Stealing Reality: When Criminals Become Data Scientists (or Vice Versa)

被引:7
作者
Altshuler, Yaniv [1 ]
Aharony, Nadav [1 ]
Pentland, Alex [4 ]
Elovici, Yuval [2 ,5 ]
Cebrian, Manuel [3 ]
机构
[1] MIT, Media Lab, Human Dynam Grp, Cambridge, MA 02139 USA
[2] Ben Gurion Univ Negev, Dept Informat Syst Engn, IL-84105 Beer Sheva, Israel
[3] Univ Calif San Diego, Dept Comp Sci & Engn, San Diego, CA 92103 USA
[4] MIT, Human Dynam Lab, Cambridge, MA 02139 USA
[5] Ben Gurion Univ Negev, Deutsch Telekom Res Labs, IL-84105 Beer Sheva, Israel
基金
美国国家科学基金会;
关键词
NETWORKS;
D O I
10.1109/MIS.2011.78
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Stealing-reality attacks attempt to steal social network and behavioral information through data collection and inference techniques, making them more dangerous than other types of identity theft. © 2006 IEEE.
引用
收藏
页码:22 / 30
页数:9
相关论文
共 30 条
[1]  
Aharony N., 2011, P 13 ACM INT C UB CO, P445, DOI DOI 10.1145/2030112.2030171
[2]  
[Anonymous], 2011, ADV PERS THREAT APT
[3]  
[Anonymous], PRESENTED AT PROCEED, DOI DOI 10.1145/1864349.1864394
[4]  
[Anonymous], 2007, PROC IEEE INTELLIGEN
[5]  
[Anonymous], 2001, SOCIAL ENG FUNDAME 1
[6]  
[Anonymous], 2011, P 25 C ART INT AAAI
[7]  
[Anonymous], 2008, P 17 ACM C INF KNOWL
[8]  
Apap R, 2002, LECT NOTES COMPUT SC, V2516, P36
[9]   Emergence of scaling in random networks [J].
Barabási, AL ;
Albert, R .
SCIENCE, 1999, 286 (5439) :509-512
[10]   Deductive and Inductive Stream Reasoning for Semantic Social Media Analytics [J].
Barbieri, Davide ;
Braga, Daniele ;
Ceri, Stefano ;
Della Valle, Emanuele ;
Huang, Yi ;
Tresp, Volker ;
Rettinger, Achim ;
Wermser, Hendrik .
IEEE INTELLIGENT SYSTEMS, 2010, 25 (06) :32-41