WWW2009 EPrints

Items from Security and Privacy track

Up a level
Group by: No Grouping | Creators
Number of items: 6.

Balzarotti, Davide

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.

Bilge, Leyla

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.

Getoor, Lise

Zheleva, Elena and Getoor, Lise To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles.

Guha, Arjun

Guha, Arjun and Krishnamurthi, Shriram and Jim, Trevor Using Static Analysis for Ajax Intrusion Detection.

Hong, Jason I.

Xiang, Guang and Hong, Jason I. A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval.

Jim, Trevor

Guha, Arjun and Krishnamurthi, Shriram and Jim, Trevor Using Static Analysis for Ajax Intrusion Detection.

Kirda, Engin

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.

Krishnamurthi, Shriram

Guha, Arjun and Krishnamurthi, Shriram and Jim, Trevor Using Static Analysis for Ajax Intrusion Detection.

Krishnamurthy, Balachander

Krishnamurthy, Balachander and Wills, Craig Privacy Diffusion on the Web: A Longitudinal Perspective.

Paci, Federica

Squicciarini, Anna C. and Shehab, Mohamed and Paci, Federica Collective Privacy Management in Social Networks.

Shehab, Mohamed

Squicciarini, Anna C. and Shehab, Mohamed and Paci, Federica Collective Privacy Management in Social Networks.

Squicciarini, Anna C.

Squicciarini, Anna C. and Shehab, Mohamed and Paci, Federica Collective Privacy Management in Social Networks.

Strufe, Thorsten

Bilge, Leyla and Strufe, Thorsten and Balzarotti, Davide and Kirda, Engin All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks.

Wills, Craig

Krishnamurthy, Balachander and Wills, Craig Privacy Diffusion on the Web: A Longitudinal Perspective.

Xiang, Guang

Xiang, Guang and Hong, Jason I. A Hybrid Phish Detection Approach by Identity Discovery and Keywords Retrieval.

Zheleva, Elena

Zheleva, Elena and Getoor, Lise To Join or Not to Join: The Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles.

This list was generated on Fri Feb 15 08:40:30 2019 GMT.

About this site

This website has been set up for WWW2009 by Christopher Gutteridge of the University of Southampton, using our EPrints software.

Preservation

We (Southampton EPrints Project) intend to preserve the files and HTML pages of this site for many years, however we will turn it into flat files for long term preservation. This means that at some point in the months after the conference the search, metadata-export, JSON interface, OAI etc. will be disabled as we "fossilize" the site. Please plan accordingly. Feel free to ask nicely for us to keep the dynamic site online longer if there's a rally good (or cool) use for it... [this has now happened, this site is now static]