Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)

Published: 01 November 2011 Publication History

Abstract

Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft.

Cited By

View all
  • (2016)If it looks like a spammer and behaves like a spammer, it must be a spammerInternational Journal of Information Security10.1007/s10207-016-0321-515:5(475-491)Online publication date: 1-Oct-2016
  • (2014)TwitterProceedings of the 2014 ACM conference on Web science10.1145/2615569.2615688(33-41)Online publication date: 23-Jun-2014
  • (2013)Detecting anomalous behaviors using structural properties of social networksProceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction10.1007/978-3-642-37210-0_47(433-440)Online publication date: 2-Apr-2013

Recommendations

Comments

Information & Contributors

Information

Published In

cover image IEEE Intelligent Systems
IEEE Intelligent Systems  Volume 26, Issue 6
November 2011
95 pages

Publisher

IEEE Educational Activities Department

United States

Publication History

Published: 01 November 2011

Author Tags

  1. advanced persistent threat
  2. intelligent systems
  3. malware
  4. mobile networks security
  5. social and economic computing
  6. stealth attacks

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 13 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2016)If it looks like a spammer and behaves like a spammer, it must be a spammerInternational Journal of Information Security10.1007/s10207-016-0321-515:5(475-491)Online publication date: 1-Oct-2016
  • (2014)TwitterProceedings of the 2014 ACM conference on Web science10.1145/2615569.2615688(33-41)Online publication date: 23-Jun-2014
  • (2013)Detecting anomalous behaviors using structural properties of social networksProceedings of the 6th international conference on Social Computing, Behavioral-Cultural Modeling and Prediction10.1007/978-3-642-37210-0_47(433-440)Online publication date: 2-Apr-2013

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media