Sciweavers

71 search results - page 4 / 15
» Reverse Social Engineering Attacks in Online Social Networks
Sort
View
101
Voted
WWW
2009
ACM
16 years 1 months ago
Inferring private information using social network data
On-line social networks, such as Facebook, are increasingly utilized by many users. These networks allow people to publish details about themselves and connect to their friends. S...
Jack Lindamood, Raymond Heatherly, Murat Kantarcio...
116
Voted
CSCW
2008
ACM
15 years 2 months ago
Social networks and context-aware spam
Social networks are popular for online communities. This paper evaluates the risk of sophisticated context-aware spam that could result from information sharing on social networks...
Garrett Brown, Travis Howe, Micheal Ihbe, Atul Pra...
116
Voted
CCS
2009
ACM
16 years 1 months ago
The union-split algorithm and cluster-based anonymization of social networks
Knowledge discovery on social network data can uncover latent social trends and produce valuable findings that benefit the welfare of the general public. A growing amount of resea...
Brian Thompson, Danfeng Yao
ACSAC
2009
IEEE
15 years 7 months ago
Enabling Secure Secret Sharing in Distributed Online Social Networks
—We study a new application of threshold-based secret sharing in a distributed online social network (DOSN), where users need a means to back up and recover their private keys in...
Le-Hung Vu, Karl Aberer, Sonja Buchegger, Anwitama...
119
Voted
APSEC
2005
IEEE
15 years 6 months ago
Supporting Knowledge Collaboration Using Social Networks in a Large-Scale Online Community of Software Development Projects
The scale-free network shown in the small world phenomenon indicates that our human society consists of a small number of people who play the role of hubs linked with many nodes (...
Masao Ohira, Tetsuya Ohoka, Takeshi Kakimoto, Naok...