Exploiting social networking sites for spam
暂无分享,去创建一个
[1] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[2] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[3] Edgar R. Weippl,et al. Who on Earth Is "Mr. Cypher": Automated Friend Injection Attacks on Social Networking Sites , 2010, SEC.
[4] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[5] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[6] Frank Stajano,et al. Eight friends are enough: social graph approximation via public listings , 2009, SNS '09.
[7] Chen-Nee Chuah,et al. Unveiling facebook: a measurement study of social network based applications , 2008, IMC '08.
[8] Stewart Kowalski,et al. Towards Automating Social Engineering Using Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[9] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.