Technical perspective: When the adversary is your friend
Abstract
References
Index Terms
- Technical perspective: When the adversary is your friend
Recommendations
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam
Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the ...
Friend or frenemy?: predicting signed ties in social networks
SIGIR '12: Proceedings of the 35th international ACM SIGIR conference on Research and development in information retrievalWe study the problem of labeling the edges of a social network graph (e.g., acquaintance connections in Facebook) as either positive (i.e., trust, true friendship) or negative (i.e., distrust, possible frenemy) relations. Such signed relations provide ...
Comments
Information & Contributors
Information
Published In
Publisher
Association for Computing Machinery
New York, NY, United States
Publication History
Check for updates
Qualifiers
- Other
- Research
- Refereed
Contributors
Other Metrics
Bibliometrics & Citations
Bibliometrics
Article Metrics
- 0Total Citations
- 5,641Total Downloads
- Downloads (Last 12 months)146
- Downloads (Last 6 weeks)19
Other Metrics
Citations
View Options
View options
View or Download as a PDF file.
PDFeReader
View online with eReader.
eReaderDigital Edition
View this article in digital edition.
Digital EditionMagazine Site
View this article on the magazine site (external)
Magazine SiteLogin options
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in