2010
DOI: 10.1109/mnet.2010.5578913
|View full text |Cite
|
Sign up to set email alerts
|

Understanding the behavior of malicious applications in social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
12
0

Year Published

2011
2011
2021
2021

Publication Types

Select...
3
3
3

Relationship

0
9

Authors

Journals

citations
Cited by 24 publications
(12 citation statements)
references
References 14 publications
0
12
0
Order By: Relevance
“…Therefore, noncooperative social networks can be modeled well by noncooperative multiagent technologies. Representative studies on noncooperative social networks are the following: [19], [62], [63].…”
Section: Noncooperative Social Networkmentioning
confidence: 99%
See 1 more Smart Citation
“…Therefore, noncooperative social networks can be modeled well by noncooperative multiagent technologies. Representative studies on noncooperative social networks are the following: [19], [62], [63].…”
Section: Noncooperative Social Networkmentioning
confidence: 99%
“…Currently, social networks are becoming more popular; a side-effect of this growth is that possible exploits can turn social networks into platforms for malicious activities [62]. There are two types of actors in an undependable social network: cooperator and defector.…”
Section: Undependable Actorsmentioning
confidence: 99%
“…Makridakis et al define the term "Antisocial Networks" that refer to distributed systems based on social networking web sites which can be exploited to carry out network attacks [19].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Makridakis et al [40] use a real application named 'Photo of the Day' to demonstrate how malicious apps on Facebook can launch DDoS attacks using the Facebook platform. King et al [34] conducted a survey to understand users' interaction with Facebook apps.…”
Section: Related Workmentioning
confidence: 99%