{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T18:39:40Z","timestamp":1764873580708},"reference-count":48,"publisher":"Springer Science and Business Media LLC","issue":"21","license":[{"start":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T00:00:00Z","timestamp":1528934400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Multimed Tools Appl"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11042-018-6217-9","type":"journal-article","created":{"date-parts":[[2018,6,14]],"date-time":"2018-06-14T03:30:03Z","timestamp":1528947003000},"page":"29731-29745","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["A traffic analysis attack to compute social network measures"],"prefix":"10.1007","volume":"78","author":[{"given":"Alejandra Guadalupe Silva","family":"Trujillo","sequence":"first","affiliation":[]},{"given":"Ana Lucila Sandoval","family":"Orozco","sequence":"additional","affiliation":[]},{"given":"Luis Javier Garc\u00eda","family":"Villalba","sequence":"additional","affiliation":[]},{"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,6,14]]},"reference":[{"key":"6217_CR1","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1002\/int.21631","volume":"29","author":"K AlFalahi","year":"2014","unstructured":"AlFalahi K, Atif Y, Abraham A (2014) Models of influence in online social networks. Int J Intell Syst 29:161\u2013183. \nhttps:\/\/doi.org\/10.1002\/int.21631","journal-title":"Int J Intell Syst"},{"key":"6217_CR2","first-page":"1317","volume":"6","author":"HS Ahmed","year":"2013","unstructured":"Ahmed HS, Faouzi BM, Caelen J (2013) Detection and classification of the behavior of people in an intelligent building by camera. SIGKDD Explor Newsl 6:1317\u20131342","journal-title":"SIGKDD Explor Newsl"},{"key":"6217_CR3","doi-asserted-by":"publisher","first-page":"243","DOI":"10.1007\/978-1-4419-8462-3_9","volume-title":"Social Network Data Analytics","author":"Mohammad Al Hasan","year":"2011","unstructured":"Al Hasan M, Zaki MJ (2011) A survey of link prediction in social networks. In: Social network data analytics, pp 243\u2013275"},{"key":"6217_CR4","unstructured":"Anderson A, Corney M, Vel O, Mohay G (2001) Identifying the authors of suspect e-mail. In: Communications of the ACM"},{"key":"6217_CR5","doi-asserted-by":"publisher","unstructured":"Anderson J, Diaz C, Bonneau J, Stajano F (2009) Privacy-enabling social networking over untrusted networks. In: Proceedings of the 2nd ACM workshop on Online social networks. ACM, New York, pp 1\u20136, DOI \nhttps:\/\/doi.org\/10.1145\/1592665.1592667","DOI":"10.1145\/1592665.1592667"},{"key":"6217_CR6","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"A Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si A, Albert R (1999) Emergence of scaling in random networks. Science 286:509\u2013512. \nhttps:\/\/doi.org\/10.1126\/science.286.5439.509","journal-title":"Science"},{"key":"6217_CR7","doi-asserted-by":"crossref","unstructured":"Barnes S (2006) A privacy paradox: social networking in the United States First Monday 11(9)","DOI":"10.5210\/fm.v11i9.1394"},{"key":"6217_CR8","unstructured":"Bekkerman C, McCallum A (2004) Extracting social networks and contact information from email and the web. In: Proceedings of CEAS-l"},{"issue":"3","key":"6217_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1961189.1961194","volume":"2","author":"Francesco Bonchi","year":"2011","unstructured":"Bonchi F, Castillo C, Gionis A, Jaimes A (2011) Social network analysis and mining for business applications. In: ACM Trans. Intell. Syst. Technol., vol 2, pp 1\u201337. \nhttps:\/\/doi.org\/10.1145\/1961189.1961194","journal-title":"ACM Transactions on Intelligent Systems and Technology"},{"key":"6217_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/s10588-005-5381-4","volume":"11","author":"A Chapanond","year":"2005","unstructured":"Chapanond A, Krishnamoorthy MS, Yener B (2005) Graph theoretic and spectral analysis of enron email data. Comput Math Organ Theory 11:265\u2013281. \nhttps:\/\/doi.org\/10.1007\/s10588-005-5381-4","journal-title":"Comput Math Organ Theory"},{"key":"6217_CR11","doi-asserted-by":"crossref","unstructured":"Collingsworth B, Menezes R (2009) Identification of social tension in organizational networks, vol 207. Complex Networks Studies in Computational Intelligence","DOI":"10.1007\/978-3-642-01206-8_18"},{"key":"6217_CR12","unstructured":"Culotta A, Bekkerman R, McCallum A (2004) Extracting social networks and contact information from email and the web. In: Proceedings of the first conference on email and anti-spam (CEAS)"},{"key":"6217_CR13","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30114-1_21","volume":"3200","author":"G Danezis","year":"2004","unstructured":"Danezis G, Serjantov A (2004) Statistical disclosure attack or intersection attacks on anonymity systems. Inform Hiding 3200:293\u2013308","journal-title":"Inform Hiding"},{"key":"6217_CR14","doi-asserted-by":"crossref","unstructured":"Danezis G, Troncoso C (2009) Vida: how to use Bayesian inference to de-anonymize persistent communications. In: Proceedings of the 9th international symposium of privacy enhancing technologies. Seattle, pp 56\u201372","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"6217_CR15","doi-asserted-by":"crossref","unstructured":"Danezis G, Diaz C, Troncoso C (2007) Two-sided statistical disclosure attack. In: Proceedings of the 7th international conference on privacy enhancing technologist workshop. Ottawa, pp 30\u201344","DOI":"10.1007\/978-3-540-75551-7_3"},{"key":"6217_CR16","doi-asserted-by":"crossref","unstructured":"Danezis G, D\u00edaz C, Syverson P (2009) System for anonymous communication","DOI":"10.1201\/9781420059823-c13"},{"issue":"19","key":"6217_CR17","doi-asserted-by":"publisher","first-page":"4882","DOI":"10.3923\/itj.2013.4882.4888","volume":"12","author":"X Ding","year":"2013","unstructured":"Ding X, Zhang L, Wan Z, Gu M (2013) De-anonymization of dynamic social network. Inf Technol J 12(19):4882\u20134888. \nhttps:\/\/doi.org\/10.3923\/itj.2013.4882.4888","journal-title":"Inf Technol J"},{"key":"6217_CR18","doi-asserted-by":"publisher","unstructured":"Ebel H, Mielsch LI, Bornholdt S (2002) Scale-free topology of e-mail networks. Phys Rev E - Stat Nonlinear, Soft Matter Phys, 66. \nhttps:\/\/doi.org\/10.1103\/PhysRevE.66.035103","DOI":"10.1103\/PhysRevE.66.035103"},{"key":"6217_CR19","doi-asserted-by":"publisher","first-page":"290","DOI":"10.2307\/1999405","volume":"6","author":"P Erdos","year":"1959","unstructured":"Erdos P, R\u00e9nyi A (1959) On random graphs. Publ Math 6:290\u2013297. \nhttps:\/\/doi.org\/10.2307\/1999405","journal-title":"Publ Math"},{"key":"6217_CR20","doi-asserted-by":"crossref","unstructured":"Garg V, Jean Camp L (2015) Cars, condoms, and facebook. In: Information Security, lecture notes in computer science, vol 7807. Springer","DOI":"10.1007\/978-3-319-27659-5_20"},{"key":"6217_CR21","doi-asserted-by":"publisher","unstructured":"Gross R, Acquisti A (2005) Information revelation and privacy in online social networks. In: ACM workshop on privacy in the electronic society. ACM, New York, pp 71\u201380. \nhttps:\/\/doi.org\/10.1145\/1102199.1102214","DOI":"10.1145\/1102199.1102214"},{"key":"6217_CR22","doi-asserted-by":"publisher","unstructured":"Hansen M, Jensen M, Rost M (2015) Protection goals for privacy engineering. In: IEEE Security and Privacy Workshops, San Jos\u00e9, pp 159\u2013166, DOI \nhttps:\/\/doi.org\/10.1109\/SPW.2015.13","DOI":"10.1109\/SPW.2015.13"},{"key":"6217_CR23","doi-asserted-by":"crossref","unstructured":"Hopper N, Vasserman EY (2006) On the effectiveness of k;-anonymity against traffic analysis and surveillance. In: Proceedings of the 5th ACM workshop on privacy in electronic society, WPES \u201906. \nhttp:\/\/doi.acm.org\/10.1145\/1179601.1179604\n\n. ACM, New York, pp 9\u201318","DOI":"10.1145\/1179601.1179604"},{"key":"6217_CR24","unstructured":"Imizcoz J (2001) Introducci\u00f3n actores sociales y redes de relaciones: reflexiones para una historia global, pp 19\u201330"},{"key":"6217_CR25","unstructured":"Kavitha S, Sivaraman E, Raja Vadhana P (2014) A suvery on k-anonymity generalization algorithms. Int J Adv Res Comput Commun Eng, 2(11)"},{"key":"6217_CR26","doi-asserted-by":"crossref","unstructured":"Knoke D, Yang S (2008) Social networks analysis. Sage","DOI":"10.4135\/9781412985864"},{"issue":"1","key":"6217_CR27","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1217299.1217301","volume":"1","author":"Jure Leskovec","year":"2007","unstructured":"Leskovec J, Kleinberg J, Faloutsos C (2007) Graph evolution: densification and shrinking diameters. In: ACM Trans. Knowl. Discov. Data. \nhttps:\/\/doi.org\/10.1145\/1217299.1217301","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"issue":"1","key":"6217_CR28","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1080\/15427951.2009.10129177","volume":"6","author":"Jure Leskovec","year":"2009","unstructured":"Leskovec J, Lang KJ, Dasgupta A, Mahoney MW (2011) Community structure in large networks: natural cluster sizes and the absence of large well-defined clusters. In: Internet Mathematics, vol 6. \nhttps:\/\/doi.org\/10.1080\/15427951.2009.10129177","journal-title":"Internet Mathematics"},{"issue":"2","key":"6217_CR29","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1145\/1345448.1345462","volume":"9","author":"Y Liu","year":"2007","unstructured":"Liu Y, Kou Z (2007) Predicting who rated what in large-scale datasets. ACM SIGKDD Explor Newsl 9(2):62\u201365. \nhttps:\/\/doi.org\/10.1145\/1345448.1345462","journal-title":"ACM SIGKDD Explor Newsl"},{"key":"6217_CR30","unstructured":"Liu L, Liu J, Zhang J (2010) Privacy preservation of affinities in social networks. In: Proceedings of the International conference on information systems, pp 372\u2013376"},{"issue":"1","key":"6217_CR31","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1217299.1217302","volume":"1","author":"Ashwin Machanavajjhala","year":"2007","unstructured":"Machanavajjhala A, Kifer D, Gehrke J, Venkitasubramaniam M (2007) L-diversity: privacy beyond k-anonymity. In: ACM Trans. Knowl. Discov. Data, vol 1. \nhttps:\/\/doi.org\/10.1145\/1217299.1217302","journal-title":"ACM Transactions on Knowledge Discovery from Data"},{"key":"6217_CR32","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1613\/jair.2229","volume":"30","author":"A McCallum","year":"2007","unstructured":"McCallum A, Wang X, Corrada-Emmanuel A (2007) Topic and role discovery in social networks. J Artif Intell Res 30:249\u2013272","journal-title":"J Artif Intell Res"},{"key":"6217_CR33","doi-asserted-by":"publisher","unstructured":"Moradi F, Olovsson T, Tsigas P (2012) Towards modeling legitimate and unsolicited email traffic using social network properties. In: Proc. Fifth Work. Soc. Netw. Syst. - SNS \u201912, pp 1\u20136. \nhttps:\/\/doi.org\/10.1145\/2181176.2181185","DOI":"10.1145\/2181176.2181185"},{"key":"6217_CR34","doi-asserted-by":"publisher","unstructured":"Ninghui L, Tiancheng L, Venkatasubramanian S (2007) t-closeness: privacy beyond k-anonymity and l-diversity. In: IEEE 23rd International conference on data engineering 2007, pp 106\u2013115. \nhttps:\/\/doi.org\/10.1109\/ICDE.2007.367856","DOI":"10.1109\/ICDE.2007.367856"},{"issue":"2","key":"6217_CR35","doi-asserted-by":"publisher","first-page":"4052","DOI":"10.3390\/s150204052","volume":"15","author":"Javier Portela","year":"2015","unstructured":"Portela J, Garc\u00eda-Villalba L, Silva Trujillo A, Sandoval A, Kim T (2015) Extracting association patterns in network communications. Sensors, 15(2)","journal-title":"Sensors"},{"key":"6217_CR36","doi-asserted-by":"publisher","first-page":"3787","DOI":"10.1007\/s11227-015-1524-7","volume":"72","author":"J Portela","year":"2016","unstructured":"Portela J, Garc\u00eda-Villalba L, Silva Trujillo A, Sandoval A, Kim T (2016) Disclosing user relationships in email networks. J Supercomput 72:3787\u20133800","journal-title":"J Supercomput"},{"issue":"11","key":"6217_CR37","doi-asserted-by":"publisher","first-page":"1832","DOI":"10.3390\/s16111832","volume":"16","author":"Javier Portela","year":"2016","unstructured":"Portela J, Garc\u00eda-Villalba L, Silva Trujillo A, Sandoval A, Kim T (2016) Estimation of anonymous email network characteristics through statistical disclosure attacks. Sensors, 16(11). \nhttps:\/\/doi.org\/10.3390\/s16111832","journal-title":"Sensors"},{"key":"6217_CR38","doi-asserted-by":"publisher","unstructured":"Socievole A, De Rango F, Marano S (2013) Link prediction in human contact networks using online social ties. In: International Conference on cloud and green computing, pp 305\u2013312. \nhttps:\/\/doi.org\/10.1109\/CGC.2013.55","DOI":"10.1109\/CGC.2013.55"},{"issue":"1","key":"6217_CR39","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1057\/jit.2016.4","volume":"32","author":"S Spiekermann","year":"2016","unstructured":"Spiekermann S, Korunovska J (2016) Towards a value theory for personal data. J Inf Technol 32(1):62\u201384. \nhttps:\/\/doi.org\/10.1057\/jit.2016.4","journal-title":"J Inf Technol"},{"key":"6217_CR40","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1300\/J079v16n01_10","volume":"16","author":"C Streeter","year":"1992","unstructured":"Streeter C, Gillespie D (1992) Social network analysis. J Soc Serv Res 16:201\u2013222","journal-title":"J Soc Serv Res"},{"issue":"05","key":"6217_CR41","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1142\/S0218488502001648","volume":"10","author":"LATANYA SWEENEY","year":"2002","unstructured":"Sweeney L (2002) K-anonymity: a model for protecting privacy. In: Int. J. Uncertain. Fuzziness Knowl.-Based Syst., pp 557\u2013570. \nhttps:\/\/doi.org\/10.1142\/S0218488502001648","journal-title":"International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems"},{"key":"6217_CR42","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-94-017-0115-0_5","volume-title":"Communities and Technologies","author":"Joshua R. Tyler","year":"2003","unstructured":"Tyler J, Wilkinson D, Huberman B (2003) Email as sprectroscopy: automated discovery of community structure within organizations. In: Proceedings of communities and technologies, pp 81\u201396"},{"issue":"2","key":"6217_CR43","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1080\/01972240590925348","volume":"21","author":"J Tyler","year":"2005","unstructured":"Tyler J, Wilkinson D, Huberman B (2005) E-mail as spectroscopy: automated discovery of community structure within organizations. Inf Soc 21(2):143\u2013153","journal-title":"Inf Soc"},{"key":"6217_CR44","unstructured":"Uddin M, Murshed STH, Hossain L (2010) Towards a scale free network approach to study organizational communication network. In: Proceedings of Pacific Asia conference on information systems, vol 196, 415, pp 1937\u20131944"},{"key":"6217_CR45","unstructured":"Van Alstyne M, Zhang J (2003) Emailnet: automatically mining social networks from organizational email communications. In: Proceedings of Annual conference of the North American association for computational social and organizational sciences. Pittsburg"},{"key":"6217_CR46","doi-asserted-by":"crossref","unstructured":"Wasserman S, Faust K (1994) Social network analysis: methods and applications. Cambridge University Press","DOI":"10.1017\/CBO9780511815478"},{"issue":"2","key":"6217_CR47","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1016\/j.anbehav.2007.06.020","volume":"75","author":"T Wey","year":"2008","unstructured":"Wey T, Blumstein T, Shen W, Jordan F (2008) Social network analysis of animal behaviour: a promising tool for the study of sociality. Anim Behav 75(2):333\u2013344","journal-title":"Anim Behav"},{"key":"6217_CR48","doi-asserted-by":"publisher","first-page":"421","DOI":"10.1007\/978-1-4419-6045-0_14","volume-title":"Managing and Mining Graph Data","author":"Xintao Wu","year":"2010","unstructured":"Wu X, Ying X, Liu K, Chen L (2010) A survey of privacy-preservation of graphs and social networks. In: Managing and mining graph data, pp 421\u2013453"}],"container-title":["Multimedia Tools and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6217-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11042-018-6217-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11042-018-6217-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,5]],"date-time":"2020-03-05T11:25:32Z","timestamp":1583407532000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11042-018-6217-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,6,14]]},"references-count":48,"journal-issue":{"issue":"21","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["6217"],"URL":"https:\/\/doi.org\/10.1007\/s11042-018-6217-9","relation":{},"ISSN":["1380-7501","1573-7721"],"issn-type":[{"value":"1380-7501","type":"print"},{"value":"1573-7721","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,6,14]]},"assertion":[{"value":"8 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 April 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 May 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 June 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}