참고문헌
- "Social Network Users Statistics," http://www. socialnomics.net/2011/08/16/social-network-usersstatistics/
- Gilbert Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel, ""Practical Attack to Deanonymize Social Network Users,"" IEEE Symposium on Security and Privacy, 2010, pp.223-238. http:// iseclab.org/papers/sonda-TR.pdf
- "Steal Browser History without JavaScript," http:// ha.ckers.org/blog/20070228/steal-browser-historywithout- javascript
- Bin Zhou and Jian Pei, "Preserving Privacy in Social Networks Against Neighborhood Attacks," Data Engineering, 2008. ICDE 2008. IEEE 24th International Conference on, Apr. 2008, pp.506- 515. http://www.cs.sfu.ca/-jpei/publications/ NeighborhoodAnonymization-ICDE08.pdf
- Balachander Krishnamurthy and Craig E. Wills, Characterizing Privacy in Online Social Networks," WOSN '08 Proceedings of the first workshop on Online social networks, 2008, pp. 37-42. http:// www2.research.att.com/-bala/papers/posn.pdf
- Leyla Bilge, Thorsten Strufe, Davide Balzarotti, and Engin Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," WWW '09Proceedings of the 18th international conference on World Wide Web, 2009, pp.551-560. http://www.iseclab.org/papers/wwwsocialnets. pdf
- M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, "Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam," Internet Computing, IEEE,vol.15, no.3, May- Jun. 2011, pp.28-34. http://www.sba-research. org/wp-content/uploads/publications/FITM_ InternetComputing_preprint.pdf https://doi.org/10.1109/MIC.2011.24
- M. Huber, M. Mulazzani, E. Weippl, G. Kitzler, and S. Goluch, "Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam," Internet Computing, IEEE,vol.15, no.3, May- Jun. 2011, pp.28-34. http://www.sba-research. org/wp-content/uploads/publications/FITM_ InternetComputing_preprint.pdf https://doi.org/10.1109/MIC.2011.24
- Exploitation-Social Networks Malware, ISACA Journal, http://www.rkmingenieria.com/ifol/ wp-content/uploads/2011/03/ISACA_JAN_2011_ ChainExploitation.pdf
- "Exploiting a cross-site scripting vulnerability on Facebook, "http://www.acunetix.com/websitesecurity/xss-facebook.htm
- M.R.Faghani and H. Saidi, "Social Networks XSS Worms," Computational Science and Engineering, 2009. CSE '09. International Conference on, Oct 2009, pp. 1137-1141.http://faghani.info/CSE09.pdf