A Study of Online Social Network Privacy Via the TAPE Framework
暂无分享,去创建一个
Vinod Vokkarane | Liudong Xing | Yan Sun | Yongbo Zeng | L. Xing | Y. Sun | V. Vokkarane | Yongbo Zeng
[1] Haiyan Wang,et al. On the Existence of Positive Solutions of Fourth-Order Ordinary Differential Equations , 1995 .
[2] Gary Stoneburner,et al. SP 800-30. Risk Management Guide for Information Technology Systems , 2002 .
[3] Jongin Lim,et al. Quantitative Risk Analysis and Evaluation in Information Systems: A Case Study , 2007, International Conference on Computational Science.
[4] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[5] Saikat Guha,et al. NOYB: privacy in online social networks , 2008, WOSN '08.
[6] Balachander Krishnamurthy,et al. On the leakage of personally identifiable information via online social networks , 2009, CCRV.
[7] Mohamed Hamdi,et al. Computer and network security risk management: theory, challenges, and countermeasures , 2005, Int. J. Commun. Syst..
[8] Young-Gab Kim,et al. A Security Risk Analysis Model for Information Systems , 2004, AsiaSim.
[9] John D. Andrews,et al. Birnbaum's measure of component importance for noncoherent systems , 2003, IEEE Trans. Reliab..
[10] Steven Walczak,et al. Unfriending on Facebook: Friend Request and Online/Offline Behavior Analysis , 2011, 2011 44th Hawaii International Conference on System Sciences.
[11] A. Felt. Privacy Protection for Social Networking APIs , 2008 .
[12] Jennifer Neville,et al. Modeling relationship strength in online social networks , 2010, WWW '10.
[13] Zhu Han,et al. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[14] Mick J. Ridley,et al. Multi agent system approach for vulnerability analysis of online social network profiles over time , 2012, Int. J. Knowl. Web Intell..
[15] Bobby Bhattacharjee,et al. Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.
[16] C. Wang. Manycast and Anycast-Based Infrastructure Communication Reliability for Wireless Sensor Networks , 2012 .
[17] Keke Chen,et al. Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.
[18] B EllisonNicole,et al. Social Network Sites , 2007 .
[19] Minas Gjoka,et al. Walking on a graph with a magnifying glass: stratified sampling via weighted random walks , 2011, PERV.
[20] Krishna P. Gummadi,et al. A measurement-driven analysis of information propagation in the flickr social network , 2009, WWW '09.
[21] A. Lee Swindlehurst,et al. IEEE Journal of Selected Topics in Signal Processing Inaugural Issue: [editor-in-chief's message] , 2007, J. Sel. Topics Signal Processing.
[22] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[23] Zekeriya Erkin,et al. Generating private recommendations in a social trust network , 2011, 2011 International Conference on Computational Aspects of Social Networks (CASoN).
[24] Daniel Neagu,et al. A vulnerability evaluation framework for online social network profiles: axioms and propositions , 2012 .
[25] Sonia Livingstone,et al. Taking risky opportunities in youthful content creation: teenagers' use of social networking sites for intimacy, privacy and self-expression , 2008, New Media Soc..
[26] Ramanathan V. Guha,et al. Information diffusion through blogspace , 2004, WWW '04.
[27] Pieter H. Hartel,et al. Privacy in Recommender Systems , 2013, Social Media Retrieval.
[28] Michael D. Smith,et al. Computer security strength and risk: a quantitative approach , 2004 .
[29] Michael Nentwich,et al. Social network sites, privacy and the blurring boundary between public and private spaces , 2013 .
[30] Danah Boyd,et al. Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..
[31] Mick J. Ridley,et al. Algorithms for Data Retrieval from Online Social Network Graphs , 2010, 2010 10th IEEE International Conference on Computer and Information Technology.
[32] Kishor S. Trivedi,et al. A BDD-Based Algorithm for Reliability , 2000 .
[33] Jure Leskovec,et al. Correcting for missing data in information cascades , 2011, WSDM '11.
[34] Hui Xiong,et al. Information propagation in online social networks: a tie-strength perspective , 2011, Knowledge and Information Systems.
[35] G. Stoneburner,et al. Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .
[36] Ralf De Wolf,et al. Privacy by Design Through a Social Requirements Analysis of Social Network Sites form a User Perspective , 2013, European Data Protection.
[37] Muhammad Zubair Shafiq,et al. Modeling Morphology of Social Network Cascades , 2013, ArXiv.
[38] Huan Liu,et al. Exploiting vulnerability to secure user privacy on a social networking site , 2011, KDD.
[39] Liudong Xing,et al. Reliability analysis of wireless sensor networks using different network topology characteristics , 2012, 2012 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering.
[40] Lada A. Adamic,et al. Tracking information epidemics in blogspace , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).