

Extending Social Privacy Protector for Twitter Social Network
Abstract
Keywords
References
M..Madden and K. Zickuhr. (2011), Online adults use social networking sites(Online) Available: http://www. pewinternet .org
Facebook-Newsroom, Available : http://www.Facebook.com.
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “The socialbot network: when bots socialize for fame and money (Published Conference Proceedings style),” in proc. 27th Annu. ACM Conf. Computer Security Applications; 2011, pp. 93–102.
M. Egele, A. Moser, C. Kruegel, and E. Kirda, “Pox: Protecting users from malicious Facebook applications in Pervasive Computing and Communications (Presented Conference Paper style),” presented at the IEEE Conf.2011, pp. 288–294.
Y. Liu, K. Gummadi, B. Krishnamurthy, and A. Mislove, “Analyzing Facebook privacy settings: User expectations vs. Reality (Published Conference Proceedings style),” in Proc. ACM SIGCOMM conf. Internet Meaurement; 2011, pp.61–70.
G. Stringhini, C. Kruegel, and G. Vigna, “Detecting spammers on social networks(Published Conference Proceedings),” in Proc. 26th Annu. ACM Conf. Computer Security Applications; 2010, pp. 1–9.
S. Nelson, J. Simek, and J. Foltin, The legal implications of social networking(Book style), Regent UL Rev., 2009,vol. 22, pp. 1–481.
Facebook, Available: http://www.sec.gov
J. Kuzma, “Account creation security of social network sites (Book style),” in International Journal of Applied Science and Technology, vol. 1, no. 3, pp. 8–13, 2011.
S. Mahmood and Y. Desmedt, “Poster: preliminary analysis of google+‟s privacy ( Published Conference Proceedings style),” in Proc. 18th Annu. ACM Conf. Computer and Communications Security: 2011, pp809-–812.
D. DeBarr and H. Wechsler, Using social network analysis for spam detection( Book style). Advance in Social Computing,, 2010. pp.62–69.
A. Wang, “Don‟t follow me: Spam detection in twitter in Security and Cryptography(Published Conference Proceedings style),” in Proc. IEEE Conf., 2010, pp. 1–10.
K. Lee, J. Caverlee, and S. Webb, “Uncovering social spammers: social honeypots+ machine learning Published Conference Proceedings style),” in Proc. 33rd Annu. ACM SIGIR conf. Research and development in information retrieval: 2010, pp.435–442.
M.Fire, G. Katz, and Y. Elovici, Strangers intrusion detection detecting spammers and fake profiles in social networks based on topology anomalies, 2011.
M. Anwar and P. Fong, A visualization tool for evaluating access control policies in social network systems , 2012.
Refbacks
- There are currently no refbacks.

This work is licensed under a Creative Commons Attribution 3.0 License.