Identifying Trojan Facebook Applications

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Facebook cookbook - building applications to grow your Facebook empire

In what case do you like reading so much? What about the type of the facebook cookbook building applications to grow your facebook empire book? The needs to read? Well, everybody has their own reason why should read some books. Mostly, it will relate to their necessity to get knowledge from the book and want to read just to get entertainment. Novels, story book, and other entertaining books bec...

متن کامل

Poking Facebook: A Characterization of OSN Applications

Facebook is one of the most popular Internet sites today. A key feature that arguably contributed to Facebook’s unprecedented success is its application platform, which enables the development of third-party social-networking applications. Understanding how these applications are installed and used is important for the function and utility of web-based online social networks, e.g. to better eng...

متن کامل

Identifying and Responding to Customer Needs on Facebook Fan Pages

Understanding the needs or expectations customers aim to pursue is the priority of marketing communications. This study employed a theoretical approach to identify and respond to the needs that consumers seek to satisfy on fan pages. The customer needs were evaluated from functional, hedonic, social, and psychological perspectives. A two-step confirmatory factor analysis was applied. All four o...

متن کامل

Facebook Applications' Installation and Removal: A Temporal Analysis

Facebook applications are one of the reasons for Facebook attractiveness. Unfortunately, numerous users are not aware of the fact that many malicious Facebook applications exist. To educate users, to raise users awareness and to improve Facebook users security and privacy, we developed a Firefox add-on that alerts users to the number of installed applications on their Facebook profiles. In this...

متن کامل

SOC IC Trojan Thwarting by Identification of Trojan

IC Trojan horse is a serious technical problem faced by SOC developers. Most of the SOC developers use third party IP components for their design purpose. So comparing with a Trojan-less counterpart is impossible. Villasenor and Kim proposed bus architecture to detect Trojan activity where, when the circuit realizes the presence of a Trojan, it informs the CPU by an interrupt. In this paper, we...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Asia-pacific Journal of Convergent Research Interchange

سال: 2016

ISSN: 2508-9080

DOI: 10.21742/apjcri.2016.12.01