1. Fast algorithms for mining association rules in large databases;Agrawal,1994
2. On the feasibility of inference attacks by third-party extensions to social network systems;Ahmadinejad,2013
3. Inference attacks by third-party extensions to social network systems;Ahmadinejad,2011
4. Secure computer systems: a mathematical model;Bell;J Comput Secur,1996
5. All your contacts are belong to us: automated identity theft attacks on social networks;Bilge,2009