{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,5]],"date-time":"2025-12-05T12:13:21Z","timestamp":1764936801761,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319200613"},{"type":"electronic","value":"9783319200620"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20062-0_10","type":"book-chapter","created":{"date-parts":[[2015,10,18]],"date-time":"2015-10-18T23:31:51Z","timestamp":1445211111000},"page":"195-209","source":"Crossref","is-referenced-by-count":15,"title":["Security and Privacy Issues in Social Networks"],"prefix":"10.1007","author":[{"given":"Sepideh","family":"Deliri","sequence":"first","affiliation":[]},{"given":"Massimiliano","family":"Albanese","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"Ashford, W.: RSA discloses phishing-attack data breach details. Online at http:\/\/www.computerweekly.com\/news\/1280095593\/RSA-discloses-phishing-attack-data-breach-details (2011)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Zhang, C., Ross, K.: Identifying video spammers in online social networks. In: Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web, pp.\u00a045\u201352 (2008)","DOI":"10.1145\/1451983.1451996"},{"key":"10_CR3","unstructured":"Brenner, J., Smith, A.: 72% of online adults are social networking site users. Online at http:\/\/www.pewinternet.org\/ (2013)"},{"issue":"12","key":"10_CR4","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/MCOM.2009.5350374","volume":"47","author":"L.A. Cutillo","year":"2009","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Safebook: a privacy-preserving online social network leveraging on real-life trust. IEEE Commun. Mag. 47(12), 94\u2013101 (2009)","journal-title":"IEEE Commun. Mag."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D.: The battle against phishing: dynamic security skins. In: Proceedings of the Symposium on Usable Privacy and Security (SOUPS 2005), Pittsburgh, pp.\u00a077\u201388 (2005)","DOI":"10.1145\/1073001.1073009"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Faghani, M.R., Saidi, H.: Malware propagation in online social networks. In: Proceedings of the 4th International Conference on Malicious and Unwanted Software (MALWARE 2009), Montreal, pp.\u00a08\u201314 (2009)","DOI":"10.1109\/MALWARE.2009.5403023"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M. Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., Elovici, Y.: Online social networks: threats and solutions. IEEE Commun. Surv. Tutorials. 16(4), 2019\u20132036 (2014)","journal-title":"IEEE Commun. Surv. Tutorials."},{"key":"10_CR8","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71\u201380, (2005)","DOI":"10.1145\/1102199.1102214"},{"issue":"8","key":"10_CR9","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R. Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., Thuraisingham, B.: Preventing private information inference attacks on social networks. IEEE Trans. Knowl. Data Eng. 25(8), 1849\u20131862 (2013)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse social engineering attacks in online social networks. In: Detection of Intrusions and Malware, and Vulnerability Assessment. Lecture Notes in Computer Science, vol.\u00a06739, pp.\u00a055\u201374. Springer, New York (2011)","DOI":"10.1007\/978-3-642-22424-9_4"},{"key":"10_CR11","unstructured":"Jin, L., Long, X., Takabi, H., Joshi, J.B.: Sybil attacks vs identity clone attacks in online social networks. In: Proceedings of the 6th International Conference on Information Security and Assurance (ISA 2012), Shanghai, pp.\u00a0125\u2013127 (2012)"},{"key":"10_CR12","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, pp.\u00a029\u201342 (2007)","DOI":"10.1145\/1298306.1298311"},{"key":"10_CR13","unstructured":"Potharaju, R., Carbunar, B., Nita-Rotaru, C.: 3-clique attacks in online social networks. Tech. Rep. CERIAS TR 2011-08, Purdue University (2011)"},{"key":"10_CR14","unstructured":"Statista - The Statistic Portal: Number of monthly active Facebook users worldwide. Online at http:\/\/www.statista.com\/statistics\/264810\/number-of-monthly-active-facebook-users-worldwide\/ (2014). Accessed April 2014"},{"key":"10_CR15","unstructured":"TrendLabs APT Research Team: Spear-phishing email: most favored APT attack bait. Online at http:\/\/www.trendmicro.com\/cloud-content\/us\/pdfs\/security-intelligence\/white-papers\/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf (2012)"},{"issue":"4","key":"10_CR16","doi-asserted-by":"crossref","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"41","author":"B. Viswanath","year":"2011","unstructured":"Viswanath, B., Post, A., Gummadi, K.P., Mislove, A.: An analysis of social network-based sybil defenses. ACM SIGCOMM Comput. Commun. Rev. 41(4), 363\u2013374 (2011)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","volume":"24","author":"C. Zhang","year":"2010","unstructured":"Zhang, C., Sun, J., Zhu, X., Fang, Y.: Privacy and security for online social networks: challenges and opportunities. IEEE Netw. 24, pp.\u00a013\u201318 (2010)","journal-title":"IEEE Netw."}],"container-title":["Data-Centric Systems and Applications","Data Management in Pervasive Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20062-0_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T17:25:54Z","timestamp":1676481954000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-20062-0_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319200613","9783319200620"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20062-0_10","relation":{},"ISSN":["2197-9723","2197-974X"],"issn-type":[{"type":"print","value":"2197-9723"},{"type":"electronic","value":"2197-974X"}],"subject":[],"published":{"date-parts":[[2015]]}}}