{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,3,29]],"date-time":"2022-03-29T12:54:06Z","timestamp":1648558446072},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2011,11,1]],"date-time":"2011-11-01T00:00:00Z","timestamp":1320105600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["DuD"],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1007\/s11623-011-0187-7","type":"journal-article","created":{"date-parts":[[2011,11,4]],"date-time":"2011-11-04T08:43:32Z","timestamp":1320396212000},"page":"791-796","source":"Crossref","is-referenced-by-count":0,"title":["Verhaltensbasierte Verkettung von Internetsitzungen"],"prefix":"10.1007","volume":"35","author":[{"given":"Hannes","family":"Federrath","sequence":"first","affiliation":[]},{"given":"Christoph","family":"Gerber","sequence":"additional","affiliation":[]},{"given":"Dominik","family":"Herrmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,11,5]]},"reference":[{"key":"187_CR1","unstructured":"Michael Barbaroand, Tom Zeller: A Face is Exposed for AOL Searcher No. 4417749. The New York Times, August 9, 2006."},{"key":"187_CR2","doi-asserted-by":"crossref","unstructured":"T. Narten, R. Draves: Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 3041, 2001.","DOI":"10.17487\/rfc3041"},{"key":"187_CR3","doi-asserted-by":"crossref","unstructured":"Justin Brickell, Vitaly Shmatikov: The Cost of Privacy: Destruction of Data-mining Utility in Anonymized Data Publishing. In: Proceeding of the 14th ACM SIGKDD international conference on Knowledge discovery and data mining (KDD\u2019 08), ACM, New York, NY, USA, 2008, 70\u201378.","DOI":"10.1145\/1401890.1401904"},{"key":"187_CR4","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-14527-8_1","volume-title":"Proceedings of the 10th International Symposium on Privacy Enhancing Technologies (PETS 2010)","author":"P. Eckersley","year":"2010","unstructured":"Peter Eckersley: How Unique Is Your Web Browser? In: Proceedings of the 10th International Symposium on Privacy Enhancing Technologies (PETS 2010), LNCS 6205, Springer, Heidelberg, Berlin, 2010, 1\u201318."},{"key":"187_CR5","series-title":"LNCS","first-page":"22","volume-title":"Proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security","author":"D. Koukis","year":"2006","unstructured":"Dimitris Koukis, Spyros Antonatos, Kostas G. Anagnostakis: On the Privacy Risks of Publishing Anonymized IP Network Traces. In: Proceedings of the 10th IFIP TC-6 TC-11 International Conference on Communications and Multimedia Security, LNCS 4237, Springer, Heidelberg, Berlin, 2006, 22\u201332."},{"key":"187_CR6","series-title":"LNCS","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/11957454_24","volume-title":"Proceedings of the 6th International Workshop on Privacy Enhancing Technologies","author":"B. Malin","year":"2006","unstructured":"Bradley Malin, Edoardo Airoldi: The Effects of Location Access Behavior on Re-identification Risk in a Distributed Environment. In: Proceedings of the 6th International Workshop on Privacy Enhancing Technologies, LNCS 4258, Springer, Heidelberg, Berlin, 2006, 413\u2013429."},{"key":"187_CR7","doi-asserted-by":"crossref","unstructured":"Arvind Narayanan, Vitaly Shmatikov: Robust De-anonymization of Large Sparse Datasets. In: 2008 IEEE Symposium on Security and Privacy (S&P 2008), IEEE Computer Society, 2008, 111\u2013125.","DOI":"10.1109\/SP.2008.33"},{"key":"187_CR8","doi-asserted-by":"crossref","unstructured":"Gilbert Wondracek, Thorsten Holz, Engin Kirda, and Christopher Kruegel: A Practical Attack to De-anonymize Social Network Users. In: 31st IEEE Symposium on Security and Privacy, S&P 2010, IEEE Computer Society, 2010, 223\u2013238.","DOI":"10.1109\/SP.2010.21"},{"key":"187_CR9","doi-asserted-by":"crossref","unstructured":"Jeffrey Pang, Ben Greenstein, Ramakrishna Gummadi, Srinivasan Seshan, David Wetherall: 802.11 User Fingerprinting. In: Proceedings of the 13th annual ACM International Conference on Mobile Computing and Networking (MobiCom\u2019 07), ACM, New York, NY, USA, 2007, 99\u2013110.","DOI":"10.1145\/1287853.1287866"},{"key":"187_CR10","doi-asserted-by":"crossref","unstructured":"Balaji Padmanabhan, Yinghui Yang: Clickprints on the Web: Are there Signatures in Web Browsing Data? Working Paper Series, 2007. Available at http:\/\/ssrn.com\/abstract=931057","DOI":"10.2139\/ssrn.931057"},{"key":"187_CR11","doi-asserted-by":"publisher","first-page":"548","DOI":"10.1016\/j.dss.2009.11.005","volume":"48","author":"Y. Yang","year":"2010","unstructured":"Yinghui Yang, Balaji Padmanabhan: Toward User Patterns for Online Security: Observation Time and Online User Identification. Decision Support Systems 48 (2010) 548\u2013558.","journal-title":"Decision Support Systems"},{"key":"187_CR12","doi-asserted-by":"publisher","first-page":"261","DOI":"10.1016\/j.dss.2010.03.001","volume":"49","author":"Y. Yang","year":"2010","unstructured":"Yinghui Yang: Web User Behavioral Profiling for User Identification. Decision Support Systems 49 (2010) 261\u2013271.","journal-title":"Decision Support Systems"},{"key":"187_CR13","doi-asserted-by":"crossref","unstructured":"Marek Kumpo\u0161t: Data Preparation for User Profiling from Traffic Log. In: Proceedings of the International Conference on Emerging Security Information, Systems, and Technologies (SECUWARE 2007), 2007, 89\u201394.","DOI":"10.1109\/SECUREWARE.2007.4385316"},{"key":"187_CR14","volume-title":"Context Information and User Profiling","author":"M. Kumpo\u0161t","year":"2009","unstructured":"Marek Kumpo\u0161t: Context Information and User Profiling. PhD thesis, Faculty of Informatics, Masaryk University, Czeck Republic, 2009."},{"key":"187_CR15","first-page":"1","volume-title":"Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u2019 09)","author":"M. Kumpo\u0161t","year":"2009","unstructured":"Marek Kumpo\u0161t, Va\u0161ek Maty\u00e1\u0161: User Profiling and Re-identification: Case of University-Wide Network Analysis. In: Proceedings of the 6th International Conference on Trust, Privacy and Security in Digital Business (TrustBus\u2019 09), Springer-Verlag, Berlin, Heidelberg, 2009, 1\u201310."},{"key":"187_CR16","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"I. H. Witten","year":"2005","unstructured":"Ian H. Witten, Eibe Frank: Data Mining: Practical Machine Learning Tools and Techniques. Elsevier, San Francisco, 2005."},{"key":"187_CR17","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809071","volume-title":"Introduction to Information Retrieval","author":"C. D. Manning","year":"2008","unstructured":"Christopher D. Manning, Prabhakar Raghavan, Hinrich Sch\u00fctze: Introduction to Information Retrieval. Cambridge University Press, Cambridge, UK, 2008."},{"key":"187_CR18","volume-title":"The Psycho-biology of Language \u2014 An Introduction to Dynamic Philology","author":"G. K. Zipf","year":"1968","unstructured":"George Kingsley Zipf: The Psycho-biology of Language \u2014 An Introduction to Dynamic Philology, 2nd edition, M.I.T. Press, Cambridge\/Mass., 1968.","edition":"2nd edition"},{"issue":"1","key":"187_CR19","first-page":"143","volume":"3\/","author":"L. Adamic","year":"2002","unstructured":"Lada Adamic, Bernardo Huberman: Zipf\u2019s Law and the Internet. Glottometrics 3\/1 (2002) 143\u2013150.","journal-title":"Glottometrics"},{"issue":"1","key":"187_CR20","doi-asserted-by":"publisher","first-page":"10","DOI":"10.1145\/1656274.1656278","volume":"11\/","author":"M. Hall","year":"2009","unstructured":"Mark Hall, Eibe Frank, Geoffrey Holmes, Bernhard Pfahringer, Peter Reutemann, Ian H. Witten: The WEKA Data Mining Software: An Update. SIGKDD Explorations 11\/1 (2009) 10\u201318.","journal-title":"SIGKDD Explorations"}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0187-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-011-0187-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0187-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-011-0187-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,18]],"date-time":"2019-06-18T22:39:12Z","timestamp":1560897552000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-011-0187-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":20,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2011,11]]}},"alternative-id":["187"],"URL":"https:\/\/doi.org\/10.1007\/s11623-011-0187-7","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,11]]}}}