共 9 条
[2]
[Anonymous], TRANSIENTOBJECT PRIY
[3]
[Anonymous], TWITTER
[4]
[Anonymous], 2011, Facebook
[5]
Goolsby R., 2013, On Cybersecurity, Crowdsourcing, and Social Cyber-Attack
[8]
Stringhini G, 2010, 26TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2010), P1
[9]
Wood P., 2015, INTERNET SECURITY TH