×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents of precog
PhishAri: Automatic Realtime Phishing Detection on Twitter
387 views
Phi.sh/$oCiaL: The Phishing Landscape through Short URLs
416 views
Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page
69 views
Call Me MayBe: Understanding Nature and Risks of Sharing Mobile Numbers on Online Social Networks
389 views
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
155 views
“The Paper Slip Should be There!” Perceptions of Transaction Receipts in Branchless Banking
53 views
Analyzing Social and Stylometric Features to Identify Spear phishing Emails
54 views
Detection of Spam Tipping Behaviour on Foursquare
132 views
@I seek 'fb.me': Identifying Users across Multiple Online Social Networks
340 views
Home is Safer than the Cloud! Privacy Concerns for Consumer Cloud Storage
823 views
OCEAN: Open-source Collation of eGovernment data And Networks: Understanding Privacy Leaks in Open Government Data
985 views
$1.00 per RT #BostonMarathon #PrayForBoston: Analyzing Fake Content on Twitter
267 views
On the Viability of CAPTCHAs for Use in Telephony Systems: A Usability Field Study
121 views
Designing and Evaluating Techniques to Mitigate Misinformation Spread on Micro-blogging Web Services
68 views
Credibility Ranking of Tweets during High Impact Events
412 views
Credibility, Identity Resolution, Privacy, and Policing in Online Social Media
168 views
Privacy and Security in Online Social Media : Policing and Social Media - Part 2
88 views
Privacy and Security in Online Social Media : Policing and Social Media - Part 1
96 views
Privacy and Security in Online Social Media : Privacy and Social Media
129 views
Privacy and Security in Online Social Media : Policing and Social Media - Part 3
71 views
Next >