Author:
He Bing-Zhe,Chen Chien-Ming,Su Yi-Ping,Sun Hung-Min
Subject
Artificial Intelligence,Computer Science Applications,General Engineering
Reference35 articles.
1. Alexa: Top 500 Global Sites. .
2. A study of social engineering in online frauds;Atkins;Open Journal of Social Sciences,2013
3. Balduzzi, M., Platzer, C., Holz, T., Kirda, E., Balzarotti, D., & Kruegel, C. (2010). Abusing social networks for automated user profiling. In Recent Advances in Intrusion Detection, LNCS, (vol. 6307, pp. 422–441).
4. Adaptive agents, intelligence, and emergent human organization: Capturing complexity through agent-based modeling;Berry;Proceedings of the National Academy of Sciences of the United States of America,2002
5. Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009). All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web, WWW ’09 (pp. 551–560).
Cited by
37 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献