1 |
M. Hirose et al, "A Private Information Detector for Controlling Circulation of Private Information through Social Networks," In Proc. 7th ARES Conf, pp. 473-478, Aug., 2012,
|
2 |
K. Liu, E. Terzi, "A Framework for Computing the Privacy Scores of Users in Online Social Networks," ACM Transactions on Knowledge Discovery from Data 5(1) Article No. 6, Dec, 2010.
|
3 |
E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in Proc. 18th WWW, pp. 531-540, 2009.
|
4 |
C. Zhang, et al, "Privacy and security for online social networks: challenges and opportunities," IEEE Network, 24(4) pp. 13-18, Jul., 2010.
DOI
ScienceOn
|
5 |
Y. Yang et al, "Stalking online: on user privacy in social networks," In Proc. 2nd ACM Conf. CODASPY, pp. 37-48, 2012.
|
6 |
H. Mao, X. Shuai, and A. Kapadia, "Loose Tweets: an analysis of privacy leaks on twitter," In Proc. 10th ACM Workshop on Privacy in the electronic society, pp. 1-12, 2011.
|
7 |
R. Heatherly et al, "Preventing Private Information Inference Attacks on Social Networks," IEEE Transactions on Knowledge and Data Engineering, 25(8), pp.1849-1862, 2013.
DOI
ScienceOn
|
8 |
PostgreSQL, an open-source based object-relational database system. http://www.postgresql.org
|
9 |
Orange: Open source data visualization and analysis for novice and experts. Data mining through visual programming or Python scripting. http://orange.biolab.si/
|
10 |
S. Choi, et al, "A technique for analyzing personal information leakage threat in Bigdata," Journal of Korean Institute of Information Security & Cryptology 23(3), pp. 56-60, 2013.
|
11 |
Facebook. https://www.facebook.com/
|
12 |
Twitter. https://twitter.com/
|
13 |
C. Cortes and V. N. Vapnik, "Support-Vector Networks," Machine Learning, vol. 20, no. 3, pp. 273-297, 1995.
|