Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam
暂无分享,去创建一个
[1] Leyla Bilge,et al. All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.
[2] Qi Xie,et al. FaceCloak: An Architecture for User Privacy on Social Networking Sites , 2009, 2009 International Conference on Computational Science and Engineering.
[3] M. Newman. Power laws, Pareto distributions and Zipf's law , 2004, cond-mat/0412004.
[4] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[5] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[6] Edgar Weippl,et al. Friend-inthe-middle Attacks Technical Report TR-SBA-Research-0710-01 , 2010 .
[7] Nikita Borisov,et al. FlyByNight: mitigating the privacy risks of social networking , 2008, WPES '08.
[8] Ben Y. Zhao,et al. User interactions in social networks and their implications , 2009, EuroSys '09.
[9] Frank Stajano,et al. Eight friends are enough: social graph approximation via public listings , 2009, SNS '09.
[10] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[11] Minas Gjoka,et al. Walking in Facebook: A Case Study of Unbiased Sampling of OSNs , 2010, 2010 Proceedings IEEE INFOCOM.
[12] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[13] Georgia Koutrika,et al. Fighting Spam on Social Web Sites: A Survey of Approaches and Future Challenges , 2007, IEEE Internet Computing.