-
1
-
-
77955214796
-
A Practical Attack to De-anonymize Social Network Users
-
G. Wondracek, T. Holz, E. Kirda, and C. Kruegel, "A Practical Attack to De-anonymize Social Network Users," in IEEE S&P '10, May 2010.
-
IEEE S&P '10, May 2010
-
-
Wondracek, G.1
Holz, T.2
Kirda, E.3
Kruegel, C.4
-
2
-
-
78249282277
-
Abusing social networks for automated user profiling
-
Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. Berlin, Heidelberg: Springer-Verlag, Online. Available
-
M. Balduzzi, C. Platzer, T. Holz, E. Kirda, D. Balzarotti, and C. Kruegel, "Abusing social networks for automated user profiling," in Proceedings of the 13th international conference on Recent advances in intrusion detection, ser. RAID'10. Berlin, Heidelberg: Springer-Verlag, 2010, pp. 422-441. [Online]. Available: http://portal.acm.org/citation. cfm?id=1894166.1894195
-
(2010)
RAID'10
, pp. 422-441
-
-
Balduzzi, M.1
Platzer, C.2
Holz, T.3
Kirda, E.4
Balzarotti, D.5
Kruegel, C.6
-
4
-
-
77958454798
-
Persona: An Online Social Network with User-defined Privacy
-
ACM
-
R. Baden, A. Bender, N. Spring, B. Bhattacharjee, and D. Starin, "Persona: An Online Social Network with User-defined Privacy," in SIGCOMM '09. ACM, 2009.
-
(2009)
SIGCOMM '09
-
-
Baden, R.1
Bender, A.2
Spring, N.3
Bhattacharjee, B.4
Starin, D.5
-
6
-
-
79951635390
-
Optimal Content Placement for a Large-Scale VoD System
-
ACM
-
D. Applegate, A. Archer, V. Gopalakrishnan, S. Lee, and K. Ramakrishnan, "Optimal Content Placement for a Large-Scale VoD System," in CoNEXT '10. ACM, 2010.
-
(2010)
CoNEXT '10
-
-
Applegate, D.1
Archer, A.2
Gopalakrishnan, V.3
Lee, S.4
Ramakrishnan, K.5
-
7
-
-
33847272260
-
On the feasibility of commercial, legal P2P content distribution
-
DOI 10.1145/1111322.1111339
-
P. Rodriguez, S.-M. Tan, and C. Gkantsidis, "On the Feasibility of Commercial, Legal P2P Content Distribution," SIGCOMM Comput. Commun. Rev., vol. 36, pp. 75-78, January 2006. (Pubitemid 46323587)
-
(2006)
Computer Communication Review
, vol.36
, Issue.1
, pp. 75-78
-
-
Rodriguez, P.1
Tan, S.-M.2
Gkantsidis, C.3
-
8
-
-
77956953218
-
Measuring User Behavior in Online Social Networks
-
September
-
L. Gyarmati and T. Trinh, "Measuring User Behavior in Online Social Networks," IEEE Network, vol. 24, no. 5, pp. 26 -31, September 2010.
-
(2010)
IEEE Network
, vol.24
, Issue.5
, pp. 26-31
-
-
Gyarmati, L.1
Trinh, T.2
-
9
-
-
70450172971
-
PeerSoN: P2P Social Networking: Early Experiences and Insights
-
ACM
-
S. Buchegger, D. Schiöberg, L.-H. Vu, and A. Datta, "PeerSoN: P2P Social Networking: Early Experiences and Insights," in SNS '09. ACM, 2009.
-
(2009)
SNS '09
-
-
Buchegger, S.1
Schiöberg, D.2
Vu, L.-H.3
Datta, A.4
-
10
-
-
72949088489
-
Safebook: A Privacy-preserving Online Social Network Leveraging on Real-life Trust
-
L. Cutillo, R. Molva, and T. Strufe, "Safebook: A Privacy-preserving Online Social Network Leveraging on Real-life Trust," Com. Mag., IEEE, vol. 47, no. 12, pp. 94-101, 2009.
-
(2009)
Com. Mag., IEEE
, vol.47
, Issue.12
, pp. 94-101
-
-
Cutillo, L.1
Molva, R.2
Strufe, T.3
-
12
-
-
84857203061
-
Optimizing Peer-to-Peer Backup Using Lifetime Estimations
-
ACM
-
S. Bernard and F. Le Fessant, "Optimizing Peer-to-Peer Backup Using Lifetime Estimations," in EDBT/ICDT Workshops '09. ACM, 2009.
-
(2009)
EDBT/ICDT Workshops '09
-
-
Bernard, S.1
Le Fessant, F.2
-
14
-
-
0038718854
-
The Structure and Function of Complex Networks
-
M. E. J. Newman, "The Structure and Function of Complex Networks," SIAM REVIEW, vol. 45, pp. 167-256, 2003.
-
(2003)
SIAM REVIEW
, vol.45
, pp. 167-256
-
-
Newman, M.E.J.1
-
15
-
-
42149117427
-
Measurement and Analysis of Online Social Networks
-
ACM
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee, "Measurement and Analysis of Online Social Networks," in SIGCOMM IMC '07. ACM, 2007.
-
(2007)
SIGCOMM IMC '07
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
16
-
-
84877781555
-
Characterizing User Behavior in Online Social Networks
-
ACM
-
F. Benevenuto, T. Rodrigues, M. Cha, and V. Almeida, "Characterizing User Behavior in Online Social Networks," in IMC '09. ACM, 2009.
-
(2009)
IMC '09
-
-
Benevenuto, F.1
Rodrigues, T.2
Cha, M.3
Almeida, V.4
-
17
-
-
84865622599
-
All your contacts are belong to us: Automated identity theft attacks on social networks
-
ACM
-
L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda, "All your contacts are belong to us: automated identity theft attacks on social networks," in WWW '09. ACM, 2009.
-
(2009)
WWW '09
-
-
Bilge, L.1
Strufe, T.2
Balzarotti, D.3
Kirda, E.4
|