1. Ahn G-J, Shehab M, Squicciarini A (2011) Security and privacy in social networks. Internet Comput IEEE 15(3):10–12
2. Cascella R, Battiti R (2007) Social Networking and Game Theory to foster Cooperation. In: 2nd ENISA Workshop on Authentication Interoperability Languages, Paris, France, June 12–13
3. Chinchani R, Iyer A, Ngo S, Upadhayaya S (2005) Towards a theory of insider threat assessment. In: DSN 2005 Proceedings of the 2005 International Conference of the Dependable Systems and Networks, Yokohama, Japan, June 28–July 1
4. Dhillon G (2001) Violation of safeguards by trusted personnel and understanding related information security concerns. Comput Secur 20:165–172
5. Gao H, Hu J, Huang T, Wang J, Chen Y (2011) Security issues in online social networks. Internet Comput IEEE 15(4):56–63
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献