A Practical Attack to De-anonymize Social Network Users.
Gilbert WondracekThorsten HolzEngin KirdaChristopher KruegelPublished in: IEEE Symposium on Security and Privacy (2010)
Keyphrases
- social networks
- user interface
- social media
- social influence
- user interaction
- mobile phone users
- real world
- social networking sites
- social network analysis
- recommender systems
- network structure
- malicious users
- social communities
- social networking
- online communities
- countermeasures
- information sources
- multiple users
- social web
- end users
- user activities
- share information
- social context
- social relationships
- internet users
- intrusion detection
- recommendation systems
- community detection
- online social networks
- web content
- social interaction