Author:
Truta Traian Marius,Tsikerdekis Michail,Zeadally Sherali
Publisher
Springer International Publishing
Reference82 articles.
1. Alufaisan Y, Campan A (2013) Preservation of centrality measures in anonymized social networks. In: Proceedings of the ASE/IEEE international conference on privacy, security, risk, and trust (PASSAT 2013), Washington D.C., USA
2. Barbaro M, Zeller T (2006) A face is exposed for AOL searcher no. 4417749. The New York Times, Published 9 Aug 2006
3. Barnes SB (2006) A privacy paradox: social networking in the United States. First Monday 11(9):11–15
4. Beato F, Kohlweiss M, Wouters K (2011) Scramble! your social network data. In: Privacy enhancing technologies symposium (PETS), pp 211–225
5. Bernal J (2009) Web 2.0 and social networking for the enterprise: guidelines and examples for implementation and management within your organization. Pearson Education
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. A Novel Graph-modification Technique for User Privacy-preserving on Social Networks;Journal of Telecommunications and Information Technology;2019-09-30
2. Genome of Human-Enabled Big Data Analytics;Communications in Computer and Information Science;2019