Sciweavers

71 search results - page 5 / 15
» Reverse Social Engineering Attacks in Online Social Networks
Sort
View
INFOCOM
2006
IEEE
13 years 11 months ago
Utility-Optimal Medium Access Control: Reverse and Forward Engineering
— This paper analyzes and designs medium access control (MAC) protocols for wireless ad-hoc networks through the network utility maximization (NUM) framework. We first reverse-e...
Jang-Won Lee, Mung Chiang, A. Robert Calderbank
CSE
2009
IEEE
14 years 1 days ago
Predicting Interests of People on Online Social Networks
—We introduce a new data set which contains both a self-declared friendship network and self-chosen attributes from a finite list defined by the social networking site. We prop...
Apoorv Agarwal, Owen Rambow, Nandini Bhardwaj
CSE
2009
IEEE
14 years 1 days ago
Web Science 2.0: Identifying Trends through Semantic Social Network Analysis
—We introduce a novel set of social network analysis based algorithms for mining the Web, blogs, and online forums to identify trends and find the people launching these new tren...
Peter A. Gloor, Jonas Krauss, Stefan Nann, Kai Fis...
CIKM
2008
Springer
13 years 7 months ago
Topological analysis of an online social network for older adults
Social network systems on the Internet, such MySpace and LinkedIn, are growing in popularity around the world. The level of such activity is now comparable to that associated with...
Marcella Wilson, Charles K. Nicholas
CSE
2009
IEEE
14 years 1 days ago
All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks
Recent research identifies a growing privacy problem that exists within Online Social Networks (OSNs). Several studies have shown how easily strangers can extract personal data a...
Lerone Banks, Shyhtsun Felix Wu