International Confernce on Innovation Information in Computing Technologies 2015
DOI: 10.1109/iciict.2015.7396102
|View full text |Cite
|
Sign up to set email alerts
|

A survey on vulnerable attacks in online social networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(5 citation statements)
references
References 16 publications
0
5
0
Order By: Relevance
“…In Sybil attacks, the attackers or intruders use fake identities to degrade the performance of crowdsourcing systems. The conventional Sybil detection approaches use additional features, community detection, and metadata [46,47]. However, Sybil detection methods proposed for crowdsourcing primarily use the workers' clustering and gold tasks [43,48,49].…”
Section: Adversarial Attacks In Crowdsourcingmentioning
confidence: 99%
“…In Sybil attacks, the attackers or intruders use fake identities to degrade the performance of crowdsourcing systems. The conventional Sybil detection approaches use additional features, community detection, and metadata [46,47]. However, Sybil detection methods proposed for crowdsourcing primarily use the workers' clustering and gold tasks [43,48,49].…”
Section: Adversarial Attacks In Crowdsourcingmentioning
confidence: 99%
“…Reports have shown that shared information on OSNs can reveal contents that are meant to be private and sensitive enough not to be published since malicious users can use them to invade individual's privacy [21][22][23]. Both security and privacy concerns have been highlighted as a major challenge with OSNs in the literature since they are built on the centralized architectural philosophy [24][25]. Efforts are rife in literature with the aim of logically decentralizing the functionalities of OSNs and mitigate privacy issues.…”
Section: State-of-the-art In Online Social Network Sensitive Data Promentioning
confidence: 99%
“…has seen the emergence of personal data markets [50] where these personal data may be used directly by the providers or sold to third parties to be used for personalized advertising, increased band awareness, emotional manipulation [51,52] as well as online activity surveillance [53][54][55]. Network-related vulnerabilities such as Sybil attacks [56], social spamming [57] and general cyberattacks on online services [58] may also occur.…”
Section: Security and Privacy Concernsmentioning
confidence: 99%