Search For:

Displaying 1-4 out of 4 total
Friend-in-the-Middle Attacks: Exploiting Social Networking Sites for Spam
Found in: IEEE Internet Computing
By Markus Huber, Martin Mulazzani, Gerhard Kitzler, Sigrun Goluch, Edgar Weippl
Issue Date:May 2011
pp. 28-34
<p>Friend-in-the-middle attacks on social networking sites can be used to harvest social data in an automated fashion. Attackers can then exploit this data for large-scale attacks using context-aware spam and social phishing. The authors prove the fe...
 
Planning Dynamic Activity and Resource Allocations Using a Risk-Aware Business Process Management Approach
Found in: Availability, Reliability and Security, International Conference on
By Simon Tjoa, Stefan Jakoubi, Sigrun Goluch, Gerhard Kitzler
Issue Date:February 2010
pp. 268-274
The planning and effective usage of resources is a major challenge for organizations. More than ever through the global interconnections and the current economic situation the domain of resource allocation gains importance. Thus, within this paper we contr...
 
A Formal Approach Towards Risk-Aware Service Level Analysis and Planning
Found in: Availability, Reliability and Security, International Conference on
By Stefan Jakoubi, Simon Tjoa, Sigrun Goluch, Gerhard Kitzler
Issue Date:February 2010
pp. 180-187
Effectively and efficiently performing business processes is a key success factor for achieving economic entrepreneurial goals. Amongst others, the argument of more stringent cost pressure lead companies to enforce outsourcing activities. Thus, the managem...
 
Exploiting social networking sites for spam
Found in: Proceedings of the 17th ACM conference on Computer and communications security (CCS '10)
By Edgar Weippl, Gerhard Kitzler, Markus Huber, Martin Mulazzani, Sigrun Goluch
Issue Date:October 2010
pp. 693-695
In the ongoing arms race between spammers and the multi-million dollar anti-spam industry, the number of unsolicited e-mail messages (better known as "spam") and phishing has increased heavily in the last decade. In this paper, we show that our novel frien...
     
 1