Privacy and Security Issues in Online Social Networks
暂无分享,去创建一个
Mohsen Guizani | Naveed Islam | Joel J. P. C. Rodrigues | Ikram Ud Din | Azhar Rauf | Shaukat Ali | M. Guizani | Shaukat Ali | I. Din | J. Rodrigues | Azhar Rauf | N. Islam
[1] Ali Feizollah,et al. The Evolution of Android Malware and Android Analysis Techniques , 2017, ACM Comput. Surv..
[2] Catherine Everett. Social media: opportunity or risk? , 2010 .
[3] Arun Vishwanath,et al. Getting phished on social media , 2017, Decis. Support Syst..
[4] H. Nissenbaum. Privacy as contextual integrity , 2004 .
[5] Sándor Imre,et al. An Efficient and Robust Social Network De-anonymization Attack , 2016, WPES@CCS.
[6] Sotiris Ioannidis,et al. Understanding the behavior of malicious applications in social networks , 2010, IEEE Network.
[7] Krishna P. Gummadi,et al. Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.
[8] Monika Taddicken,et al. The 'Privacy Paradox' in the Social Web: The Impact of Privacy Concerns, Individual Characteristics, and the Perceived Social Relevance on Different Forms of Self-Disclosure1 , 2014, J. Comput. Mediat. Commun..
[9] Georgia Koutrika,et al. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.
[10] Konstantin Beznosov,et al. Design and analysis of a social botnet , 2013, Comput. Networks.
[11] Weining Zhang,et al. Privacy and security concern of online social networks from user perspective , 2015, 2015 International Conference on Information Systems Security and Privacy (ICISSP).
[12] Danah Boyd,et al. Networked privacy: How teenagers negotiate context in social media , 2014, New Media Soc..
[13] Y. Elovici,et al. Strangers Intrusion Detection - Detecting Spammers and Fake Proles in Social Networks Based on Topology Anomalies , 2012 .
[14] Mudasir Ahmad Wani,et al. A sneak into the Devil's Colony - Fake Profiles in Online Social Networks , 2017, ArXiv.
[15] Bhavani M. Thuraisingham,et al. Semantic web-based social network access control , 2011, Comput. Secur..
[16] S. Santhosinidevi,et al. Towards Detecting Compromised Accounts on Social Networks , 2018 .
[17] Yue Xu,et al. Toward Detecting Malicious Links in Online Social Networks through User Behavior , 2016, 2016 IEEE/WIC/ACM International Conference on Web Intelligence Workshops (WIW).
[18] Sadaf Ashtari. I Know Who You Are and I Saw What You Did: Social Networks and the Death of Privacy , 2013 .
[20] Brij Bhooshan Gupta,et al. Cross-Site Scripting (XSS) attacks and defense mechanisms: classification and state-of-the-art , 2017, Int. J. Syst. Assur. Eng. Manag..
[21] Dawn Xiaodong Song,et al. Design and Evaluation of a Real-Time URL Spam Filtering Service , 2011, 2011 IEEE Symposium on Security and Privacy.
[22] Steven M. Bellovin,et al. A study of privacy settings errors in an online social network , 2012, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops.
[23] C. Fuchs,et al. Towards a theoretical model of social media surveillance in contemporary society , 2015 .
[24] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[25] Yuval Elovici,et al. Online Social Networks: Threats and Solutions , 2013, IEEE Communications Surveys & Tutorials.
[26] Niels Provos,et al. The Ghost in the Browser: Analysis of Web-based Malware , 2007, HotBots.
[27] Dominique Peyrat-Guillard,et al. Cultural and generational influences on privacy concerns: a qualitative study in seven European countries , 2014, Eur. J. Inf. Syst..
[28] Lee Humphreys,et al. Mobile Social Networks and Social Practice: A Case Study of Dodgeball , 2007, J. Comput. Mediat. Commun..
[29] Konstantin Beznosov,et al. Privacy Aspects of Health Related Information Sharing in Online Social Networks , 2013, HealthTech.
[30] Haleem Farman,et al. User Profiling: A Privacy Issue in Online Public Network , 2017 .
[31] Mohammad-Reza Khayyambashi,et al. A New Approach for Finding Cloned Profiles in Online Social Networks , 2014, ArXiv.
[32] C. Malarvizhi,et al. A Survey on Detection and Prevention of Cross-Site Scripting Attack , 2015 .
[33] V. Paxson,et al. The Underground on 140 Characters or Less ∗ , 2010 .
[34] Heather Richter Lipford,et al. Examining privacy and disclosure in a social networking community , 2007, SOUPS '07.
[35] Yuan Ding,et al. A Closer Look at Third-Party OSN Applications: Are They Leaking Your Personal Information? , 2014, PAM.
[36] Janice Penni,et al. The future of online social networks (OSN): A measurement analysis using social media tools and application , 2017, Telematics Informatics.
[37] A. Kaplan,et al. Users of the world, unite! The challenges and opportunities of Social Media , 2010 .
[38] A. Walker,et al. Exploring Cyber Harrassment among Women Who Use Social Media , 2015 .
[39] Vern Paxson,et al. @spam: the underground on 140 characters or less , 2010, CCS '10.
[40] Mark N. Bing,et al. To Screen or Not to Screen? Using the Internet for Selection Decisions , 2011, Employee Responsibilities and Rights Journal.
[41] Ming Gu,et al. A Brief Survey on De-anonymization Attacks in Online Social Networks , 2010, 2010 International Conference on Computational Aspects of Social Networks.
[42] Jun Hu,et al. Detecting and characterizing social spam campaigns , 2010, IMC '10.
[43] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[44] Shaik. AshaBee,et al. Towards Online Spam Filtering In Social Networks , 2017 .
[45] Bhavani M. Thuraisingham,et al. Preventing Private Information Inference Attacks on Social Networks , 2013, IEEE Transactions on Knowledge and Data Engineering.
[46] Khalil El-Khatib,et al. Phishing Susceptibility Detection through Social Media Analytics , 2016, SIN.
[47] Jonathan A. Obar,et al. Social Media Definition and the Governance Challenge: An Introduction to the Special Issue , 2015 .
[48] Uyen Trang Nguyen,et al. A Study of XSS Worm Propagation and Detection Mechanisms in Online Social Networks , 2013, IEEE Transactions on Information Forensics and Security.