{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T14:17:39Z","timestamp":1726064259701},"publisher-location":"Cham","reference-count":96,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030222765"},{"type":"electronic","value":"9783030222772"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-22277-2_11","type":"book-chapter","created":{"date-parts":[[2019,12,31]],"date-time":"2019-12-31T12:02:28Z","timestamp":1577793748000},"page":"265-293","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Security and Privacy in Social Networks: Data and Structural Anonymity"],"prefix":"10.1007","author":[{"given":"R.","family":"Jain","sequence":"first","affiliation":[]},{"given":"N.","family":"Jain","sequence":"additional","affiliation":[]},{"given":"A.","family":"Nayyar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,1,1]]},"reference":[{"issue":"7\u20138","key":"11_CR1","doi-asserted-by":"publisher","first-page":"473","DOI":"10.1089\/cyber.2010.0267","volume":"14","author":"C Hsu","year":"2011","unstructured":"Hsu, C., Wang, C., & Tai, Y. (2011). The closer the relationship, the more the interaction on Facebook? Investigating the case of Taiwan users. Cyberpsychology, Behavior and Social Networking, 14(7\u20138), 473\u2013476.","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"11_CR2","volume-title":"An invitation to reflexive sociology","author":"P Bourdieu","year":"1992","unstructured":"Bourdieu, P., & Wacquant, L. (1992). An invitation to reflexive sociology (1st ed.). Chicago: University of Chicago Press.","edition":"1"},{"issue":"3","key":"11_CR3","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1287\/isre.1070.0158","volume":"19","author":"G Kane","year":"2008","unstructured":"Kane, G., & Alavi, M. (2008). Casting the net: A multimodal network perspective on user-system interactions. Information Systems Research, 19(3), 253\u2013272.","journal-title":"Information Systems Research"},{"issue":"4","key":"11_CR4","doi-asserted-by":"publisher","first-page":"1143","DOI":"10.1111\/j.1083-6101.2007.00367.x","volume":"12","author":"N Ellison","year":"2007","unstructured":"Ellison, N., Steinfield, C., & Lampe, C. (2007). The benefits of Facebook \u201cFriends:\u201d Social capital and college students\u2019 use of online social network sites. Journal of Computer-Mediated Communication, 12(4), 1143\u20131168.","journal-title":"Journal of Computer-Mediated Communication"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"335","DOI":"10.1287\/isre.1080.0191","volume":"19","author":"M Trier","year":"2008","unstructured":"Trier, M. (2008). Towards dynamic visualization for understanding evolution of digital communication networks. Information Systems Research, 19(3), 335\u2013350.","journal-title":"Information Systems Research"},{"issue":"24","key":"11_CR6","doi-asserted-by":"publisher","first-page":"5234","DOI":"10.1103\/PhysRevLett.85.5234","volume":"85","author":"R Albert","year":"2000","unstructured":"Albert, R., & Barab\u00e1si, A. (2000). Topology of evolving networks: Local events and universality. Physical Review Letters, 85(24), 5234\u20135237.","journal-title":"Physical Review Letters"},{"issue":"2","key":"11_CR7","doi-asserted-by":"publisher","first-page":"025102","DOI":"10.1103\/PhysRevE.64.025102","volume":"64","author":"M Newman","year":"2001","unstructured":"Newman, M. (2001). Clustering and preferential attachment in growing networks. Physical Review E, 64(2), 025102.","journal-title":"Physical Review E"},{"issue":"1\u20132","key":"11_CR8","first-page":"75","volume":"14","author":"L Carlyne","year":"2011","unstructured":"Carlyne, L., & Kujath, B. (2011). Facebook and MySpace: Complement or substitute for face-to-face interaction? Cyberpsychology, Behavior and Social Networking, 14(1\u20132), 75\u201378.","journal-title":"Cyberpsychology, Behavior and Social Networking"},{"key":"11_CR9","unstructured":"Dam, W. B. (2009). School teacher suspended for Facebook gun photo. http:\/\/www.foxnews.com\/story\/2009\/02\/05\/schoolteacher-suspended-for-facebook-gun-photo\/"},{"key":"11_CR10","unstructured":"Mail, D. (2011). Bank worker fired for Facebook post comparing her 7-an-hour wage to Lloyds boss\u2019s 4000-an-hour salary. http:\/\/dailym.ai\/fjRTlC"},{"key":"11_CR11","doi-asserted-by":"publisher","first-page":"1825","DOI":"10.1109\/IJCNN.2011.6033446","volume-title":"Proceedings of the 2011 international joint conference on neural networks (IJCNN)","author":"A Narayanan","year":"2011","unstructured":"Narayanan, A., Shi, E., & Rubinstein, B. I. (2011). Link prediction by de-anonymization: How we won the Kaggle social network challenge. In Proceedings of the 2011 international joint conference on neural networks (IJCNN) (pp. 1825\u20131834). New York: IEEE."},{"key":"11_CR12","first-page":"277","volume-title":"Privacy in social networks: A survey","author":"E Zheleva","year":"2007","unstructured":"Zheleva, E., & Getoor, L. (2007). Privacy in social networks: A survey (pp. 277\u2013306). New York: Springer."},{"issue":"3","key":"11_CR13","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1145\/2034575.2034593","volume":"42","author":"H Yu","year":"2011","unstructured":"Yu, H. (2011). Sybil defences via social networks: A tutorial and survey. SIGACT News, 42(3), 80\u2013101.","journal-title":"SIGACT News"},{"issue":"4","key":"11_CR14","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1109\/MNET.2010.5510913","volume":"24","author":"C Zhang","year":"2010","unstructured":"Zhang, C., Sun, J., Zhu, X., & Fang, Y. (2010). Privacy and security for online social networks: Challenges and opportunities. IEEE Network, 24(4), 13\u201318.","journal-title":"IEEE Network"},{"issue":"4","key":"11_CR15","doi-asserted-by":"publisher","first-page":"2019","DOI":"10.1109\/COMST.2014.2321628","volume":"16","author":"M Fire","year":"2014","unstructured":"Fire, M., Goldschmidt, R., & Elovici, Y. (2014). Online social networks: Threats and solutions. IEEE Communications Surveys and Tutorials, 16(4), 2019\u20132036.","journal-title":"IEEE Communications Surveys and Tutorials"},{"issue":"2","key":"11_CR16","first-page":"2","volume":"43","author":"EY Baagyere","year":"2016","unstructured":"Baagyere, E. Y., Qin, Z., Xiong, H., & Zhiguang, Q. (2016). The structural properties of online social networks and their application areas. IAENG International Journal of Computer Science, 43(2), 2.","journal-title":"IAENG International Journal of Computer Science"},{"key":"11_CR17","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1609\/icwsm.v4i1.14027","volume":"10","author":"D Cosley","year":"2010","unstructured":"Cosley, D., Huttenlocher, D. P., Kleinberg, J. M., Lan, X., & Suri, S. (2010). Sequential influence models in social networks. ICWSM, 10, 26.","journal-title":"ICWSM"},{"key":"11_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/1718487.1718518","volume-title":"Proceedings of the third ACM international conference on web search and data mining","author":"A Goyal","year":"2010","unstructured":"Goyal, A., Bonchi, F., & Lakshmanan, L. V. (2010, February). Learning influence probabilities in social networks. In Proceedings of the third ACM international conference on web search and data mining (pp. 241\u2013250). New York: ACM."},{"key":"11_CR19","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/1150402.1150412","volume-title":"Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining","author":"L Backstrom","year":"2006","unstructured":"Backstrom, L., Huttenlocher, D., Kleinberg, J., & Lan, X. (2006, August). Group formation in large social networks: Membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining (pp. 44\u201354). New York: ACM."},{"issue":"5757","key":"11_CR20","doi-asserted-by":"publisher","first-page":"88","DOI":"10.1126\/science.1116869","volume":"311","author":"G Kossinets","year":"2006","unstructured":"Kossinets, G., & Watts, D. J. (2006). Empirical analysis of an evolving social network. Science, 311(5757), 88\u201390.","journal-title":"Science"},{"key":"11_CR21","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/775047.775057","volume-title":"Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining","author":"M Richardson","year":"2002","unstructured":"Richardson, M., & Domingos, P. (2002, July). Mining knowledge-sharing sites for viral marketing. In Proceedings of the eighth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 61\u201370). New York: ACM."},{"key":"11_CR22","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1145\/502512.502525","volume-title":"Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining","author":"P Domingos","year":"2001","unstructured":"Domingos, P., & Richardson, M. (2001, August). Mining the network value of customers. In Proceedings of the seventh ACM SIGKDD international conference on knowledge discovery and data mining (pp. 57\u201366). New York: ACM."},{"issue":"6","key":"11_CR23","doi-asserted-by":"publisher","first-page":"1420","DOI":"10.1086\/226707","volume":"83","author":"M Granovetter","year":"1978","unstructured":"Granovetter, M. (1978). Threshold models of collective behavior. American Journal of Sociology, 83(6), 1420\u20131443.","journal-title":"American Journal of Sociology"},{"key":"11_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/956750.956769","volume-title":"Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining","author":"D Kempe","year":"2003","unstructured":"Kempe, D., Kleinberg, J., & Tardos, \u00c9. (2003, August). Maximizing the spread of influence through a social network. In Proceedings of the ninth ACM SIGKDD international conference on knowledge discovery and data mining (pp. 137\u2013146). New York: ACM."},{"key":"11_CR25","unstructured":"Privacy: Stanford encyclopedia of philosophy, 2002."},{"key":"11_CR26","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1145\/501158.501163","volume-title":"Proceedings of the 3rd ACM conference on electronic commerce","author":"S Spiekermann","year":"2001","unstructured":"Spiekermann, S., Grossklags, J., & Berendt, B. (2001, October). E-privacy in 2nd generation E-commerce: Privacy preferences versus actual behavior. In Proceedings of the 3rd ACM conference on electronic commerce (pp. 38\u201347). New York: ACM."},{"key":"11_CR27","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/2076732.2076746","volume-title":"Proceedings of the 27th annual computer security applications conference","author":"Y Boshmaf","year":"2011","unstructured":"Boshmaf, Y., Muslukhov, I., Beznosov, K., & Ripeanu, M. (2011, December). The socialbot network: When bots socialize for fame and money. In Proceedings of the 27th annual computer security applications conference (pp. 93\u2013102). New York: ACM."},{"key":"11_CR28","doi-asserted-by":"crossref","first-page":"551","DOI":"10.1145\/1526709.1526784","volume-title":"Proceedings of the 18th international conference on World wide web","author":"L Bilge","year":"2009","unstructured":"Bilge, L., Strufe, T., Balzarotti, D., & Kirda, E. (2009, April). All your contacts are belong to us: Automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World wide web (pp. 551\u2013560). New York: ACM."},{"key":"11_CR29","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1109\/3PGCIC.2012.46","volume-title":"2012 Seventh international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC)","author":"S Mahmood","year":"2012","unstructured":"Mahmood, S. (2012, November). New privacy threats for Facebook and twitter users. In 2012 Seventh international conference on P2P, parallel, grid, cloud and internet computing (3PGCIC) (pp. 164\u2013169). New York: IEEE."},{"key":"11_CR30","doi-asserted-by":"publisher","first-page":"2836","DOI":"10.1109\/INFCOM.2012.6195711","volume-title":"INFOCOM, 2012 proceedings IEEE","author":"R Dey","year":"2012","unstructured":"Dey, R., Tang, C., Ross, K., & Saxena, N. (2012, March). Estimating age privacy leakage in online social networks. In INFOCOM, 2012 proceedings IEEE (pp. 2836\u20132840). New York: IEEE."},{"key":"11_CR31","volume-title":"Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)","author":"A Chaabane","year":"2012","unstructured":"Chaabane, A., Acs, G., & Kaafar, M. A. (2012, February). You are what you like! Information leakage through users\u2019 interests. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS)."},{"issue":"8","key":"11_CR32","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/S1361-3723(08)70128-3","volume":"2008","author":"R Power","year":"2008","unstructured":"Power, R., & Forte, D. (2008). War & peace in cyberspace: Don\u2019t Twitter away your organisation\u2019s secrets. Computer Fraud and Security, 2008(8), 18\u201320.","journal-title":"Computer Fraud and Security"},{"issue":"3","key":"11_CR33","doi-asserted-by":"publisher","first-page":"640","DOI":"10.1109\/TC.2013.2295802","volume":"64","author":"S Wen","year":"2015","unstructured":"Wen, S., Haghighi, M. S., Chen, C., Xiang, Y., Zhou, W., & Jia, W. (2015). A sword with two edges: Propagation studies on both positive and negative information in online social networks. IEEE Transactions on Computers, 64(3), 640\u2013653.","journal-title":"IEEE Transactions on Computers"},{"key":"11_CR34","first-page":"131","volume":"18","author":"TN Foster","year":"2012","unstructured":"Foster, T. N., & Greene, C. R. (2012). Legal issues of online social networks and the workplace. Journal of Law, Business and Ethics, 18, 131.","journal-title":"Journal of Law, Business and Ethics"},{"issue":"4","key":"11_CR35","doi-asserted-by":"publisher","first-page":"363","DOI":"10.1145\/1851275.1851226","volume":"41","author":"B Viswanath","year":"2011","unstructured":"Viswanath, B., Post, A., Gummadi, K. P., & Mislove, A. (2011). An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review, 41(4), 363\u2013374.","journal-title":"ACM SIGCOMM Computer Communication Review"},{"key":"11_CR36","first-page":"1","volume-title":"NDSS","author":"G Danezis","year":"2009","unstructured":"Danezis, G., & Mittal, P. (2009, February). SybilInfer: Detecting sybil nodes using social networks. In NDSS (pp. 1\u201315)."},{"key":"11_CR37","volume-title":"Symposium on network and distributed system security (NDSS)","author":"M Egele","year":"2013","unstructured":"Egele, M., Stringhini, G., Kruegel, C., & Vigna, G. (2013). Compa: Detecting compromised social network accounts. In Symposium on network and distributed system security (NDSS)."},{"issue":"6","key":"11_CR38","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1109\/MIC.2007.125","volume":"11","author":"P Heymann","year":"2007","unstructured":"Heymann, P., Koutrika, G., & Garcia-Molina, H. (2007). Fighting spam on social web sites: A survey of approaches and future challenges. IEEE Internet Computing, 11(6), 36\u201345.","journal-title":"IEEE Internet Computing"},{"key":"11_CR39","volume-title":"Internet denial of service: Attack and defense mechanisms","author":"D Dittrich","year":"2004","unstructured":"Dittrich, D., Reiher, P., & Dietrich, S. (2004). Internet denial of service: Attack and defense mechanisms. London: Pearson Education."},{"issue":"3","key":"11_CR40","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MIC.2011.24","volume":"15","author":"M Huber","year":"2011","unstructured":"Huber, M., Mulazzani, M., Weippl, E., Kitzler, G., & Goluch, S. (2011). Friend-in-the-middle attacks: Exploiting social networking sites for spam. IEEE Internet Computing, 15(3), 28\u201334.","journal-title":"IEEE Internet Computing"},{"issue":"2","key":"11_CR41","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1145\/1165734.1165735","volume":"13","author":"LF Cranor","year":"2006","unstructured":"Cranor, L. F., Guduru, P., & Arjula, M. (2006). User interfaces for privacy agents. ACM Transactions on Computer-Human Interaction (TOCHI), 13(2), 135\u2013178.","journal-title":"ACM Transactions on Computer-Human Interaction (TOCHI)"},{"key":"11_CR42","unstructured":"Danezis, G., Domingo-Ferrer, J., Hansen, M., Hoepman, J. H., Metayer, D. L., Tirtea, R., & Schiffner, S. (2015). Privacy and data protection by design-from policy to engineering. arXiv preprint arXiv:1501.03726."},{"issue":"4","key":"11_CR43","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MIC.2011.50","volume":"15","author":"H Gao","year":"2011","unstructured":"Gao, H., Hu, J., Huang, T., Wang, J., & Chen, Y. (2011). Security issues in online social networks. IEEE Internet Computing, 15(4), 56\u201363.","journal-title":"IEEE Internet Computing"},{"key":"11_CR44","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1145\/1397735.1397747","volume-title":"Proceedings of the first workshop on online social networks","author":"S Guha","year":"2008","unstructured":"Guha, S., Tang, K., & Francis, P. (2008, August). NOYB: Privacy in online social networks. In Proceedings of the first workshop on online social networks (pp. 49\u201354). New York: ACM."},{"issue":"1","key":"11_CR45","doi-asserted-by":"publisher","first-page":"83","DOI":"10.1111\/j.1083-6101.2009.01494.x","volume":"15","author":"B Debatin","year":"2009","unstructured":"Debatin, B., Lovejoy, J. P., Horn, A. K., & Hughes, B. N. (2009). Facebook and online privacy: Attitudes, behaviors, and unintended consequences. Journal of Computer-Mediated Communication, 15(1), 83\u2013108.","journal-title":"Journal of Computer-Mediated Communication"},{"key":"11_CR46","first-page":"506","volume-title":"IEEE 24th international conference on data engineering, 2008. ICDE 2008","author":"B Zhou","year":"2008","unstructured":"Zhou, B., & Pei, J. (2008, April). Preserving privacy in social networks against neighborhood attacks. In IEEE 24th international conference on data engineering, 2008. ICDE 2008 (pp. 506\u2013515). New York: IEEE."},{"issue":"8","key":"11_CR47","doi-asserted-by":"publisher","first-page":"1849","DOI":"10.1109\/TKDE.2012.120","volume":"25","author":"R Heatherly","year":"2013","unstructured":"Heatherly, R., Kantarcioglu, M., & Thuraisingham, B. (2013). Preventing private information inference attacks on social networks. IEEE Transactions on Knowledge and Data Engineering, 25(8), 1849\u20131862.","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"11_CR48","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1007\/978-1-4419-8462-3_10","volume-title":"Social network data analytics","author":"E Zheleva","year":"2011","unstructured":"Zheleva, E., & Getoor, L. (2011). Privacy in social networks: A survey. In Social network data analytics (pp. 277\u2013306). Boston: Springer."},{"key":"11_CR49","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-3-319-05164-2_10","volume-title":"Social networking","author":"BK Tripathy","year":"2014","unstructured":"Tripathy, B. K., Sishodia, M. S., Jain, S., & Mitra, A. (2014). Privacy and anonymization in social networks. In Social networking (pp. 243\u2013270). Cham: Springer."},{"key":"11_CR50","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/ICDE.2006.1","volume-title":"22nd International Conference on Data Engineering (ICDE\u201906)","author":"A Machanavajjhala","year":"2006","unstructured":"Machanavajjhala, A., Gehrke, J., Kifer, D., & Venkitasubramaniam, M. (2006, April). \\ell-Diversity: Privacy beyond\\kappa-anonymity. In 22nd International Conference on Data Engineering (ICDE\u201906) (p. 24). New York: IEEE."},{"key":"11_CR51","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1109\/ICDE.2007.367856","volume-title":"IEEE 23rd international conference on data engineering, 2007. ICDE 2007","author":"N Li","year":"2007","unstructured":"Li, N., Li, T., & Venkatasubramanian, S. (2007, April). T-closeness: Privacy beyond k-anonymity and l-diversity. In IEEE 23rd international conference on data engineering, 2007. ICDE 2007 (pp. 106\u2013115). New York: IEEE."},{"key":"11_CR52","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1145\/1242572.1242598","volume-title":"Proceedings of the 16th international conference on world wide web","author":"L Backstrom","year":"2007","unstructured":"Backstrom, L., Dwork, C., & Kleinberg, J. (2007, May). Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography. In Proceedings of the 16th international conference on world wide web (pp. 181\u2013190). New York: ACM."},{"key":"11_CR53","first-page":"595","volume-title":"EDBT","author":"A Zhang","year":"2014","unstructured":"Zhang, A., Xie, X., Chang, K. C. C., Gunter, C. A., Han, J., & Wang, X. (2014, March). Privacy risk in anonymized heterogeneous information networks. In EDBT (pp. 595\u2013606)."},{"key":"11_CR54","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1145\/2512938.2512952","volume-title":"Proceedings of the first ACM conference on online social networks","author":"L Yartseva","year":"2013","unstructured":"Yartseva, L., & Grossglauser, M. (2013, October). On the performance of percolation graph matching. In Proceedings of the first ACM conference on online social networks (pp. 119\u2013130). New York: ACM."},{"issue":"5","key":"11_CR55","doi-asserted-by":"publisher","first-page":"377","DOI":"10.14778\/2732269.2732274","volume":"7","author":"N Korula","year":"2014","unstructured":"Korula, N., & Lattanzi, S. (2014). An efficient reconciliation algorithm for social networks. Proceedings of the VLDB Endowment, 7(5), 377\u2013388.","journal-title":"Proceedings of the VLDB Endowment"},{"key":"11_CR56","doi-asserted-by":"crossref","unstructured":"Ji, S., Li, W., Gong, N. Z., Mittal, P., & Beyah, R. A. (2015, February). On your social network de-anonymizablity: Quantification and large scale evaluation with seed knowledge. In NDSS.","DOI":"10.14722\/ndss.2015.23096"},{"issue":"7","key":"11_CR57","doi-asserted-by":"publisher","first-page":"1398","DOI":"10.1109\/TIFS.2016.2529591","volume":"11","author":"S Ji","year":"2016","unstructured":"Ji, S., Li, W., Gong, N. Z., Mittal, P., & Beyah, R. A. (2016). Seed based deanonymizability quantification of social networks. IEEE Transactions on Information Forensics and Security (TIFS), 11(7), 1398\u20131411.","journal-title":"IEEE Transactions on Information Forensics and Security (TIFS)"},{"key":"11_CR58","unstructured":"Beigi, G., & Liu, H. (2018). Privacy in social media: Identification, mitigation and applications. arXiv preprint arXiv:1808.02191."},{"key":"11_CR59","doi-asserted-by":"publisher","first-page":"914","DOI":"10.1016\/j.future.2016.10.007","volume":"86","author":"Z Zhang","year":"2018","unstructured":"Zhang, Z., & Gupta, B. B. (2018). Social media security and trustworthiness: Overview and new direction. Future Generation Computer Systems, 86, 914\u2013925.","journal-title":"Future Generation Computer Systems"},{"issue":"5","key":"11_CR60","doi-asserted-by":"publisher","first-page":"546","DOI":"10.1509\/jmr.10.0355","volume":"51","author":"CE Tucker","year":"2014","unstructured":"Tucker, C. E. (2014). Social networks, personalized advertising, and privacy controls. Journal of Marketing Research, 51(5), 546\u2013562.","journal-title":"Journal of Marketing Research"},{"key":"11_CR61","first-page":"296","volume-title":"Analyzing social networks","author":"Z Neal","year":"2013","unstructured":"Neal, Z., Borgatti, S. P., Everett, M. G., & Johnson, J. C. (2013). Analyzing social networks (p. 296). Thousand Oaks: Sage. 54.00(paper), 130.00 (cloth)."},{"issue":"2","key":"11_CR62","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1145\/3127876","volume":"12","author":"CF Chiasserini","year":"2018","unstructured":"Chiasserini, C. F., Garetto, M., & Leonardi, E. (2018). De-anonymizing clustered social networks by percolation graph matching. ACM Transactions on Knowledge Discovery from Data (TKDD), 12(2), 21.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"issue":"11","key":"11_CR63","doi-asserted-by":"publisher","first-page":"3397","DOI":"10.1007\/s00453-017-0395-0","volume":"80","author":"K Bringmann","year":"2018","unstructured":"Bringmann, K., Friedrich, T., & Krohmer, A. (2018). De-anonymization of heterogeneous random graphs in quasilinear time. Algorithmica, 80(11), 3397\u20133427.","journal-title":"Algorithmica"},{"key":"11_CR64","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/2567948.2577366","volume-title":"Proceedings of the 23rd international conference on world wide web","author":"H Fu","year":"2014","unstructured":"Fu, H., Zhang, A., & Xie, X. (2014, April). De-anonymizing social graphs via node similarity. In Proceedings of the 23rd international conference on world wide web (pp. 263\u2013264). New York: ACM."},{"issue":"4","key":"11_CR65","first-page":"49","volume":"6","author":"H Fu","year":"2015","unstructured":"Fu, H., Zhang, A., & Xie, X. (2015). Effective social graph deanonymization based on graph structure and descriptive information. ACM Transactions on Intelligent Systems and Technology (TIST), 6(4), 49.","journal-title":"ACM Transactions on Intelligent Systems and Technology (TIST)"},{"key":"11_CR66","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/2665943.2665960","volume-title":"Proceedings of the 13th workshop on privacy in the electronic society","author":"K Sharad","year":"2014","unstructured":"Sharad, K., & Danezis, G. (2014, November). An automated social graph de-anonymization technique. In Proceedings of the 13th workshop on privacy in the electronic society (pp. 47\u201358). New York: ACM."},{"key":"11_CR67","doi-asserted-by":"publisher","first-page":"13118","DOI":"10.1109\/ACCESS.2017.2720187","volume":"5","author":"E Aghasian","year":"2017","unstructured":"Aghasian, E., Garg, S., Gao, L., Yu, S., & Montgomery, J. (2017). Scoring users\u2019 privacy disclosure across multiple online social networks. IEEE Access, 5, 13118\u201313130.","journal-title":"IEEE Access"},{"issue":"1","key":"11_CR68","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1145\/1870096.1870102","volume":"5","author":"K Liu","year":"2010","unstructured":"Liu, K., & Terzi, E. (2010). A framework for computing the privacy scores of users in online social networks. ACM Transactions on Knowledge Discovery from Data (TKDD), 5(1), 6.","journal-title":"ACM Transactions on Knowledge Discovery from Data (TKDD)"},{"key":"11_CR69","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-642-16292-3_25","volume-title":"International conference on modeling decisions for artificial intelligence","author":"J Domingo-Ferrer","year":"2010","unstructured":"Domingo-Ferrer, J. (2010, October). Rational privacy disclosure in social networks. In International conference on modeling decisions for artificial intelligence (pp. 255\u2013265). Berlin\/Heidelberg: Springer."},{"key":"11_CR70","doi-asserted-by":"publisher","unstructured":"Tewari, A., & Gupta, B. B. (2018). Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework. Future Generation Computer Systems. https:\/\/doi.org\/10.1016\/j.future.2018.04.027 .","DOI":"10.1016\/j.future.2018.04.027"},{"issue":"3","key":"11_CR71","doi-asserted-by":"publisher","first-page":"423","DOI":"10.1007\/s11235-017-0345-9","volume":"67","author":"V Adat","year":"2018","unstructured":"Adat, V., & Gupta, B. B. (2018). Security in Internet of Things: issues, challenges, taxonomy, and architecture. Telecommunication Systems, 67(3), 423\u2013441.","journal-title":"Telecommunication Systems"},{"issue":"1","key":"11_CR72","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017010101","volume":"7","author":"BB Gupta","year":"2017","unstructured":"Gupta, B. B., Gupta, S., & Chaudhary, P. (2017). Enhancing the browser-side context-aware sanitization of suspicious HTML5 code for halting the DOM-based XSS vulnerabilities in cloud. International Journal of Cloud Applications and Computing (IJCAC), 7(1), 1\u201331.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"11_CR73","doi-asserted-by":"crossref","first-page":"1553","DOI":"10.1145\/1753326.1753559","volume-title":"Proceedings of the SIGCHI conference on human factors in computing systems","author":"F Stutzman","year":"2010","unstructured":"Stutzman, F., & Kramer-Duffield, J. (2010, April). Friends only: Examining a privacy-enhancing behavior in Facebook. In Proceedings of the SIGCHI conference on human factors in computing systems (pp. 1553\u20131562). New York: ACM."},{"issue":"3","key":"11_CR74","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/j.appdev.2008.12.010","volume":"30","author":"TA Pempek","year":"2009","unstructured":"Pempek, T. A., Yermolayeva, Y. A., & Calvert, S. L. (2009). College students\u2019 social networking experiences on Facebook. Journal of Applied Developmental Psychology, 30(3), 227\u2013238.","journal-title":"Journal of Applied Developmental Psychology"},{"volume-title":"Computer and cyber security: Principles, algorithm, applications, and perspectives","year":"2018","key":"11_CR75","unstructured":"Gupta, B. B. (Ed.). (2018). Computer and cyber security: Principles, algorithm, applications, and perspectives. New York: CRC Press."},{"issue":"1","key":"11_CR76","first-page":"1","volume":"58","author":"P Wang","year":"2015","unstructured":"Wang, P., Xu, B., Wu, Y., & Zhou, X. (2015). Link prediction in social networks: The state-of-the-art. Science China Information Sciences, 58(1), 1\u201338.","journal-title":"Science China Information Sciences"},{"key":"11_CR77","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/2684822.2685295","volume-title":"Proceedings of the eighth ACM international conference on web search and data mining","author":"J Tang","year":"2015","unstructured":"Tang, J., Chang, S., Aggarwal, C., & Liu, H. (2015, February). Negative link prediction in social media. In Proceedings of the eighth ACM international conference on web search and data mining (pp. 87\u201396). New York: ACM."},{"issue":"11","key":"11_CR78","doi-asserted-by":"publisher","first-page":"113037","DOI":"10.1088\/1367-2630\/17\/11\/113037","volume":"17","author":"S Daminelli","year":"2015","unstructured":"Daminelli, S., Thomas, J. M., Dur\u00e1n, C., & Cannistraci, C. V. (2015). Common neighbours and the local-community-paradigm for topological link prediction in bipartite networks. New Journal of Physics, 17(11), 113037.","journal-title":"New Journal of Physics"},{"issue":"3","key":"11_CR79","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1016\/S0378-8733(03)00009-1","volume":"25","author":"LA Adamic","year":"2003","unstructured":"Adamic, L. A., & Adar, E. (2003). Friends and neighbors on the web. Social Networks, 25(3), 211\u2013230.","journal-title":"Social Networks"},{"key":"11_CR80","doi-asserted-by":"publisher","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"D Watts","year":"1998","unstructured":"Watts, D., & Stogatz, S. (1998). Small world. Nature, 393, 440\u2013442.","journal-title":"Nature"},{"key":"11_CR81","volume-title":"SDM06: Workshop on link analysis, counter-terrorism and security","author":"M Hasan Al","year":"2006","unstructured":"Al Hasan, M., Chaoji, V., Salem, S., & Zaki, M. (2006, April). Link prediction using supervised learning. In SDM06: Workshop on link analysis, counter-terrorism and security."},{"issue":"7","key":"11_CR82","doi-asserted-by":"publisher","first-page":"1019","DOI":"10.1002\/asi.20591","volume":"58","author":"D Liben-Nowell","year":"2007","unstructured":"Liben-Nowell, D., & Kleinberg, J. (2007). The link-prediction problem for social networks. Journal of the American Society for Information Science and Technology, 58(7), 1019\u20131031.","journal-title":"Journal of the American Society for Information Science and Technology"},{"issue":"1","key":"11_CR83","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/BF02289026","volume":"18","author":"L Katz","year":"1953","unstructured":"Katz, L. (1953). A new status index derived from sociometric analysis. Psychometrika, 18(1), 39\u201343.","journal-title":"Psychometrika"},{"key":"11_CR84","first-page":"322","volume-title":"ICDM","author":"C Wang","year":"2007","unstructured":"Wang, C., Satuluri, V., & Parthasarathy, S. (2007, October). Local probabilistic models for link prediction. In ICDM (pp. 322\u2013331). New York: IEEE."},{"key":"11_CR85","first-page":"340","volume-title":"Sixth international conference on data mining, 2006. ICDM\u201906","author":"H Kashima","year":"2006","unstructured":"Kashima, H., & Abe, N. (2006, December). A parameterized probabilistic model of network evolution for supervised link prediction. In Sixth international conference on data mining, 2006. ICDM\u201906 (pp. 340\u2013349). New York: IEEE."},{"key":"11_CR86","first-page":"659","volume-title":"Advances in neural information processing systems","author":"B Taskar","year":"2004","unstructured":"Taskar, B., Wong, M. F., Abbeel, P., & Koller, D. (2004). Link prediction in relational data. In Advances in neural information processing systems (pp. 659\u2013666)."},{"issue":"2","key":"11_CR87","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1117454.1117456","volume":"7","author":"L Getoor","year":"2005","unstructured":"Getoor, L., & Diehl, C. P. (2005). Link mining: A survey. Acm Sigkdd Explorations Newsletter, 7(2), 3\u201312.","journal-title":"Acm Sigkdd Explorations Newsletter"},{"issue":"3","key":"11_CR88","doi-asserted-by":"publisher","first-page":"1974","DOI":"10.1109\/COMST.2016.2533668","volume":"18","author":"JH Abawajy","year":"2016","unstructured":"Abawajy, J. H., Ninggal, M. I. H., & Herawan, T. (2016). Privacy preserving social network data publication. IEEE Communications Surveys and Tutorials, 18(3), 1974\u20131997.","journal-title":"IEEE Communications Surveys and Tutorials"},{"key":"11_CR89","unstructured":"Veiga, M. H., & Eickhoff, C. (2016). Privacy leakage through innocent content sharing in online social networks. arXiv preprint arXiv:1607.02714."},{"issue":"3","key":"11_CR90","doi-asserted-by":"publisher","first-page":"1","DOI":"10.4018\/IJCAC.2017070101","volume":"7","author":"S Gupta","year":"2017","unstructured":"Gupta, S., & Gupta, B. B. (2017). Detection, avoidance, and attack pattern mechanisms in modern web application vulnerabilities: Present and future challenges. International Journal of Cloud Applications and Computing (IJCAC), 7(3), 1\u201343.","journal-title":"International Journal of Cloud Applications and Computing (IJCAC)"},{"key":"11_CR91","doi-asserted-by":"publisher","first-page":"964","DOI":"10.1016\/j.future.2016.11.031","volume":"78","author":"C Stergiou","year":"2018","unstructured":"Stergiou, C., Psannis, K. E., Kim, B. G., & Gupta, B. (2018). Secure integration of IoT and cloud computing. Future Generation Computer Systems, 78, 964\u2013975.","journal-title":"Future Generation Computer Systems"},{"issue":"2","key":"11_CR92","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1016\/j.chb.2009.09.003","volume":"26","author":"T Correa","year":"2010","unstructured":"Correa, T., Hinsley, A. W., & De Zuniga, H. G. (2010). Who interacts on the web?: The intersection of users\u2019 personality and social media use. Computers in Human Behavior, 26(2), 247\u2013253.","journal-title":"Computers in Human Behavior"},{"key":"11_CR93","first-page":"79","volume-title":"Proceedings of the international conference on informatics and analytics","author":"V Jyothi","year":"2016","unstructured":"Jyothi, V., & Kumari, V. V. (2016, August). Privacy preserving in dynamic social networks. In Proceedings of the international conference on informatics and analytics (p. 79). New York: ACM."},{"issue":"1","key":"11_CR94","doi-asserted-by":"publisher","first-page":"19","DOI":"10.26599\/BDMA.2017.9020002","volume":"1","author":"NM Ahmed","year":"2018","unstructured":"Ahmed, N. M., Chen, L., Wang, Y., Li, B., Li, Y., & Liu, W. (2018). DeepEye: Link prediction in dynamic networks based on non-negative matrix factorization. Big Data Mining and Analytics, 1(1), 19\u201333.","journal-title":"Big Data Mining and Analytics"},{"key":"11_CR95","doi-asserted-by":"publisher","first-page":"29219","DOI":"10.1109\/ACCESS.2018.2839770","volume":"6","author":"T Li","year":"2018","unstructured":"Li, T., Zhang, J., Philip, S. Y., Zhang, Y., & Yan, Y. (2018). Deep dynamic network embedding for link prediction. IEEE Access, 6, 29219\u201329230.","journal-title":"IEEE Access"},{"key":"11_CR96","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1109\/SP.2009.22","volume-title":"30th IEEE symposium on security and privacy, 2009","author":"A Narayanan","year":"2009","unstructured":"Narayanan, A., & Shmatikov, V. (2009, May). De-anonymizing social networks. In 30th IEEE symposium on security and privacy, 2009 (pp. 173\u2013187). New York: IEEE."}],"container-title":["Handbook of Computer Networks and Cyber Security"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22277-2_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,24]],"date-time":"2023-09-24T14:18:13Z","timestamp":1695565093000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-22277-2_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030222765","9783030222772"],"references-count":96,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22277-2_11","relation":{},"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"1 January 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}