Analyzing Email Account Creation: Expectations vs Reality
暂无分享,去创建一个
[1] Chris Kanich,et al. Re: CAPTCHAs-Understanding CAPTCHA-Solving Services in an Economic Context , 2010, USENIX Security Symposium.
[2] Anupam Joshi,et al. Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy , 2013, WWW.
[3] Gianluca Stringhini,et al. COMPA: Detecting Compromised Accounts on Social Networks , 2013, NDSS.
[4] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[5] P. Kumaraguru,et al. $1.00 per RT #BostonMarathon #PrayForBoston: Analyzing fake content on Twitter , 2013, 2013 APWG eCrime Researchers Summit.
[6] Anupam Joshi,et al. @i seek 'fb.me': identifying users across multiple online social networks , 2013, WWW.
[7] Yuval Elovici,et al. Online Social Networks: Threats and Solutions Survey , 2013, ArXiv.