{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T02:38:59Z","timestamp":1777430339742,"version":"3.51.4"},"reference-count":39,"publisher":"MDPI AG","issue":"11","license":[{"start":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T00:00:00Z","timestamp":1477958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users\u2019 network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders\u2019 or receivers\u2019 identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.<\/jats:p>","DOI":"10.3390\/s16111832","type":"journal-article","created":{"date-parts":[[2016,11,1]],"date-time":"2016-11-01T11:01:44Z","timestamp":1477998104000},"page":"1832","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks"],"prefix":"10.3390","volume":"16","author":[{"given":"Javier","family":"Portela","sequence":"first","affiliation":[{"name":"Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor Jos\u00e9 Garc\u00eda Santesmases, 9, Ciudad Universitaria, Madrid 28040, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7573-6272","authenticated-orcid":false,"given":"Luis","family":"Garc\u00eda Villalba","sequence":"additional","affiliation":[{"name":"Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor Jos\u00e9 Garc\u00eda Santesmases, 9, Ciudad Universitaria, Madrid 28040, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2419-8379","authenticated-orcid":false,"given":"Alejandra","family":"Silva Trujillo","sequence":"additional","affiliation":[{"name":"Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor Jos\u00e9 Garc\u00eda Santesmases, 9, Ciudad Universitaria, Madrid 28040, Spain"}]},{"given":"Ana","family":"Sandoval Orozco","sequence":"additional","affiliation":[{"name":"Group of Analysis, Security and Systems (GASS), Department of Software Engineering and Artificial Intelligence (DISIA), Faculty of Information Technology and Computer Science, Office 431, Universidad Complutense de Madrid (UCM), Calle Profesor Jos\u00e9 Garc\u00eda Santesmases, 9, Ciudad Universitaria, Madrid 28040, Spain"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0117-8102","authenticated-orcid":false,"given":"Tai-Hoon","family":"Kim","sequence":"additional","affiliation":[{"name":"Department of Convergence Security, Sungshin Women\u2019s University, 249-1 Dongseon-dong 3-ga, Seoul 136-742, Korea"}]}],"member":"1968","published-online":{"date-parts":[[2016,11,1]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"441","DOI":"10.1177\/016555150202800601","article-title":"Social network analysis: A powerful strategy, also for the information sciences","volume":"28","author":"Otte","year":"2002","journal-title":"J. Inf. Sci."},{"key":"ref_2","doi-asserted-by":"crossref","unstructured":"Rostami, A., and Mondani, H. (2015). The Complexity of Crime Network Data: A Case Study of Its Consequences for Crime Control and the Study of Networks. PLoS ONE, 10.","DOI":"10.1371\/journal.pone.0119309"},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"921","DOI":"10.1177\/1532673X09337462","article-title":"Interdependence, Density Dependence, and Networks in Politics","volume":"37","author":"Huckfedlt","year":"2009","journal-title":"Am. Politics Res."},{"key":"ref_4","unstructured":"Freeman, L.C. (2014). The Development of Social Network Analysis: A Study in the Sociology of Science, Empirical Press."},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"251","DOI":"10.1007\/978-3-319-05401-8_24","article-title":"Social Network Analysis Metrics and Their Application in Microbiological Network Studies","volume":"549","author":"Saragiotto","year":"2014","journal-title":"Stud. Comput. Intell."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Jackson, M. (2011). An Overview of Social Networks and Economic Applications, Elsevier. Handbook of Social Economic.","DOI":"10.1016\/B978-0-444-53187-2.00012-7"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"151","DOI":"10.1007\/s10611-011-9336-z","article-title":"Illuminating dark networks: A social network analysis of an Australian drug trafficking syndicate","volume":"57","author":"Bright","year":"2012","journal-title":"Crime Law Soc. Chang."},{"key":"ref_8","unstructured":"Faloutsos, M., Faloutsos, P., and Faloutsos, C. (1999). ACM SIGCOMM Computer Communication Review, ACM."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/S1389-1286(00)00083-9","article-title":"Graph structure in the web","volume":"33","author":"Broder","year":"2000","journal-title":"Comput. Netw."},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Mislove, A., Marcon, M., Gummadi, K.P., Druschel, P., and Bhattacharjee, B. (2007, January 23\u201326). Measurement and analysis of online social networks. Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement, San Diego, CA, USA.","DOI":"10.1145\/1298306.1298311"},{"key":"ref_11","unstructured":"Kumar, R., Novak, J., and Tomkins, A. (2010). Link Mining: Models, Algorithms, and Applications, Springer."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2522","DOI":"10.1038\/srep02522","article-title":"Virality prediction and community structure in social networks","volume":"3","author":"Weng","year":"2013","journal-title":"Sci. Rep."},{"key":"ref_13","doi-asserted-by":"crossref","unstructured":"Bliss, C.A., Danforth, C.M., and Dodds, P.S. (2014). Estimation of global network statistics from incomplete data. PLoS ONE, 9.","DOI":"10.1371\/journal.pone.0108471"},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"22073","DOI":"10.1073\/pnas.0908366106","article-title":"Missing and spurious interactions and the reconstruction of complex networks","volume":"106","year":"2009","journal-title":"Proc. Natl. Acad. Sci. USA"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1150","DOI":"10.1016\/j.physa.2010.11.027","article-title":"Link prediction in complex networks: A survey","volume":"390","author":"Zhou","year":"2011","journal-title":"Phys. A Stat. Mech. Appl."},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Wang, P., Xu, B.W., Wu, Y.R., and Zhou, X.Y. (2015). Link prediction in social networks: The state-of-the-art. Sci. China Inf. Sci., 58.","DOI":"10.1007\/s11432-014-5237-y"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Tseng, C., and Chen, M. (2009, January 29\u201331). Incremental SVM model for spam detection on dynamic email social networks. Proceedings of the International Conference on Computational Science and Engineering, Vancouver, BC, USA.","DOI":"10.1109\/CSE.2009.260"},{"key":"ref_18","unstructured":"Lam, H., and Yeung, D. (2007, January 2\u20133). A learning approach to spam detection based on social networks. Proceedings of the 4th Conference on Email and Anti-Spam, Mountain View, CA, USA."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1145\/1217299.1217301","article-title":"Graph evolution: Densification and shrinking diameters","volume":"1","author":"Leskovec","year":"2007","journal-title":"ACM Trans. Knowl. Discov. Data"},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"84","DOI":"10.1145\/358549.358563","article-title":"Untraceable electronic mail, return addresses, and digital pseudonyms","volume":"24","author":"Chaum","year":"1981","journal-title":"Commun. ACM"},{"key":"ref_21","unstructured":"Gulcu, C., and Tsudik, G. (1996, January 22\u201323). Mixing E-mail with Babel. Proceedings of the Symposium on Network and Distributed System Security, San Diego, CA, USA."},{"key":"ref_22","unstructured":"Moller, U., Cottrell, L., Palfrader, P., and Sassaman, L. Mixmaster Protocol Version 2. Internet Draft draft-sassaman-mixmaster-03, Internet Engineering Task Force. Available online: http:\/\/tools.ietf.org\/html\/draft-sassaman-mixmaster-03."},{"key":"ref_23","unstructured":"Danezis, G., Dingledine, R., and Mathewson, N. (2003, January 11\u201314). Mixminion: Design of a type III anonymous remailer protocol. Proceedings of the Symposium on Security and Privacy, Oakland, CA, USA."},{"key":"ref_24","doi-asserted-by":"crossref","unstructured":"Dingledine, R., Mathewson, N., and Syverson, P. (2004, January 9\u201313). Tor: The second generation onion router. Proceedings of the 13th USENIX Security Syposium, San Diego, CA, USA.","DOI":"10.21236\/ADA465464"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/MSECP.2003.1253565","article-title":"Measuring anonymity: The disclosure attack","volume":"1","author":"Agrawal","year":"2003","journal-title":"IEEE Secur. Priv."},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Danezis, G., and Serjantov, A. (2004, January 23\u201325). Statistical disclosure or intersection attacks on anonymity systems. Proceedings of the 6th International Conference on Information Hiding, Toronto, ON, Canada.","DOI":"10.1007\/978-3-540-30114-1_21"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Mathewson, N., and Dingledine, R. (2004, January 26\u201328). Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. Proceedings of Privacy Enhancing Technologies Workshop, Toronto, ON, Canada.","DOI":"10.1007\/11423409_2"},{"key":"ref_28","unstructured":"Danezis, G., Diaz, C., and Troncoso, C. (2007, January 20\u201322). Two-sided statistical disclosure attack. Proceedings of the 7th International Conference on Privacy Enhancing Technologies, Ottawa, ON, Canada."},{"key":"ref_29","unstructured":"Troncoso, C., Gierlichs, B., Preneel, B., and Verbauwhede, I. (2008, January 23\u201325). Perfect Matching Disclosure Attacks. Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, Leuven, Belgium."},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Danezis, G., and Troncoso, C. (2009, January 5\u20137). Vida: How to Use Bayesian Inference to De-anonymize Persistent Communications. Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, Seattle, WA, USA.","DOI":"10.1007\/978-3-642-03168-7_4"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"4052","DOI":"10.3390\/s150204052","article-title":"Extracting association patterns in network communications","volume":"15","author":"Portela","year":"2015","journal-title":"Sensors"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"3787","DOI":"10.1007\/s11227-015-1524-7","article-title":"Disclosing User Relationships in Email Networks","volume":"72","author":"Portela","year":"2016","journal-title":"J. Supercomput."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","article-title":"Collective dynamics of \u2018small-world\u2019 networks","volume":"393","author":"Watts","year":"1998","journal-title":"Nature"},{"key":"ref_34","doi-asserted-by":"crossref","unstructured":"Humphries, M.D., and Gurney, K. (2008). Network \u2018Small-World-Ness\u2019. A quantitative method for determining canonical network equivalence. PLoS ONE, 3.","DOI":"10.1371\/journal.pone.0002051"},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"035103","DOI":"10.1103\/PhysRevE.66.035103","article-title":"Scale-free topology of e-mail networks","volume":"66","author":"Ebel","year":"2002","journal-title":"Phys. Rev. E"},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1126\/science.1116869","article-title":"Empirical analysis of an evolving social network","volume":"311","author":"Kossinets","year":"2006","journal-title":"Science"},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"22057","DOI":"10.1038\/srep22057","article-title":"Small-World Propensity and Weighted Brain Networks","volume":"6","author":"Feldt","year":"2016","journal-title":"Sci. Rep."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"661","DOI":"10.1137\/070710111","article-title":"Power-law distributions in empirical data","volume":"51","author":"Clauset","year":"2009","journal-title":"SIAM Rev."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1341","DOI":"10.1109\/TIFS.2014.2330696","article-title":"A Least Squares Approach to the Static Traffic Analysis of High-Latency Anonymous Communication Systems","volume":"9","author":"Troncoso","year":"2014","journal-title":"IEEE Trans. Inf. Forensics Secur."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/11\/1832\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T19:34:29Z","timestamp":1760211269000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/16\/11\/1832"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,11,1]]},"references-count":39,"journal-issue":{"issue":"11","published-online":{"date-parts":[[2016,11]]}},"alternative-id":["s16111832"],"URL":"https:\/\/doi.org\/10.3390\/s16111832","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,11,1]]}}}