Abusing Social Networks for Automated User Profiling, Recent Advances in Intrusion Detection, pp.422-441, 2010. ,
DOI : 10.1007/978-3-642-15512-3_22
URL : http://www.iseclab.org/papers/raid2010.pdf
All your contacts are belong to us, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526784
Twitter mood predicts the stock market, Journal of Computational Science, vol.2, issue.1, 1010. ,
DOI : 10.1016/j.jocs.2010.12.007
URL : http://arxiv.org/pdf/1010.3003
Estimating age privacy leakage in online social networks, 2012 Proceedings IEEE INFOCOM, 2012. ,
DOI : 10.1109/INFCOM.2012.6195711
URL : http://cis.poly.edu/~ratan/facebookusersagepapershort.pdf
Inferring Privacy Information from Social Networks, IEEE Intl. Conf. on Intelligence and Security Informatics, pp.154-165, 2006. ,
DOI : 10.1007/11760146_14
URL : http://nrl.iis.sinica.edu.tw/Web2.0/presentation/1225-present.pdf
Predicting aggregate social activities using continuous-time stochastic process, Proceedings of the 21st ACM international conference on Information and knowledge management, CIKM '12, 2012. ,
DOI : 10.1145/2396761.2396885
URL : http://pike.psu.edu/publications/cikm12.pdf
Valuating Privacy, IEEE Security and Privacy Magazine, vol.3, issue.5, pp.22-25, 2005. ,
DOI : 10.1109/MSP.2005.137
New privacy threats in healthcare informatics: When medical records join the web, BIOKDD, 2010. ,
Location Type Classification Using Tweet Content, 2012 11th International Conference on Machine Learning and Applications, pp.232-237, 2012. ,
DOI : 10.1109/ICMLA.2012.47
URL : http://pike.psu.edu/publications/icmla12.pdf
On Protecting Private Information in Social Networks: A Proposal, 2009 IEEE 25th International Conference on Data Engineering, 2009. ,
DOI : 10.1109/ICDE.2009.158
The failure of online social network privacy settings, 2011. ,
Home Location Identification of Twitter Users, ACM Transactions on Intelligent Systems and Technology, vol.5, issue.3, p.2014 ,
DOI : 10.1007/BF00058655
Loose tweets, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011. ,
DOI : 10.1145/2046556.2046558
You are who you know, Proceedings of the third ACM international conference on Web search and data mining, WSDM '10, 2010. ,
DOI : 10.1145/1718487.1718519
Our Twitter Profiles, Our Selves: Predicting Personality with Twitter, 2011 IEEE Third Int'l Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third Int'l Conference on Social Computing, 2011. ,
DOI : 10.1109/PASSAT/SocialCom.2011.26
A practical attack to deanonymize social network users, IEEE Security & Privacy, 2010. ,
DOI : 10.1109/sp.2010.21
URL : http://www.iseclab.org/papers/sonda.pdf
Stalking online, Proceedings of the second ACM conference on Data and Application Security and Privacy, CODASKY '12, 2012. ,
DOI : 10.1145/2133601.2133607
To join or not to join, Proceedings of the 18th international conference on World wide web, WWW '09, 2009. ,
DOI : 10.1145/1526709.1526781