1. Delfina, M.,
Andrea, P.,
Vittorio, S.,
Luigi, S.,
et al.
, “Privacy Awareness About Information Leakage: Who Knows What About Me?”, in Proceedings of the ACM Conference on Computer and Communications Security, 279-284, 2013.
2. Ilia, P.,
Polakis, I.,
Athanasopoulos, E.,
Maggi, F., and
Ioannidis, S.
, “Face/Off: Preventing Privacy Leakage From Photos in Social Networks,” In Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security (CCS '15), Association for Computing Machinery, New York, NY, USA, 781-792, 2015.
3. https://www.oaic.gov.au/privacy/guidance-and-advice/what-is-personal-information.
4. Gregory Voss, W.
, “The CCPA and the GDPR Are Not the Same: Why You Should Understand Both,” vol1, 7-12, 2021.
5. Funnywei
, “Buffer Overflow Vulnerability Mining Model [Z/OL],” 2003.