A traffic analysis attack to compute social network measures
暂无分享,去创建一个
L. Javier García-Villalba | Alejandra Guadalupe Silva Trujillo | Tai-Hoon Kim | Ana Lucila Sandoval Orozco | A. S. Orozco | L. Villalba | Tai-hoon Kim
[1] Bülent Yener,et al. Graph Theoretic and Spectral Analysis of Enron Email Data , 2005, Comput. Math. Organ. Theory.
[2] Tom A. B. Snijders,et al. Social Network Analysis , 2011, International Encyclopedia of Statistical Science.
[3] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[4] Susan B. Barnes,et al. A privacy paradox: Social networking in the United States , 2006, First Monday.
[5] ASHWIN MACHANAVAJJHALA,et al. L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).
[6] Bernardo A. Huberman,et al. Email as spectroscopy: automated discovery of community structure within organizations , 2003 .
[7] L. Javier García-Villalba,et al. Disclosing user relationships in email networks , 2015, The Journal of Supercomputing.
[8] L. Javier García-Villalba,et al. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks , 2016, Sensors.
[9] Jure Leskovec,et al. Community Structure in Large Networks: Natural Cluster Sizes and the Absence of Large Well-Defined Clusters , 2008, Internet Math..
[10] Salvatore Marano,et al. Link Prediction in Human Contact Networks Using Online Social Ties , 2013, 2013 International Conference on Cloud and Green Computing.
[11] L. Jean Camp,et al. Cars, Condoms, and Facebook , 2013, ISC.
[12] Nicholas Hopper,et al. On the effectiveness of k;-anonymity against traffic analysis and surveillance , 2006, WPES '06.
[13] Ronaldo Menezes,et al. Identification of Social Tension in Organizational Networks - Relating Clan/Clique Formation to Social Tension , 2009, CompleNet.
[14] Alessandro Acquisti,et al. Information revelation and privacy in online social networks , 2005, WPES '05.
[15] Ajith Abraham,et al. Models of Influence in Online Social Networks , 2014, Int. J. Intell. Syst..
[16] Andrew McCallum,et al. Topic and Role Discovery in Social Networks , 2005, IJCAI.
[17] Yan Liu,et al. Predicting who rated what in large-scale datasets , 2007, SKDD.
[18] Tina W. Wey,et al. Social network analysis of animal behaviour: a promising tool for the study of sociality , 2008, Animal Behaviour.
[19] George Danezis,et al. Statistical Disclosure or Intersection Attacks on Anonymity Systems , 2004, Information Hiding.
[20] L. Javier García-Villalba,et al. Extracting Association Patterns in Network Communications , 2015, Sensors.
[21] Bernardo A. Huberman,et al. E-Mail as Spectroscopy: Automated Discovery of Community Structure within Organizations , 2005, Inf. Soc..
[22] Christos Faloutsos,et al. Graph evolution: Densification and shrinking diameters , 2006, TKDD.
[23] Hilary Risser. Social Networks Analysis , 2013 .
[24] Marit Hansen,et al. Protection Goals for Privacy Engineering , 2015, 2015 IEEE Security and Privacy Workshops.
[25] S. Bornholdt,et al. Scale-free topology of e-mail networks. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.
[26] Marianne Winslett,et al. Proceedings of the 5th ACM workshop on Privacy in electronic society , 2006, CCS 2006.
[27] Mohammed Shahadat Uddin,et al. Towards A Scale Free Network Approach to Study Organizational Communication Network , 2010, PACIS.
[28] Tomas Olovsson,et al. Towards modeling legitimate and unsolicited email traffic using social network properties , 2012, SNS '12.
[29] Andrew McCallum,et al. Extracting social networks and contact information from email and the Web , 2004, CEAS.
[30] Alan M. Frieze,et al. Random graphs , 2006, SODA '06.
[31] Mohammad Al Hasan,et al. A Survey of Link Prediction in Social Networks , 2011, Social Network Data Analytics.
[32] Sarah Spiekermann,et al. Towards a value theory for personal data , 2017, J. Inf. Technol..
[33] Frank Stajano,et al. Privacy-enabling social networking over untrusted networks , 2009, WOSN '09.
[34] Jean Caelen,et al. Detection and classification of the behavior of people in an intelligent building by camera , 2013 .
[35] Marco De Martino. Social Networks Analysis , 2018, Encyclopedia of Social Network Analysis and Mining. 2nd Ed..
[36] Carmela Troncoso,et al. Two-Sided Statistical Disclosure Attack , 2007, Privacy Enhancing Technologies.
[37] Carmela Troncoso,et al. Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications , 2009, Privacy Enhancing Technologies.
[38] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[39] Aristides Gionis,et al. Social Network Analysis and Mining for Business Applications , 2011, TIST.
[40] Lei Chen,et al. A Survey of Privacy-Preservation of Graphs and Social Networks , 2010, Managing and Mining Graph Data.
[41] George M. Mohay,et al. Identifying the authors of suspect email , 2001 .
[42] S Kavitha,et al. A Survey on k-Anonymity Generalization Algorithms , 2014 .
[43] Lian Liu,et al. Privacy Preservation of Affinities in Social Networks , 2009 .
[44] J. Beúnza. Actores sociales y redes de relaciones: reflexiones para una historia global , 2001 .
[45] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[46] Ninghui Li,et al. t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.
[47] George Danezis,et al. Systems for Anonymous Communication , 2010, FC 2010.
[48] Andrew McCallum,et al. Topic and Role Discovery in Social Networks with Experiments on Enron and Academic Email , 2007, J. Artif. Intell. Res..
[49] Ming Gu,et al. De-Anonymization of Dynamic Social Networks , 2013 .