Social Network's Security Related to Healthcare

[1]  Gianluca Stringhini,et al.  Detecting spammers on social networks , 2010, ACSAC '10.

[2]  Kenneth G. Paterson,et al.  Security of Symmetric Encryption against Mass Surveillance , 2014, IACR Cryptol. ePrint Arch..

[3]  Leonie Ruth Simpson,et al.  Security and Privacy in eHealth: Is it possible? , 2013, 2013 IEEE 15th International Conference on e-Health Networking, Applications and Services (Healthcom 2013).

[5]  Chen-Nee Chuah,et al.  Unveiling facebook: a measurement study of social network based applications , 2008, IMC '08.

[6]  Habiba Chaoui,et al.  A security approach based on honeypots: Protecting Online Social network from malicious profiles , 2018, ArXiv.

[7]  Tomomi Aoyama,et al.  ICS Honeypot System (CamouflageNet) Based on Attacker's Human Factors☆ , 2015 .

[8]  Krishna P. Gummadi,et al.  Understanding and combating link farming in the twitter social network , 2012, WWW.

[9]  El Bouzekri El Idrissi Younes,et al.  A security approach for social networks based on honeypots , 2016 .

[10]  Guofei Gu,et al.  Analyzing spammers' social networks for fun and profit: a case study of cyber criminal ecosystem on twitter , 2012, WWW.

[11]  Bill Rosenblatt,et al.  The Digital Object Identifier: Solving the Dilemma of Copyright Protection Online , 1997 .

[12]  Minaxi Gupta,et al.  Twitter games: how successful spammers pick targets , 2012, ACSAC '12.

[13]  Kyumin Lee,et al.  The social honeypot project: protecting online communities from spammers , 2010, WWW '10.