1. SoK: the evolution of sybil defense via social networks;Alvisi,2013
2. Anatomy of an attack. Available online: http://blogs.rsa.com/anatomy-of-an-attack/ [last accessed 17.07.13].
3. Privacy aspects of mashup architecture;Bader,2010
4. Abusing social networks for automated user profiling;Balduzzi,2010
5. Byod: bring your own device;Ballagas,2004