Alexa, “The top 500 sites on the web.” https://goo.gl/E2GtDp, December 2014.
 J. Grossman, “Cross-site scripting worms and viruses: the impending threat and the best defense,” June 2007.
 W. Fan and K. Yeung, “Online social networks paradise of computer viruses,” Journal of Physica A: Statistical Mechanics and its Applications, vol. 390, pp. 189 - 197, January 2011.
 K. Thomas, C. Grier, and V. Paxson, “Adapting social spam infrastructure for political censorship,” in Proceedings of the 5th USENIX Workshop on Large-Scale Exploits and Emergent Threats, (Berkeley, CA), USENIX, April 2012.
 Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu, “Design and analysis of a social botnet,” Elsevier Journal on Computer Networks, vol. 57, pp. 556-578, February 2013.
 R. Hansen and J. Grossman, “Clickjacking,” September 2008.
 B. Li, “An in-depth look into malicious browser extensions.” https://goo. gl/r6lwO4, October 2014.
 ESET, “Virus radar.” https://goo.gl/2bpwsB, November 2014.
 Kaspersky Labs, “Facebook malware poses as flash update, infects 110k users,” February 2015.
 K. Thomas and D. Nicol, “The Koobface botnet and the rise of social malware,” in Proceedings of the 5th International Conference on Malicious and Unwanted Software (MALWARE 2010), pp. 63-70, October 2010.
 ESET, “Virus radar.” https://goo.gl/LVDEJS, November 2016.
 R. Ziakin and D. Barda, “Imagegate: Check point uncovers a new method for distributing malware through images.” https://goo.gl/ MiU0jU, November 2016.
 G. Yan, G. Chen, S. Eidenbenz, and N. Li, “Malware propagation in online social networks: Nature, dynamics, and defense implications,” in Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, ASIACCS '11, (New York, NY, USA), pp. 196-206, ACM, March 2011.
 M. Faghani, A. Matrawy, and C.-H. Lung, “A study of trojan propagation in online social networks,” in In Proceedings of the 5th International Conference on New Technologies, Mobility and Security (NTMS), pp. 1- 5, May 2012.
 M. Faghani and H. Saidi, “Malware propagation in online social networks,” in Proceedings of the International Conference on Malicious and Unwanted Software (MALWARE), pp. 8-14, October 2009.