Game theoretic attack analysis in Online Social Network (OSN) services
暂无分享,去创建一个
[1] Edgar R. Weippl,et al. Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam , 2011, IEEE Internet Computing.
[2] Joon S. Park,et al. Fine-Grained and Scalable Message Protection in Sensitive Organizations , 2007, J. Softw..
[3] Roberto Battiti,et al. Social Networking and Game Theory to foster Cooperation , 2007 .
[4] Christos Faloutsos,et al. Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining , 2013, ASONAM 2013.
[5] Slava Kisilevich,et al. Analysis of privacy in online social networks of runet , 2010, SIN.
[6] Anna Cinzia Squicciarini,et al. Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results , 2012, 2012 IEEE Symposium on Security and Privacy Workshops.
[7] Yuguang Fang,et al. Privacy and security for online social networks: challenges and opportunities , 2010, IEEE Network.
[8] Calton Pu,et al. Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks , 2011, IEEE Internet Computing.
[9] Joon S. Park,et al. A game theoretic approach for modeling optimal data sharing on Online Social Networks , 2012, 2012 9th International Conference on Electrical Engineering, Computing Science and Automatic Control (CCE).
[10] Joon S. Park,et al. Towards trusted data management in online social network (OSN) services , 2012, World Congress on Internet Security (WorldCIS-2012).
[11] Joon S. Park,et al. Optimal State Management of Data Sharing in Online Social Network (OSN) Services , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.
[12] Jun Hu,et al. Security Issues in Online Social Networks , 2011, IEEE Internet Computing.
[13] Jing Liu,et al. An Analysis of Security in Social Networks , 2009, 2009 Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing.
[14] Michael Netter,et al. Analyzing Privacy in Social Networks--An Interdisciplinary Approach , 2011, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing.
[15] Na Li,et al. Preserving Relation Privacy in Online Social Network Data , 2011, IEEE Internet Computing.
[16] Joon S. Park,et al. Active access control (AAC) with fine-granularity and scalability , 2011, Secur. Commun. Networks.