[1] Ch. Zhang, J. Sun, , X. Zhu and Y. Fang, “Privacy and
Security for Online Social networks: Challenges and
Opportunities,” IEEE Network, vol. 24, no.4, pp. 13-18,
Jul/Aug 2010, doi: 10.1109/MNET.2010.5510913.
[2] G. Ahn, M, Shehab and A. Squicciarin, “Security and
Privacy in Social Networks,” IEEE Internet computing,
vol. 15, no. 3, pp. 10-12, available at http://
i e e exp lo r e. i e e e .o rg/ s t amp / s t amp . j sp ? tp=&a rn -
umber=5755600, May/June 2011, doi: 10.1109/
MIC.2011.66.
[3] D. Irani, S. Webb, C. Pu and K. Li, “Modeling Unintended
Personal-Information Leakage from Multiple Online
Social Networks,” IEEE Internet computing, vol. 15, no.3,
pp. 13-19, May/June 2011, doi: 10.1109/MIC.2011.25.
[4] M. Huber, M. Mulazzani, G. Kitzler, S. Goluch and E.
Weippl, “Friend-in-the-middle Attacks: Exploiting Social
Networking Sites for Spam,” IEEE Internet computing,
vol. 15, no.3, pp. 28 – 34, May/June 2011, doi: 10.1109/
MIC.2011.24.
[5] M.L. Lobina, D. Giusto, D. Mula and E. Maggio, “Antispam
laws at the times of social networks: the European
approach” http://www.dimt.it/File/Giusto_Lobina_
Maggio_Mula%20-%20Spam.pdf. 2010.
[6] Data Protection and Freedom of Information Commissioner
of the State of Berlin (Germany), “Resolution on Privacy
Protection in Social Network Services,” 30th International
Conference of Data Protection and Privacy Commissioners
Strasbourg. http://www.ed- ps.europa.eu/
EDPSWEB/webdav/shared/Documents/Cooperation/
Conference_int/08-10-17_Strasbourg _social_network_
EN.pdf. 2008.
[7] Y. Liu., G. Zhao, and T. Wang, “Architecture Research
and Design for the Internet Content Rating Implementation
System,” Proc. 2nd IEEE workshop. Education Technology
and Computer Science (ETCS), pp. 369-401,
March. 2010, doi: 10.1109/ETCS.2010.419.
[8] L Yan, and W. Tai, “Technical Standard System
Development for the Internet Content Rating Service,”
Proc. 3rd IEEE workshop. Intelligent Systems and Applications
(ISA), pp. 1-5, May. 2011, doi: 10.1109/
ISA.2011.5873326.
[9] P. Hayati, V. Potdar, A.Talevski, N.Firoozeh, S. Sarenche,
and E.A. Yeganeh, “Definition of Spam 2.0: New
Spamming Boom” 4th IEEE International Conference on
Digital Ecosystems and Technologies (DEST), pp. 580-
584, April 2010.
[10] Y. Li, B. Fang, L. Guo, and S. Wang, “Research of a
novel anti-spam technique based on users feedback and
improved naive Bayesian approach” International conference
on Networking and Services, 2006. ICNS ’06.,
pp. 86–86, July2006.
[11] T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer,
“Social Phishing“ http://efiko.org/material/Social%
20Phishing%20by%20Tom%20Jagat ic%20et .%
20al.pdf . 2005
[12] K. Coronges, R.Dodge, C. Mukina, Z. Radwick, J.
Shevchik, and E. Rovira, “The Influences of Social
Networks on Phishing Vulnerability” 45th Hawaii
International Conference on System Science (HICSS),
pp. 2366- 2373, Jan. 2012.
[13] N. Bilton, “Researcher Releases Facebook Profile Data”
http://bits.blogs.nytimes.com/2010/07/28/100-millionfacebook-
ids-compiled-online. 2010.
[14] S. Abu Nimeh, T. Chen and O. Alzubi, “Malicious and
Spam Posts in Online Social Networks,” IEEE computer,
vol. 44, no. 9, pp. 23–28, Sep. 2011, doi: 10.1109/
MC.2011.222.
[15] Ch. Liang, Y. Chen, G. Liao and B. Cheng, “Anti-spam
Email System in Facebook,” Proc. IEEE Symp.
Computer, pp. 183-186, Dec. 2010, doi: 10.1109/
COMPSYM. 2010.5685522.
[16] A. H. Wang, “Don’t follow me: Spam Detection in
Twitter,” Proc. Conf. Security and Cryptography
(SECRYPT), pp. 1-10. July. 2010.
[17] Sophos, “Sophos Security Threat Report reveals increase
in social networking security threats,” http://
www. s o p h o s . c om/ e n - u s / p r e s s - o f f i c e / p r e s s -
releases/2011/01/threat-report-2011.aspx. 2011.
[18] G. Stringhini, Ch. Kruegel and G. Vigna, “Detecting
Spammers on Social Networks,” iseclab.org/papers/
acsac10-socialnets.pdf. 2010.
[19] Security parks, “Do not falling victim of social
networking spam,” http://www.securitypark.co.uk/
security _article 262665.html. 2009.
[20] L. Munson, “5 Types Of Social Networking Scam – #5
Spam,” http://www.security-faqs.com/5-types-of-socialnetworking-
scam-5-spam.html. 2008.
[21] W. Luo, J. Liu, J. Liu, and Ch. Fan, “An Analysis of
Security in Social Networks,” Proc. Eighth Conf.
Dependable Autonomic and Secure Computing, pp. 648-
651, Dec. 2009, doi: 10.1109/DASC.20-09.100.
[22] S. Liss and S. S. Columnist, “As Facebook and Twitter
grow, so do opportunities to rip people off,” http://
articles.sun-sentinel.com/2010-07-31/news/fl-slcolsocial-
media-scams-201007-31_1_social-media-scamfacebook.
2010.
[23] H. Y. Lam and D. Y. Yeung, “A Learning Approach to
Spam Detection based on Social Networks,”
w w w . c s e . u s t . h k / ~ d y y - e u n g / p a p e r / p d f /
yeung.ceas2007.pdf. 2007.