How to Find Hidden Users: A Survey of Attacks on Anonymity Networks.
Esra ErdinChristopher ZachorMehmet Hadi GunesPublished in: IEEE Commun. Surv. Tutorials (2015)
Keyphrases
- malicious users
- social networks
- user interface
- data publishing
- collaborative filtering
- recommender systems
- end users
- complex networks
- user experience
- network structure
- injection attacks
- location privacy
- viral marketing
- network resources
- watermarking scheme
- intrusion detection
- information sources
- digital images
- mobile devices