{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T15:13:26Z","timestamp":1725808406389},"publisher-location":"Cham","reference-count":24,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319120119"},{"type":"electronic","value":"9783319120126"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-12012-6_21","type":"book-chapter","created":{"date-parts":[[2014,10,31]],"date-time":"2014-10-31T15:09:45Z","timestamp":1414768185000},"page":"189-196","source":"Crossref","is-referenced-by-count":0,"title":["Enhanced Privacy and Surveillance for Online Social Networks"],"prefix":"10.1007","author":[{"given":"Teja","family":"Yaramasa","sequence":"first","affiliation":[]},{"given":"G. Krishna","family":"Kishore","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"21_CR1","doi-asserted-by":"crossref","unstructured":"Pelkola, D.: A Framework for Managing Privacy-Enhancing Technology. IEEE Software\u00a029(3) (June 2012)","DOI":"10.1109\/MS.2012.47"},{"key":"21_CR2","doi-asserted-by":"crossref","unstructured":"Jamali, M., Abolhassani, H.: Different Aspects of Social Network Analysis. In: IEEE\/WIC\/ACM International Conference on Web Intelligence (2006)","DOI":"10.1109\/WI.2006.61"},{"key":"21_CR3","doi-asserted-by":"publisher","first-page":"832","DOI":"10.1080\/01621459.1986.10478342","volume":"81","author":"O. Frank","year":"1986","unstructured":"Frank, O., Strauss, D.: Markov graphs. Journal of the American Statistical Association\u00a081, 832\u2013842 (1986)","journal-title":"Journal of the American Statistical Association"},{"key":"21_CR4","doi-asserted-by":"publisher","first-page":"401","DOI":"10.1007\/BF02294547","volume":"61","author":"S. Wasserman","year":"1994","unstructured":"Wasserman, S., Pattison, P.: Logit models and logistic regression for social networks: I. An introduction to Markov graphs and p! Psychometric Society\u00a061, 401\u2013425 (1994)","journal-title":"Psychometric Society"},{"key":"21_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1016\/S0378-8733(98)00012-4","volume":"21","author":"C. Anderson","year":"1999","unstructured":"Anderson, C., Wasserman, S., Crouch, B.: A p! primer: logit models for social networks. Social Networks\u00a021, 37\u201366 (1999)","journal-title":"Social Networks"},{"key":"21_CR6","doi-asserted-by":"crossref","unstructured":"Cutillo, L.A., Molva, R., Strufe, T.: Privacy Preserving Social Networking Through Decentralization. In: IEEE WONS 2009, Sixth International Conference on Wireless On-Demand Network Systems and Services, February 2-4 (2009)","DOI":"10.1109\/WONS.2009.4801860"},{"key":"21_CR7","doi-asserted-by":"crossref","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: WWW, April 20-24 (2009)","DOI":"10.1145\/1526709.1526784"},{"issue":"10","key":"21_CR8","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"T. Jagatic","year":"2007","unstructured":"Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM\u00a050(10), 94\u2013100 (2007)","journal-title":"Communications of the ACM"},{"key":"21_CR9","doi-asserted-by":"crossref","unstructured":"Cutillo, L.A., Molva, R., Onen, M.: Analysis of Privacy in Online Social Networks from the Graph Theory Perspective. In: IEEE, Global Telecommunications Conference (GLOBECOM 2011), December 5-9 (2011)","DOI":"10.1109\/GLOCOM.2011.6133517"},{"key":"21_CR10","doi-asserted-by":"crossref","unstructured":"Mitzenmacher, M., Upfal, E.: Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press (2005)","DOI":"10.1017\/CBO9780511813603"},{"key":"21_CR11","doi-asserted-by":"crossref","unstructured":"Malik, A.K., Dustdar, S.: Sharing and Privacy-Aware RBAC in Online Social Networks. In: IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.93"},{"key":"21_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/11957454_3","volume-title":"Privacy Enhancing Technologies","author":"A. Acquisti","year":"2006","unstructured":"Acquisti, A., Gross, R.: Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol.\u00a04258, pp. 36\u201358. Springer, Heidelberg (2006)"},{"key":"21_CR13","doi-asserted-by":"crossref","unstructured":"Wang, Y., Komanduri, S., Leon, P.G., Acquisti, G.N.A., Cranor, L.F.: I regretted the minute I pressed share: A Qualitative Study of Regrets on Facebook. In: Symposium on Usable Privacy and Security (SOUPS), July 20-22 (2011)","DOI":"10.1145\/2078827.2078841"},{"issue":"3","key":"21_CR14","doi-asserted-by":"publisher","first-page":"224","DOI":"10.1145\/501978.501980","volume":"4","author":"D. Ferraiolo","year":"2001","unstructured":"Ferraiolo, D., Sandhu, R., Gavrila, S., Kuhn, D.R., Chandramouli, R.: Proposed nist standard for role-based access control. ACM Transactions on Information and System Security\u00a04(3), 224\u2013274 (2001)","journal-title":"ACM Transactions on Information and System Security"},{"key":"21_CR15","doi-asserted-by":"crossref","unstructured":"Luo, W., Liu, J., Liu, J., Fan, C.: An Analysis of Security in Social Networks. In: Eighth IEEE International Conference on Dependable, Autonomic and Secure Computing, December 12-14 (2009)","DOI":"10.1109\/DASC.2009.100"},{"key":"21_CR16","doi-asserted-by":"crossref","unstructured":"Gross, R., Acquisti, A.: Information Revelation and Privacy in Online Social Networks. In: Workshop on Privacy in the Electronic Society (WPES), November 7 (2005)","DOI":"10.1145\/1102199.1102214"},{"key":"21_CR17","unstructured":"Rajalingam, M., Alomari, S.A., Sumar, P.: Prevention of Phishing Attacks Based on Discriminative Key Point Features of WebPages. International Journal of Computer Science and Security (IJCSS)\u00a06(1) (2012)"},{"key":"21_CR18","doi-asserted-by":"crossref","unstructured":"Jakobsson, M., Stamm, S.: Invasive Browser Sniffing and Countermeasures. In: 15th International World Wide Web Conference, May 23-26 (2006)","DOI":"10.1145\/1135777.1135854"},{"key":"21_CR19","doi-asserted-by":"crossref","unstructured":"Wondracek, G., Holz, T., Kirda, E., Kruegel, C.: A Practical Attack to De-anonymize Social Network Users. In: IEEE Symposium on Security and Privacy (SP), May 16-19 (2010)","DOI":"10.1109\/SP.2010.21"},{"key":"21_CR20","unstructured":"Novak, E., Li, Q.: A Survey of Security and Privacy in Online Social Networks. College of William and Mary Computer Science Technical Report (2012)"},{"key":"21_CR21","doi-asserted-by":"crossref","unstructured":"Lee, R., Nia, R., Hsu, J., Levitt, K.N., Rowe, J., Wu, S.F., Ye, S.: Design and implementation of faith, an experimental system to intercept and manipulate online social informatics. In: IEEE International Conference on Advances in Social Networks Analysis and Mining (ASONAM), pp. 195\u2013202 (July 2011)","DOI":"10.1109\/ASONAM.2011.86"},{"key":"21_CR22","doi-asserted-by":"crossref","unstructured":"Banks, L., Wu, S.F.: All Friends Are Not Created Equal: An Interaction Intensity Based Approach to Privacy in Online Social Networks. In: IEEE International Conference on Computational Science and Engineering, August 29-31 (2009)","DOI":"10.1109\/CSE.2009.429"},{"issue":"3","key":"21_CR23","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1109\/MSP.2013.47","volume":"11","author":"S. Gurses","year":"2013","unstructured":"Gurses, S., Diaz, C.: Two tales of privacy in online social networks. IEEE Security & Privacy\u00a011(3), 29\u201337 (2013)","journal-title":"IEEE Security & Privacy"},{"key":"21_CR24","unstructured":"Shostack, A.: Experiences Threat Modeling at Microsoft. Microsoft (2008)"}],"container-title":["Advances in Intelligent Systems and Computing","Proceedings of the 3rd International Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-12012-6_21","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T14:49:00Z","timestamp":1676904540000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-12012-6_21"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319120119","9783319120126"],"references-count":24,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-12012-6_21","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2015]]}}}