Using social networks to harvest email addresses
暂无分享,去创建一个
Evangelos P. Markatos | Spyros Antonatos | Iasonas Polakis | Georgios Kontaxis | Thanasis Petsas | Eleni Gessiou | S. Antonatos | E. Markatos | Iasonas Polakis | Thanasis Petsas | Eleni Gessiou | Georgios Kontaxis
[1] Cecilia Mascolo,et al. Temporal distance metrics for social network analysis , 2009, WOSN '09.
[2] Arthur M. Keller,et al. Understanding How Spammers Steal Your E-Mail Address: An Analysis of the First Six Months of Data from Project Honey Pot , 2005, CEAS.
[3] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[4] Craig A. Shue,et al. Spamology: A Study of Spam Origins , 2009 .
[5] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[6] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[7] Andrew D Smith. NIGERIAN SCAM E-MAILS AND THE CHARMS OF CAPITAL , 2009 .
[8] Lei Li,et al. Inferring privacy information via social relations , 2008, 2008 IEEE 24th International Conference on Data Engineering Workshop.
[9] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.
[10] Chris Kanich,et al. On the Spam Campaign Trail , 2008, LEET.
[11] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[12] Geoff Hulten,et al. Spamming botnets: signatures and characteristics , 2008, SIGCOMM '08.
[13] Balachander Krishnamurthy,et al. A few chirps about twitter , 2008, WOSN '08.
[14] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.