-
1
-
-
70449682256
-
-
Add Health. Deductive disclosure. http://www.cpc.unc.edu/projects/ addhealth/data/dedisclosure, 2008.
-
(2008)
Deductive Disclosure
-
-
-
6
-
-
70449647557
-
Don't post the evidence unless it supports your case
-
M. Arrington. Don't post the evidence unless it supports your case. Techcrunch. http://tinyurl.com/6otok7, 2008.
-
(2008)
Techcrunch
-
-
Arrington, M.1
-
7
-
-
35348848696
-
Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography
-
L. Backstrom, C. Dwork, and J. Kleinberg. Wherefore art thou R3579X? Anonymized social networks, hidden patterns, and structural steganography. In WWW, 2007.
-
(2007)
WWW
-
-
Backstrom, L.1
Dwork, C.2
Kleinberg, J.3
-
9
-
-
0038483826
-
Emergence of scaling in random networks
-
A-L. Barabási and R. Albert. Emergence of scaling in random networks. Science, 286:509-512, 1999.
-
(1999)
Science
, vol.286
, pp. 509-512
-
-
Barabási, A.-L.1
Albert, R.2
-
10
-
-
7044264926
-
Chains of affection: The structure of adolescent romantic and sexual networks
-
P. Bearman, J. Moody, and K. Stovel. Chains of affection: The structure of adolescent romantic and sexual networks. American Journal of Sociology, 110(1):44-91, 2004.
-
(2004)
American Journal of Sociology
, vol.110
, Issue.1
, pp. 44-91
-
-
Bearman, P.1
Moody, J.2
Stovel, K.3
-
11
-
-
84936824655
-
Power and centrality: A family of measures
-
P. Bonacich. Power and centrality: A family of measures. American Journal of Sociology, 92(5):1170-1182, 1987.
-
(1987)
American Journal of Sociology
, vol.92
, Issue.5
, pp. 1170-1182
-
-
Bonacich, P.1
-
12
-
-
67650683099
-
A clustering approach for data and structural anonymity in social networks
-
A. Campan and T. Truta. A clustering approach for data and structural anonymity in social networks. In PinKDD, 2008.
-
(2008)
PinKDD
-
-
Campan, A.1
Truta, T.2
-
13
-
-
70449684510
-
-
[Note: A privacy outcry erupted over a search engine for (public) IRC channels.]
-
R. Carthy. Will IRSeeK have a chilling effect on IRC chat? http://www.techcrunch.com/2007/11/30/will-irseek-have-a-chilling-effect-on-irc- chat/, 2007. [Note: A privacy outcry erupted over a search engine for (public) IRC channels.].
-
(2007)
Will IRSeeK have a Chilling Effect on IRC Chat?
-
-
Carthy, R.1
-
14
-
-
70449680653
-
(Under)mining privacy in social networks
-
M. Chew, D. Balfanz, and B. Laurie. (Under)mining privacy in social networks. In W2SP, 2008.
-
(2008)
W2SP
-
-
Chew, M.1
Balfanz, D.2
Laurie, B.3
-
15
-
-
70449656489
-
Web privacy on the radar in congress
-
Aug 10
-
S. Clifford. Web privacy on the radar in Congress. New York Times. http://tinyurl.com/6l2tcw, Aug 10 2008.
-
(2008)
New York Times
-
-
Clifford, S.1
-
16
-
-
65449185511
-
Feedback effects between similarity and social influence in online communities
-
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. Feedback effects between similarity and social influence in online communities. In KDD, 2008.
-
(2008)
KDD
-
-
Crandall, D.1
Cosley, D.2
Huttenlocher, D.3
Kleinberg, J.4
Suri, S.5
-
19
-
-
0027097294
-
Neocortex size as a constraint on group size in primates
-
R.I.M. Dunbar. Neocortex size as a constraint on group size in primates. Journal of Human Evolution, 22:469-493, 1992.
-
(1992)
Journal of Human Evolution
, vol.22
, pp. 469-493
-
-
Dunbar, R.I.M.1
-
22
-
-
77949312976
-
-
Directive 95/46/EC
-
European Parliament. Directive 95/46/EC. http://eur-lex.europa.eu/ LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:EN:HTML, 1995.
-
(1995)
European Parliament
-
-
-
23
-
-
70449649103
-
-
Facebook. Facebook's privacy policy. http://www.new.facebook.com/policy. php, 2007.
-
(2007)
Facebook's Privacy Policy
-
-
-
24
-
-
70449682255
-
Privacy protection for social networking APIs
-
A. Felt and D. Evans. Privacy protection for social networking APIs. In W2SP, 2008.
-
(2008)
W2SP
-
-
Felt, A.1
Evans, D.2
-
27
-
-
50249107187
-
Private social network analysis: How to assemble pieces of a graph privately
-
K. Frikken and P. Golle. Private social network analysis: How to assemble pieces of a graph privately. In WPES, 2006.
-
(2006)
WPES
-
-
Frikken, K.1
Golle, P.2
-
29
-
-
84936824352
-
Economic action and social structure: The problem of embeddedness
-
M. Granovetter. Economic action and social structure: The problem of embeddedness. American Journal of Sociology, 91:481-510, 1985.
-
(1985)
American Journal of Sociology
, vol.91
, pp. 481-510
-
-
Granovetter, M.1
-
30
-
-
33749016498
-
Information revelation and privacy in online social networks
-
R. Gross, A. Acquisti, and H. Heinz. Information revelation and privacy in online social networks. In WPES, 2005.
-
(2005)
WPES
-
-
Gross, R.1
Acquisti, A.2
Heinz, H.3
-
31
-
-
70249088359
-
NOYB: Privacy in online social networks
-
S. Guha, K. Tang, and P. Francis. NOYB: Privacy in online social networks. In WOSN, 2008.
-
(2008)
WOSN
-
-
Guha, S.1
Tang, K.2
Francis, P.3
-
34
-
-
41849128290
-
Anonymizing social networks
-
M. Hay, G. Miklau, D. Jensen, P. Weis, and S. Srivastava. Anonymizing social networks. Technical Report 07-19, University of Massachusetts Amherst, 2007.
-
(2007)
Technical Report 07-19, University of Massachusetts Amherst
-
-
Hay, M.1
Miklau, G.2
Jensen, D.3
Weis, P.4
Srivastava, S.5
-
35
-
-
33748437531
-
Connecting the dots: Can the tools of graph theory and social-network studies unravel the next big plot?
-
B. Hayes. Connecting the dots: Can the tools of graph theory and social-network studies unravel the next big plot? American Scientist, 94(5):400-404, 2006.
-
(2006)
American Scientist
, vol.94
, Issue.5
, pp. 400-404
-
-
Hayes, B.1
-
36
-
-
65449168047
-
Bridging centrality: Graph mining from element level to group level
-
W. Hwang, T. Kim, M. Ramanathan, and A. Zhang. Bridging centrality: Graph mining from element level to group level. In KDD, 2008.
-
(2008)
KDD
-
-
Hwang, W.1
Kim, T.2
Ramanathan, M.3
Zhang, A.4
-
37
-
-
34848911641
-
Social phishing
-
T. Jagatic, N. Johnson, M. Jakobsson, and F. Menczer. Social phishing. Commun. ACM, 50(10):94-100, 2007.
-
(2007)
Commun. ACM
, vol.50
, Issue.10
, pp. 94-100
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
38
-
-
70449682254
-
Privacy-preserving social network analysis for criminal investigations
-
F. Kerschbaum and A. Schaad. Privacy-preserving social network analysis for criminal investigations. In WPES, 2008.
-
(2008)
WPES
-
-
Kerschbaum, F.1
Schaad, A.2
-
40
-
-
65449153304
-
The structure of information pathways in a social communication network
-
G. Kossinets, J. Kleinberg, and D. Watts. The structure of information pathways in a social communication network. In KDD, 2008.
-
(2008)
KDD
-
-
Kossinets, G.1
Kleinberg, J.2
Watts, D.3
-
42
-
-
70449682253
-
-
R. Lambiotte, V. Blondel, C. de Kerchove, E. Huens, C. Prieur, Z. Smoreda, and P. Van Dooren. Geographical dispersal of mobile communication networks. http://arxiv.org/abs/0802.2178, 2008.
-
(2008)
Geographical Dispersal of Mobile Communication Networks
-
-
Lambiotte, R.1
Blondel, V.2
De Kerchove, C.3
Huens, E.4
Prieur, C.5
Smoreda, Z.6
Van Dooren, P.7
-
43
-
-
52049120331
-
Tastes ties, and time: A new social network dataset using Facebook.com
-
[Note: six research assistants were paid to download friends-only information from Facebook]
-
K. Lewis, J. Kaufman, M. Gonzales, A. Wimmer, and N. Christakis. Tastes, ties, and time: a new social network dataset using Facebook.com. Social Networks, 30:330-342, 2008. [Note: six research assistants were paid to download friends-only information from Facebook].
-
(2008)
Social Networks
, vol.30
, pp. 330-342
-
-
Lewis, K.1
Kaufman, J.2
Gonzales, M.3
Wimmer, A.4
Christakis, N.5
-
44
-
-
18744398132
-
The link prediction problem for social networks
-
D. Liben-Nowell and J. Kleinberg. The link prediction problem for social networks. In CIKM, 2003.
-
(2003)
CIKM
-
-
Liben-Nowell, D.1
Kleinberg, J.2
-
45
-
-
57149126815
-
Towards identity anonymization on graphs
-
K. Liu and E. Terzi. Towards identity anonymization on graphs. In SIGMOD, 2008.
-
(2008)
SIGMOD
-
-
Liu, K.1
Terzi, E.2
-
46
-
-
70449667273
-
FlyByNight: Mitigating the privacy risks of social networking
-
M. Lucas and N. Borisov. flyByNight: Mitigating the privacy risks of social networking. In WPES, 2008.
-
(2008)
WPES
-
-
Lucas, M.1
Borisov, N.2
-
47
-
-
65449119267
-
Weighted graphs and disconnected components: Patterns and a generator
-
M. McGlohon, L. Akoglu, and C. Faloutsos. Weighted graphs and disconnected components: Patterns and a generator. In KDD, 2008.
-
(2008)
KDD
-
-
McGlohon, M.1
Akoglu, L.2
Faloutsos, C.3
-
49
-
-
84866659190
-
-
Microformats. http://microformats.org, 2008.
-
(2008)
Microformats
-
-
-
51
-
-
42149117427
-
Measurement and analysis of online social networks
-
A. Mislove, M. Marcon, K. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In IMC, 2007.
-
(2007)
IMC
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.3
Druschel, P.4
Bhattacharjee, B.5
-
53
-
-
34547622829
-
On the structural properties of massive telecom call graphs: Findings and implications
-
A. Nanavati, S. Gurumurthy, G. Das, D. Chakraborty, K. Dasgupta, S. Mukherjea, and A. Joshi. On the structural properties of massive telecom call graphs: findings and implications. In CIKM, 2006.
-
(2006)
CIKM
-
-
Nanavati, A.1
Gurumurthy, S.2
Das, G.3
Chakraborty, D.4
Dasgupta, K.5
Mukherjea, S.6
Joshi, A.7
-
54
-
-
50249142450
-
Robust de-anonymization of large sparse datasets
-
A. Narayanan and V. Shmatikov. Robust de-anonymization of large sparse datasets. In S&P, 2008.
-
(2008)
S&P
-
-
Narayanan, A.1
Shmatikov, V.2
-
56
-
-
34247205057
-
-
J.-P. Onnela, J. Saramäki, J. Hyvönen, G. Szabó, D. Lazer, K. Kaski, J. Kertész, and A.-L. Barabási. Structure and tie strengths in mobile communication networks. http://arxiv.org/abs/physics/ 0610104, 2006.
-
(2006)
Structure and Tie Strengths in Mobile Communication Networks
-
-
Onnela, J.-P.1
Saramäki, J.2
Hyvönen, J.3
Szabó, G.4
Lazer, D.5
Kaski, K.6
Kertész, J.7
Barabási, A.-L.8
-
57
-
-
70449690504
-
-
OpenID. http://openid.net, 2008.
-
(2008)
OpenID
-
-
-
62
-
-
0242456823
-
Mining knowledge-sharing sites for viral marketing
-
M. Richardson and P. Domingos. Mining knowledge-sharing sites for viral marketing. In KDD, 2002.
-
(2002)
KDD
-
-
Richardson, M.1
Domingos, P.2
-
66
-
-
0004282255
-
-
Duncker & Humblot, [Note: Simmel proposed a new and quantitative approach to sociology, one that would fall under Social Network Analysis in modern terms.]
-
Georg Simmel. Soziologie. Duncker & Humblot, 1908. [Note: Simmel proposed a new and quantitative approach to sociology, one that would fall under Social Network Analysis in modern terms.].
-
(1908)
Soziologie
-
-
Simmel, G.1
-
70
-
-
70249086969
-
Can social networks improve e-commerce: A study on social marketplaces
-
G. Swamynathan, C. Wilson, B. Boe, B. Zhao, and K. Almeroth. Can social networks improve e-commerce: a study on social marketplaces. In WOSN, 2008.
-
(2008)
WOSN
-
-
Swamynathan, G.1
Wilson, C.2
Boe, B.3
Zhao, B.4
Almeroth, K.5
-
73
-
-
0001504032
-
An experimental study of the small world problem
-
J. Travers and S. Milgram. An experimental study of the small world problem. Sociometry, 32(4):425-443, 1969.
-
(1969)
Sociometry
, vol.32
, Issue.4
, pp. 425-443
-
-
Travers, J.1
Milgram, S.2
-
75
-
-
0033432394
-
NicheWorks - Interactive visualization of very large graphs
-
G. Wills. NicheWorks - interactive visualization of very large graphs. Journal of Computational and Graphical Statistics, 8(2):190-212, 1999.
-
(1999)
Journal of Computational and Graphical Statistics
, vol.8
, Issue.2
, pp. 190-212
-
-
Wills, G.1
-
78
-
-
45749116664
-
SybilLimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A near-optimal social network defense against sybil attacks. In S&P, 2008.
-
(2008)
S&P
-
-
Yu, H.1
Gibbons, P.2
Kaminsky, M.3
Xiao, F.4
-
79
-
-
67650219221
-
Preserving the privacy of sensitive relationships in graph data
-
E. Zheleva and L. Getoor. Preserving the privacy of sensitive relationships in graph data. In PinKDD, 2007.
-
(2007)
PinKDD
-
-
Zheleva, E.1
Getoor, L.2
-
80
-
-
52649120205
-
Preserving privacy in social networks against neighborhood attacks
-
B. Zhou and J. Pei. Preserving privacy in social networks against neighborhood attacks. In ICDE, 2008.
-
(2008)
ICDE
-
-
Zhou, B.1
Pei, J.2
|