Sciweavers

170 search results - page 4 / 34
» A Practical Attack to De-anonymize Social Network Users
Sort
View
CSE
2009
IEEE
14 years 1 months ago
Large Online Social Footprints-An Emerging Threat
—We study large online social footprints by collecting data on 13,990 active users. After parsing data from 10 of the 15 most popular social networking sites, we find that a use...
Danesh Irani, Steve Webb, Kang Li, Calton Pu
SOCINFO
2010
13 years 4 months ago
Social Manipulation of Online Recommender Systems
Abstract. Online recommender systems are a common target of attack. Existing research has focused on automated manipulation of recommender systems through the creation of shill acc...
Juan Lang, Matt Spear, Shyhtsun Felix Wu
SAC
2010
ACM
14 years 1 months ago
CAPTCHA smuggling: hijacking web browsing sessions to create CAPTCHA farms
CAPTCHAs protect online resources and services from automated access. From an attacker’s point of view, they are typically perceived as an annoyance that prevents the mass creat...
Manuel Egele, Leyla Bilge, Engin Kirda, Christophe...
GLOBECOM
2010
IEEE
13 years 4 months ago
Practical Defenses for Evil Twin Attacks in 802.11
Open-access 802.11 wireless networks are commonly deployed in cafes, bookstores, and other public spaces to provide free Internet connectivity. These networks are convenient to dep...
Harold Gonzales, Kevin S. Bauer, Janne Lindqvist, ...
CSCW
2008
ACM
13 years 8 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...