gain631 发表于 2025-3-28 16:34:46
http://reply.papertrans.cn/84/8309/830814/830814_41.pngMyofibrils 发表于 2025-3-28 22:17:25
Privacy Issues in Geosocial Networks,k is getting stronger due to the swift development of GSNs and mobile technologies. Indeed, the gathered location information generates a huge amount of publicly-available location data, information that was always considered private or at least known only by friends or family. Hence, a serious privBILE 发表于 2025-3-28 23:21:47
SocialSpy: Browsing (Supposedly) Hidden Information in Online Social Networks,rs have about privacy, most social networks offer ways to control the privacy of the user. Unfortunately, we believe that current privacy settings are not as effective as users might think..In this paper, we highlight this problem focusing on one of the most popular social networks, Facebook. In parantipsychotic 发表于 2025-3-29 06:25:20
Latent Semantic Analysis for Privacy Preserving Peer Feedback,Unfortunately, this new option comes with significantly increased risks to the privacy of the feedback requester as well as the peers involved in the feedback process. In fact, peers may unintentionally disclose personal information which may cause great threats to them like cyber-bullying, which inBRINK 发表于 2025-3-29 09:37:48
http://reply.papertrans.cn/84/8309/830814/830814_45.pngWordlist 发表于 2025-3-29 14:32:45
http://reply.papertrans.cn/84/8309/830814/830814_46.png鼓掌 发表于 2025-3-29 15:55:02
http://reply.papertrans.cn/84/8309/830814/830814_47.pngGLEAN 发表于 2025-3-29 20:30:33
Two-Level Automated Approach for Defending Against Obfuscated Zero-Day Attacks,ey are very expensive and powerful attack tools to defend against. Since the vulnerability is not known in advance, there is no reliable way to guard against zero-day attacks before they happen. Attackers take advantage of the unknown nature of zero-day exploits and use them in conjunction with highOMIT 发表于 2025-3-30 00:07:38
Practical Attacks on Virtual Worlds,ecurity issues affect VWs, and they are vulnerable to a range of attacks on their infrastructure and communications channels. Their powerful architecture can also be used to mount attacks against live Real World servers, by using malicious VW objects. Researching these attacks in commercial VWs woulSKIFF 发表于 2025-3-30 06:01:00
TabsGuard: A Hybrid Approach to Detect and Prevent Tabnabbing Attacks,rgence of various anti-phishing tools, not only there has been a dramatic increase in the number of phishing attacks but also more sophisticated forms of these attacks have come into existence. One of these forms of phishing attacks is the tabnabbing attack. Tabnabbing takes advantage of the user’s