Social networks and context-aware spam
暂无分享,去创建一个
Kevin Borders | Atul Prakash | Garrett Brown | Travis Howe | Micheal Ihbe | A. Prakash | Kevin Borders | Garrett Brown | Travis Howe | Micheal Ihbe
[1] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[2] Starr Roxanne Hiltz,et al. Trust and Privacy Concern Within Social Networking Sites: A Comparison of Facebook and MySpace , 2007, AMCIS.
[3] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[4] Laura A. Dabbish,et al. Labeling images with a computer game , 2004, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.
[5] Laura A. Dabbish,et al. ESP: Labeling Images with a Computer Game , 2005, AAAI Spring Symposium: Knowledge Collection from Volunteer Contributors.
[6] Stephanie Forrest,et al. Email networks and the spread of computer viruses. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[7] Brian W. Rogers,et al. Meeting Strangers and Friends of Friends: How Random are Social Networks? , 2007 .
[8] Danah Boyd,et al. Friendster and publicly articulated social networking , 2004, CHI EA '04.
[9] Steven Furnell,et al. Malware Evolution: Malware comes of age: The arrival of the true computer parasite , 2004 .
[10] Alex Tsow. Deceit and Deception : A Large User Study of Phishing , 2007 .
[11] Cliff Lampe,et al. A face(book) in the crowd: social Searching vs. social browsing , 2006, CSCW '06.
[12] Cliff Lampe,et al. A familiar face(book): profile elements as signals in an online social network , 2007, CHI.
[13] Markus Jakobsson,et al. Designing ethical phishing experiments: a study of (ROT13) rOnl query features , 2006, WWW '06.
[14] M. Jackson. A Survey of Models of Network Formation: Stability and Efficiency , 2003 .
[15] A. Barabasi,et al. Scale-free characteristics of random networks: the topology of the world-wide web , 2000 .