共 28 条
- [1] An Intelligent Model for Vulnerability Analysis of Social Media User [J]. 2016 IEEE 4TH INTERNATIONAL CONFERENCE ON FUTURE INTERNET OF THINGS AND CLOUD WORKSHOPS (FICLOUDW), 2016, : 258 - 263
- [3] Ahmad A., 2013, DISCLOSURE, V6, P18
- [4] Social Engineering in Social Networking Sites: The Art of Impersonation [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON SERVICES COMPUTING (SCC 2014), 2014, : 797 - 804
- [5] Aula Pekka, 2010, Strategy & Leadership, V38, P43, DOI 10.1108/10878571011088069
- [6] Australian Competition and Consumer Commission, 2018, TARG SCAMS REP ACCC
- [7] Bawazir MA, 2016, INT CONF INFORM COMM, P228, DOI [10.1109/ICT4M.2016.49, 10.1109/ICT4M.2016.054]
- [8] Social Network Sites: Definition, History, and Scholarship [J]. JOURNAL OF COMPUTER-MEDIATED COMMUNICATION, 2007, 13 (01): : 210 - 230
- [9] Braun Richard, 2013, 2013 17th IEEE International Enterprise Distributed Object Computing Conference (EDOC 2013), P267, DOI 10.1109/EDOC.2013.37
- [10] Cavico F., 2013, J LAW POLICY GLOBALI, V12, P1