Identifying Trojan Facebook Applications
نویسندگان
چکیده
منابع مشابه
Facebook cookbook - building applications to grow your Facebook empire
In what case do you like reading so much? What about the type of the facebook cookbook building applications to grow your facebook empire book? The needs to read? Well, everybody has their own reason why should read some books. Mostly, it will relate to their necessity to get knowledge from the book and want to read just to get entertainment. Novels, story book, and other entertaining books bec...
متن کاملPoking Facebook: A Characterization of OSN Applications
Facebook is one of the most popular Internet sites today. A key feature that arguably contributed to Facebook’s unprecedented success is its application platform, which enables the development of third-party social-networking applications. Understanding how these applications are installed and used is important for the function and utility of web-based online social networks, e.g. to better eng...
متن کاملIdentifying and Responding to Customer Needs on Facebook Fan Pages
Understanding the needs or expectations customers aim to pursue is the priority of marketing communications. This study employed a theoretical approach to identify and respond to the needs that consumers seek to satisfy on fan pages. The customer needs were evaluated from functional, hedonic, social, and psychological perspectives. A two-step confirmatory factor analysis was applied. All four o...
متن کاملFacebook Applications' Installation and Removal: A Temporal Analysis
Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users awareness and to improve Facebook users security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this...
متن کاملSOC IC Trojan Thwarting by Identification of Trojan
IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Asia-pacific Journal of Convergent Research Interchange
سال: 2016
ISSN: 2508-9080
DOI: 10.21742/apjcri.2016.12.01