Hunting organization-targeted socialbots
暂无分享,去创建一个
[1] Lior Rokach,et al. Intruder or Welcome Friend: Inferring Group Membership in Online Social Networks , 2013, SBP.
[2] Lisa Singh,et al. Can Friends Be Trusted? Exploring Privacy in Online Social Networks , 2009, 2009 International Conference on Advances in Social Network Analysis and Mining.
[3] Rami Puzis,et al. TONIC: Target Oriented Network Intelligence Collection for the Social Web , 2013, AAAI.
[4] Shanton Chang,et al. Information Leakage through Online Social Networking: Opening the Doorway for Advanced Persistence Threats , 2010, AISM 2010.
[5] Thomas W. McAvoy. DON'T FOLLOW ME , 2009 .
[6] Colin Tankard,et al. Advanced Persistent threats and how to monitor and deter them , 2011, Netw. Secur..
[7] Dongho Won,et al. A Practical Study on Advanced Persistent Threats , 2012 .
[8] Calton Pu,et al. Social Honeypots: Making Friends With A Spammer Near You , 2008, CEAS.
[9] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[10] Calton Pu,et al. A social-spam detection framework , 2011, CEAS '11.
[11] Yuval Elovici,et al. Organizational Intrusion: Organization Mining Using Socialbots , 2012, 2012 International Conference on Social Informatics.
[12] Yuval Elovici,et al. Homing Socialbots: Intrusion on a specific organization's employee using Socialbots , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).
[13] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[14] Oscar Serrano Serrano,et al. Changing the game: The art of deceiving sophisticated attackers , 2014, 2014 6th International Conference On Cyber Conflict (CyCon 2014).
[15] Jure Leskovec,et al. Defining and evaluating network communities based on ground-truth , 2012, Knowledge and Information Systems.
[16] Gianluca Stringhini,et al. Detecting spammers on social networks , 2010, ACSAC '10.
[17] Rajeev Motwani,et al. The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.
[18] Erdong Chen,et al. Facebook immune system , 2011, SNS '11.
[19] Rami Puzis,et al. Anti-Reconnaissance Tools: Detecting Targeted Socialbots , 2014, IEEE Internet Computing.
[20] Konstantin Beznosov,et al. The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.
[21] Alex Hai Wang,et al. Don't follow me: Spam detection in Twitter , 2010, 2010 International Conference on Security and Cryptography (SECRYPT).
[22] Stefan Burr,et al. The Mathematics of networks , 1982 .