The Egyptian blogosphere, Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, CSCW '12, pp.17-26, 2012. ,
DOI : 10.1145/2145204.2145213
AnonyLikes: Anonymous Quantitative Feedback on Social Networks, Middleware, pp.466-484, 2013. ,
DOI : 10.1007/978-3-642-45065-5_24
URL : https://hal.archives-ouvertes.fr/hal-01480788
Branching processes, 2004. ,
DOI : 10.1007/978-3-642-65371-1
Wherefore art thou r3579x?: Anonymized social networks, hidden patterns, and structural steganography, WWW, pp.181-190, 2007. ,
Crowd crawling, Proceedings of the first ACM conference on Online social networks, COSN '13, pp.183-188, 2013. ,
DOI : 10.1145/2512938.2512958
Differential Privacy: A Survey of Results, TAMC, pp.1-19, 2008. ,
DOI : 10.1007/978-3-540-79228-4_1
Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace, AMCIS, p.339, 2007. ,
Branching processes: Variation, growth, and extinction of populations, 2005. ,
DOI : 10.1017/CBO9780511629136
Resisting structural re-identification in anonymized social networks, PVLDB, vol.1, issue.1, pp.102-114, 2008. ,
Analyzing Graphs with Node Differential Privacy, TTC, pp.457-476, 2013. ,
DOI : 10.1007/978-3-642-36594-2_26
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.296.5204
No free lunch in data privacy, Proceedings of the 2011 international conference on Management of data, SIGMOD '11, pp.193-204, 2011. ,
DOI : 10.1145/1989323.1989345
Link privacy in social networks, CIKM, pp.289-298, 2008. ,
Characterizing privacy in online social networks, Proceedings of the first workshop on Online social networks, WOSP '08, pp.37-42, 2008. ,
DOI : 10.1145/1397735.1397744
What is Twitter, a social network or a news media? In WWW, pp.591-600, 2010. ,
The revolutions were tweeted: Information flows during the 2011 Tunisian and Egyptian revolutions, IJoC, vol.5, pp.1375-1405, 2011. ,
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, pp.173-187, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/abs/0903.3276
Politexting: Using mobile technology to connect the unconnected and expanding the scope of political communication, pp.1-8, 2011. ,
A Guide to Differential Privacy Theory in Social Network Analysis, 2012 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, pp.411-417, 2012. ,
DOI : 10.1109/ASONAM.2012.73
Lockr, Proceedings of the 5th international conference on Emerging networking experiments and technologies, CoNEXT '09, pp.169-180, 2009. ,
DOI : 10.1145/1658939.1658959
An Algorithm for Subgraph Isomorphism, Journal of the ACM, vol.23, issue.1, pp.31-42, 1976. ,
DOI : 10.1145/321921.321925
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.361.7741
User interactions in social networks and their implications, Proceedings of the fourth ACM european conference on Computer systems, EuroSys '09, pp.205-218, 2009. ,
DOI : 10.1145/1519065.1519089
Privacy in Social Networks: A Survey, Social Network Data Analytics, pp.277-306, 2011. ,
DOI : 10.1007/978-1-4419-8462-3_10
Preserving Privacy in Social Networks Against Neighborhood Attacks, 2008 IEEE 24th International Conference on Data Engineering, pp.506-515, 2008. ,
DOI : 10.1109/ICDE.2008.4497459
The k-anonymity and l-diversity approaches for privacy preservation in social networks against neighborhood attacks, Knowledge and Information Systems, vol.2, issue.1, pp.47-77, 2011. ,
DOI : 10.1007/s10115-010-0311-2