-
1
-
-
84855672660
-
-
Gnip. http://www.gnip.com.
-
Gnip
-
-
-
3
-
-
84882750204
-
An analysis of private browsing modes in modern browsers
-
AGGRAWAL, G., BURSZTEIN, E., JACKSON, C., AND BONEH, D. An analysis of private browsing modes in modern browsers. In Proceedings of the USENIX Security Symposium (2010).
-
Proceedings of the USENIX Security Symposium (2010)
-
-
Aggrawal, G.1
Bursztein, E.2
Jackson, C.3
Boneh, D.4
-
4
-
-
81855181114
-
-
Amazon.com
-
Amazon.com Mechanical Turk, https://www.mturk.com/mturk/welcome.
-
Mechanical Turk
-
-
-
5
-
-
78649296970
-
Abusing social networks for automated user profiling
-
BALDUZZI, M., PLATZER, C., HOLZ, T., KIRDA, E., BALZAROTTI, D., AND KRUEGEL, C. Abusing social networks for automated user profiling. In RAID'2010, 13th International Symposium on Recent Advances in Intrusion Detection (09 2010).
-
RAID'2010, 13th International Symposium on Recent Advances in Intrusion Detection (09 2010)
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
6
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
BILGE, L., STRUFE, T., BALZAROTTI, D., AND KIRDA, E. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th International Conference on World Wide Web (WWW) (2009).
-
Proceedings of the 18th International Conference on World Wide Web (WWW) (2009)
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
-
7
-
-
78751497789
-
Relationships and Data Sanitization: A Study in Scarlet
-
BISHOP, M., CUMMINS, J., PEISERT, S., SINGH, A., BHUMIRATANA, B., AGARWAL, D., FRINCKE, D., AND HOGARTH, M. Relationships and Data Sanitization: A Study in Scarlet. In Proc. Workshop on New Security Paradigms (2010).
-
Proc. Workshop on New Security Paradigms (2010)
-
-
Bishop, M.1
Cummins, J.2
Peisert, S.3
Singh, A.4
Bhumiratana, B.5
Agarwal, D.6
Frincke, D.7
Hogarth, M.8
-
12
-
-
84855708292
-
-
CRAY INC. Cray XMT. http://www.cray.com/products/xmt/.
-
Cray XMT
-
-
-
15
-
-
70349305273
-
Differential privacy: A survey of results
-
Theory and Applications of Models of Computation, Springer Berlin / Heidelberg
-
DWORK, C. Differential privacy: A survey of results. In Theory and Applications of Models of Computation, vol. 4978 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2008, pp. 1-19.
-
(2008)
Lecture Notes in Computer Science
, vol.4978
, pp. 1-19
-
-
Dwork, C.1
-
16
-
-
84855663309
-
Analytics for Experts
-
April
-
FRIEDLAND, G. Analytics for Experts. ACM SIGMM Reecords 1, 1 (April 2009).
-
(2009)
ACM SIGMM Reecords
, vol.1
, pp. 1
-
-
Friedland, G.1
-
19
-
-
67651165389
-
Prosodic and Other Long-Term Features for Speaker Diarization
-
FRIEDLAND, G., VINYALS, O., HUANG, Y., AND MÜLLER, C. Prosodic and Other Long-Term Features for Speaker Diarization. Transactions on Audio, Speech, and Language Processing 17, 5 (2009), 985-993.
-
(2009)
Transactions on Audio, Speech, and Language Processing
, vol.17
, Issue.5
, pp. 985-993
-
-
Friedland, G.1
Vinyals, O.2
Huang, Y.3
Müller, C.4
-
21
-
-
84855714800
-
-
H-SECURITY
-
H-SECURITY. Cree.py application knows where you've been. http://www.h-online.com/security/news/item/ Cree-py-application-knows-where-you- ve-been-1217981. html.
-
Cree.py Application Knows Where You've Been
-
-
-
22
-
-
85127507791
-
Virtual trip lines for distributed privacy-preserving traffic monitoring
-
HOH, B., GRUTESER, M., HERRING, R., BAN, J., WORK, D., HERRERA, J.-C., BAYEN, A. M., ANNAVARAM, M., AND JACOBSON, Q. Virtual trip lines for distributed privacy-preserving traffic monitoring. In MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services (2008).
-
MobiSys '08: Proceeding of the 6th International Conference on Mobile Systems, Applications, and Services (2008)
-
-
Hoh, B.1
Gruteser, M.2
Herring, R.3
Ban, J.4
Work, D.5
Herrera, J.-C.6
Bayen, A.M.7
Annavaram, M.8
Jacobson, Q.9
-
25
-
-
34848911641
-
Social phishing
-
JAGATIC, T., JOHNSON, N., JAKOBSSON, M., AND MENCZER, F. Social phishing. Communications of the ACM 50, 10 (2007).
-
(2007)
Communications of the ACM
, vol.50
, pp. 10
-
-
Jagatic, T.1
Johnson, N.2
Jakobsson, M.3
Menczer, F.4
-
34
-
-
84905879388
-
Critics Say Google Invades Privacy with New Service
-
Feb 13
-
NEW YORK TIMES. Critics Say Google Invades Privacy With New Service. Feb 13, 2010.
-
(2010)
New York Times
-
-
-
35
-
-
84855678914
-
A tragedy that won't fade away
-
Apr
-
NEWSWEEK. A tragedy that won't fade away, Apr 2009. http://www.newsweek. com/2009/04/24/ a-tragedy-that-won-t-fade-away.html.
-
(2009)
Newsweek
-
-
-
38
-
-
84855714804
-
2010 MediaEval Placing Task
-
PETAMEDIA. 2010 MediaEval Placing Task, http: //www.multimediaeval.org/ placing/placing.html.
-
PetaMedia
-
-
-
39
-
-
79952954994
-
Improving Face Recognition Technology
-
March
-
PHILLIPS, P. J. Improving Face Recognition Technology. Computer 44, 3 (March 2011), 84-86.
-
(2011)
Computer
, vol.44
, Issue.3
, pp. 84-86
-
-
Phillips, P.J.1
-
43
-
-
84855678915
-
-
Tech. rep., International Relations and Security Network, ETH Zurich
-
SCHAURER, F., AND STöRGER, J. OSINT Report 3/2010 - The Evolution of Open Source Intelligence. Tech. rep., International Relations and Security Network, ETH Zurich, 2010.
-
(2010)
OSINT Report 3/2010 - The Evolution of Open Source Intelligence
-
-
Schaurer, F.1
Stãrger, J.2
-
45
-
-
84855697246
-
Setting Hurdles for Google and Others: Germans Like to Look, but Not to Be Looked at
-
SPIEGEL ONLINE. Setting Hurdles for Google and Others: Germans Like to Look, But Not to Be Looked At. http://www.spiegel.de/international/germany/0, 1518,712485,00.html, 2010.
-
(2010)
Spiegel Online
-
-
-
47
-
-
0031150446
-
Weaving technology and policy together to maintain confidentiality
-
SWEENEY, L. Weaving technology and policy together to maintain confidentiality. Journal of Law, Medicine, and Ethics 25, 2-3 (1997).
-
(1997)
Journal of Law, Medicine, and Ethics
, vol.25
, pp. 2-3
-
-
Sweeney, L.1
-
49
-
-
84855697245
-
Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data
-
TAIPALE, K. A. Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data. SSRN eLibrary.
-
SSRN eLibrary
-
-
Taipale, K.A.1
-
50
-
-
77957171368
-
The Web's New Gold Mine: Your Secrets
-
Jul 30
-
THE WALL STREET JOURNAL. The Web's New Gold Mine: Your Secrets. Jul 30, 2010.
-
(2010)
The Wall Street Journal
-
-
-
53
-
-
83655213531
-
-
WIKIPEDIA. Advanced Persistent Thread (APT). http://en.wikipedia.org/ wiki/Advanced- Persistent-Threat, 2011.
-
(2011)
Advanced Persistent Thread (APT)
-
-
-
54
-
-
77955214796
-
A practical attack to de-anonymize social network users
-
WONDRACEK, G., HOLZ, T., KIRDA, E., AND KRUEGEL, C. A practical attack to de-anonymize social network users. In Proceedings of the IEEE Symposium on Security and Privacy (2010).
-
Proceedings of the IEEE Symposium on Security and Privacy (2010)
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
58
-
-
77951287826
-
Louis, lester and pierre: Three protocols for location privacy
-
ZHONG, G., GOLDBERG, I., AND HENGARTNER, U. Louis, lester and pierre: Three protocols for location privacy. In Proceedings of the Privacy Enhancing Technologies Symposium (2007).
-
Proceedings of the Privacy Enhancing Technologies Symposium (2007)
-
-
Zhong, G.1
Goldberg, I.2
Hengartner, U.3
|