Please use this identifier to cite or link to this item:
https://hdl.handle.net/2440/126803
Citations | ||
Scopus | Web of Science® | Altmetric |
---|---|---|
?
|
?
|
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Du, S. | - |
dc.contributor.author | Li, X. | - |
dc.contributor.author | Zhong, J. | - |
dc.contributor.author | Zhou, L. | - |
dc.contributor.author | Xue, M. | - |
dc.contributor.author | Zhu, H. | - |
dc.contributor.author | Sun, L. | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | IEEE Access, 2018; 6:17653-17665 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.issn | 2169-3536 | - |
dc.identifier.uri | http://hdl.handle.net/2440/126803 | - |
dc.description.abstract | The current culture that encourages online dating, and interaction makes large-scale social network users vulnerable to miscellaneous personal identifiable information leakage. To this end, we take a first step toward modeling privacy leakages in large-scale social networks from both technical and economic perspectives. From a technical perspective, we use Markov chain to propose a dynamic attack-defense tree-based model, which is temporal-aware, to characterize an attack effort made by an attacker and a corresponding countermeasure responded by a social network security defender. From an economic perspective, we use static game theory to analyze the ultimate strategies taken by the attacker and the defender, where both rational participants tend to maximize their utilities, with respect to their attack/defense costs. To validate the proposed approach, we perform extensive experimental evaluations on three real-world data sets, triggered by the survey of over 300 volunteers involved, which illuminates the privacy risk management of contemporary social network service providers. | - |
dc.description.statementofresponsibility | Suguo Du, Xiaolong Li, Jinli Zhong, Lu Zhou, Minhui Xue, Haojin Zhu, and Limin Sun | - |
dc.language.iso | en | - |
dc.publisher | IEEE | - |
dc.rights | © 2018 IEEE. Translations and content mining are permitted for academic research only. Personal use is also permitted, but republication/redistribution requires IEEE permission. See http://www.ieee.org/publications_standards/publications/rights/index.html for more information. | - |
dc.source.uri | http://dx.doi.org/10.1109/access.2018.2818116 | - |
dc.subject | Social network services; data privacy; information security | - |
dc.title | Modeling privacy leakage risks in large-scale social networks | - |
dc.type | Journal article | - |
dc.identifier.doi | 10.1109/ACCESS.2018.2818116 | - |
pubs.publication-status | Published | - |
dc.identifier.orcid | Xue, M. [0000-0001-5411-5039] [0000-0002-9172-4252] | - |
Appears in Collections: | Aurora harvest 4 Computer Science publications |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.