Risk analysis of online social networks
暂无分享,去创建一个
[1] John Braun,et al. Internet security , 2001 .
[2] A. Acquisti,et al. Privacy in the Age of Augmented Reality , 2011 .
[3] Krishna P. Gummadi,et al. You are who you know: inferring user profiles in online social networks , 2010, WSDM '10.
[4] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[5] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[6] D. Boyd. Social Network Sites: Public Private or What? , 2007 .
[7] Wenke Lee,et al. xBook: Redesigning Privacy Control in Social Networking Platforms , 2009, USENIX Security Symposium.
[8] Deveeshree Nayak,et al. Information privacy risk assessment of Facebook Graph Search , 2014, 2014 Science and Information Conference.
[9] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[10] Yan Lindsay Sun,et al. Securing Digital Reputation in Online Social Media [Applications Corner] , 2014, IEEE Signal Processing Magazine.
[11] Ronald J. Deibert,et al. Hacking Networks of Terror , 2002 .
[12] C.-C. Jay Kuo,et al. Security and privacy in online social networks: A survey , 2011, 2011 IEEE International Conference on Multimedia and Expo.
[13] Nour E. Oweis,et al. A survey of Internet security risk over social networks , 2014, 2014 6th International Conference on Computer Science and Information Technology (CSIT).
[14] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[15] Monis Akhlaq,et al. Social networks and web security: Implications on open source intelligence , 2013, 2013 2nd National Conference on Information Assurance (NCIA).
[16] Yada Zhu,et al. Social Phishing , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[17] Peter Pecho,et al. Social Networks Security , 2009, 2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[18] Khaled El Emam,et al. Risk-Based De-Identification of Health Data , 2010, IEEE Secur. Priv..
[19] Mazdak Zamani,et al. Security Threats in Online Social Networks , 2013, 2013 International Conference on Informatics and Creative Multimedia.
[20] B. Yener,et al. Internet Security , 2003 .
[21] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[22] Yin Pan,et al. A social approach to security: Using social networks to help detect malicious web content , 2010, 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering.
[23] John C. Mitchell,et al. Client-Side Defense Against Web-Based Identity Theft , 2004, NDSS.
[24] Xi Chen,et al. Privacy Issues and Solutions in Social Network Sites , 2012, IEEE Technology and Society Magazine.
[25] Shui Yu,et al. Security and Privacy in Online Social Networks: A Survey , 2014, EAI Endorsed Trans. Ind. Networks Intell. Syst..
[26] Alec Wolman,et al. Lockr: better privacy for social networks , 2009, CoNEXT '09.
[27] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[28] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[29] Abdul Halim Zaim,et al. An Approach for Protecting Privacy on Social Networks , 2010, 2010 Fifth International Conference on Systems and Networks Communications.
[30] Lorenzo Martino,et al. Content Analysis of Privacy Policies for Health Social Networks , 2012, 2012 IEEE International Symposium on Policies for Distributed Systems and Networks.
[31] Jingquan Li,et al. Data Protection in Healthcare Social Networks , 2014, IEEE Software.
[32] Wei Xu,et al. Toward worm detection in online social networks , 2010, ACSAC '10.