Journal articles on the topic 'Anonymizing network'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 38 journal articles for your research on the topic 'Anonymizing network.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Das, Sudipto, Omer Egecioglu, and Amr El Abbadi. "Anónimos: An LP-Based Approach for Anonymizing Weighted Social Network Graphs." IEEE Transactions on Knowledge and Data Engineering 24, no. 4 (April 2012): 590–604. http://dx.doi.org/10.1109/tkde.2010.267.
Full textSiddula, Madhuri, Yingshu Li, Xiuzhen Cheng, Zhi Tian, and Zhipeng Cai. "Privacy-Enhancing Preferential LBS Query for Mobile Social Network Users." Wireless Communications and Mobile Computing 2020 (September 1, 2020): 1–13. http://dx.doi.org/10.1155/2020/8892321.
Full textMoreno-Sanchez, Pedro, Tim Ruffing, and Aniket Kate. "PathShuffle: Credit Mixing and Anonymous Payments for Ripple." Proceedings on Privacy Enhancing Technologies 2017, no. 3 (July 1, 2017): 110–29. http://dx.doi.org/10.1515/popets-2017-0031.
Full textNaumov, A. I., V. I. Radygin, and M. N. Ivanov. "IDENTIFICATION OF MIXER TRANSACTIONS IN THE BITCOIN NETWORK IN THE FRAMEWORK OF SOLVING THE PROBLEMS OF PREVENTING MONEY LAUNDERING AND TERRORIST FINANCING." SOFT MEASUREMENTS AND COMPUTING 1, no. 2 (2021): 78–90. http://dx.doi.org/10.36871/2618-9976.2021.02.007.
Full textNastuła, Anna. "New threats in the cyberspace based on the analysis of the TOR (The Onion Router) network." ASEJ Scientific Journal of Bielsko-Biala School of Finance and Law 22, no. 4 (January 23, 2019): 28–31. http://dx.doi.org/10.5604/01.3001.0012.9839.
Full textMartyniuk, Hanna, Valeriy Kozlovskiy, Serhii Lazarenko, and Yuriy Balanyuk. "Data Mining Technics and Cyber Hygiene Behaviors in Social Media." South Florida Journal of Development 2, no. 2 (May 26, 2021): 2503–15. http://dx.doi.org/10.46932/sfjdv2n2-108.
Full textPsaroudakis, Ioannis, Vasilios Katos, and Pavlos S. Efraimidis. "A novel mechanism for anonymizing Global System for Mobile Communications calls using a resource-based Session Initiation Protocol community network." Security and Communication Networks 8, no. 3 (June 26, 2014): 486–500. http://dx.doi.org/10.1002/sec.995.
Full textFranchi, Enrico, Agostino Poggi, and Michele Tomaiuolo. "Blogracy." International Journal of Distributed Systems and Technologies 7, no. 2 (April 2016): 37–56. http://dx.doi.org/10.4018/ijdst.2016040103.
Full textQiu, Ying, Yi Liu, Xuan Li, and Jiahui Chen. "A Novel Location Privacy-Preserving Approach Based on Blockchain." Sensors 20, no. 12 (June 21, 2020): 3519. http://dx.doi.org/10.3390/s20123519.
Full textZhou, Fan, Kunpeng Zhang, Shuying Xie, and Xucheng Luo. "Learning to Correlate Accounts Across Online Social Networks: An Embedding-Based Approach." INFORMS Journal on Computing 32, no. 3 (July 2020): 714–29. http://dx.doi.org/10.1287/ijoc.2019.0911.
Full textTan, Rong, Yuan Tao, Wen Si, and Yuan-Yuan Zhang. "Privacy preserving semantic trajectory data publishing for mobile location-based services." Wireless Networks 26, no. 8 (June 15, 2019): 5551–60. http://dx.doi.org/10.1007/s11276-019-02058-8.
Full textDécary-Hétu, David, Vincent Mousseau, and Sabrina Vidal. "Six Years Later." Contemporary Drug Problems 45, no. 4 (September 4, 2018): 366–81. http://dx.doi.org/10.1177/0091450918797355.
Full textRamya, G., and Ms Viji AmuthaMary. "Restricting Mischievous Users in Anonymizing Networks." International Journal of Engineering Trends and Technology 9, no. 2 (March 25, 2014): 88–92. http://dx.doi.org/10.14445/22315381/ijett-v9p218.
Full textBabu, Korra Sathya, Sanjay Kumar Jena, Jhalaka Hota, and Bijayinee Moharana. "Anonymizing social networks: A generalization approach." Computers & Electrical Engineering 39, no. 7 (October 2013): 1947–61. http://dx.doi.org/10.1016/j.compeleceng.2013.01.020.
Full textTsang, Patrick P., Apu Kapadia, Cory Cornelius, and Sean W. Smith. "Nymble: Blocking Misbehaving Users in Anonymizing Networks." IEEE Transactions on Dependable and Secure Computing 8, no. 2 (March 2011): 256–69. http://dx.doi.org/10.1109/tdsc.2009.38.
Full textVina Lomte, Prof, Pooja Gorlewar, Vishal Padghan, Kritika Gunjegaonkar, and Rashmi Kawale. "Nymble: Blocking Misbehaving Users In Anonymizing Networks." IOSR Journal of Computer Engineering 16, no. 1 (2014): 43–48. http://dx.doi.org/10.9790/0661-16124348.
Full textMa, Jiangtao, Yaqiong Qiao, Guangwu Hu, Yongzhong Huang, Arun Kumar Sangaiah, Chaoqin Zhang, Yanjun Wang, and Rui Zhang. "De-Anonymizing Social Networks With Random Forest Classifier." IEEE Access 6 (2018): 10139–50. http://dx.doi.org/10.1109/access.2017.2756904.
Full textYang, Ming, Junzhou Luo, Zhen Ling, Xinwen Fu, and Wei Yu. "De-anonymizing and countermeasures in anonymous communication networks." IEEE Communications Magazine 53, no. 4 (April 2015): 60–66. http://dx.doi.org/10.1109/mcom.2015.7081076.
Full textFu, Luoyi, Jiapeng Zhang, Shuaiqi Wang, Xinyu Wu, Xinbing Wang, and Guihai Chen. "De-Anonymizing Social Networks With Overlapping Community Structure." IEEE/ACM Transactions on Networking 28, no. 1 (February 2020): 360–75. http://dx.doi.org/10.1109/tnet.2019.2962731.
Full textChiasserini, Carla-Fabiana, Michel Garetto, and Emili Leonardi. "De-anonymizing Clustered Social Networks by Percolation Graph Matching." ACM Transactions on Knowledge Discovery from Data 12, no. 2 (March 13, 2018): 1–39. http://dx.doi.org/10.1145/3127876.
Full textTahera, Mrs Umama. "Blacklisting Misbehaving Users for Enhancing Security in Anonymizing Networks." IOSR Journal of Computer Engineering 9, no. 5 (2013): 15–20. http://dx.doi.org/10.9790/0661-0951520.
Full textZhang, Shiwen, Qin Liu, and Yaping Lin. "Anonymizing popularity in online social networks with full utility." Future Generation Computer Systems 72 (July 2017): 227–38. http://dx.doi.org/10.1016/j.future.2016.05.007.
Full textXie, Yinglian, Fang Yu, and Martin Abadi. "De-anonymizing the internet using unreliable IDs." ACM SIGCOMM Computer Communication Review 39, no. 4 (August 16, 2009): 75–86. http://dx.doi.org/10.1145/1594977.1592579.
Full textSun, Qi, Jiguo Yu, Honglu Jiang, Yixian Chen, and Xiuzhen Cheng. "De-anonymizing Scale-Free Social Networks by Using Spectrum Partitioning Method." Procedia Computer Science 147 (2019): 441–45. http://dx.doi.org/10.1016/j.procs.2019.01.262.
Full textGao, Tianchong, Feng Li, Yu Chen, and XuKai Zou. "Local Differential Privately Anonymizing Online Social Networks Under HRG-Based Model." IEEE Transactions on Computational Social Systems 5, no. 4 (December 2018): 1009–20. http://dx.doi.org/10.1109/tcss.2018.2877045.
Full textPalanisamy, Balaji, Ling Liu, Kisung Lee, Shicong Meng, Yuzhe Tang, and Yang Zhou. "Anonymizing continuous queries with delay-tolerant mix-zones over road networks." Distributed and Parallel Databases 32, no. 1 (August 27, 2013): 91–118. http://dx.doi.org/10.1007/s10619-013-7128-4.
Full textPiacentino, Esteban, Alvaro Guarner, and Cecilio Angulo. "Generating Synthetic ECGs Using GANs for Anonymizing Healthcare Data." Electronics 10, no. 4 (February 5, 2021): 389. http://dx.doi.org/10.3390/electronics10040389.
Full textZakerzadeh, Hessam, and Sylvia L. Osborn. "Delay-sensitive approaches for anonymizing numerical streaming data." International Journal of Information Security 12, no. 5 (March 26, 2013): 423–37. http://dx.doi.org/10.1007/s10207-013-0196-7.
Full textOtgonbayar, Ankhbayar, Zeeshan Pervez, and Keshav Dahal. "$X-BAND$ : Expiration Band for Anonymizing Varied Data Streams." IEEE Internet of Things Journal 7, no. 2 (February 2020): 1438–50. http://dx.doi.org/10.1109/jiot.2019.2955435.
Full textNGUYEN-SON, Hoang-Quoc, Minh-Triet TRAN, Hiroshi YOSHIURA, Noboru SONEHARA, and Isao ECHIZEN. "Anonymizing Personal Text Messages Posted in Online Social Networks and Detecting Disclosures of Personal Information." IEICE Transactions on Information and Systems E98.D, no. 1 (2015): 78–88. http://dx.doi.org/10.1587/transinf.2014mup0016.
Full textYin, Xiao Chun, Zeng Guang Liu, Bruce Ndibanje, Lewis Nkenyereye, and S. M. Riazul Islam. "An IoT-Based Anonymous Function for Security and Privacy in Healthcare Sensor Networks." Sensors 19, no. 14 (July 17, 2019): 3146. http://dx.doi.org/10.3390/s19143146.
Full textKhan, Rafiullah, Muhammad Arshad Islam, Mohib Ullah, Muhammad Aleem, and Muhammad Azhar Iqbal. "Privacy Exposure Measure: A Privacy-Preserving Technique for Health-Related Web Search." Journal of Medical Imaging and Health Informatics 9, no. 6 (August 1, 2019): 1196–204. http://dx.doi.org/10.1166/jmihi.2019.2709.
Full textHimabindu, Ch. "The Challenges of Effectively Anonymizing Network Data." International Journal of Pharmacology and Pharmaceutical Technology, January 2013, 15–22. http://dx.doi.org/10.47893/ijppt.2013.1003.
Full textTzanetakis, Meropi, David Décary-Hétu, Silje Bakken, Rasmus Munksgaard, Christian Katzenbach, Jakob Demant, Masarah Paquet-Clouston, and Laurin Weissinger. "DRUG MARKETS AND ANONYMIZING TECHNOLOGIES." AoIR Selected Papers of Internet Research, February 2, 2020. http://dx.doi.org/10.5210/spir.v2018i0.10463.
Full textHodo, Elike, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, and Robert Atkinson. "Machine Learning Approach for Detection of nonTor Traffic." Journal of Cyber Security and Mobility, November 3, 2017. http://dx.doi.org/10.13052/2245-1439.624.
Full textLinoy, Shlomi, Natalia Stakhanova, and Suprio Ray. "De‐anonymizing Ethereum blockchain smart contracts through code attribution." International Journal of Network Management, August 4, 2020. http://dx.doi.org/10.1002/nem.2130.
Full textPalmieri, Francesco. "A Distributed Flow Correlation Attack to Anonymizing Overlay Networks Based on Wavelet Multi-resolution Analysis." IEEE Transactions on Dependable and Secure Computing, 2019, 1. http://dx.doi.org/10.1109/tdsc.2019.2947666.
Full textFroese, Vincent, Brijnesh Jain, Rolf Niedermeier, and Malte Renken. "Comparing temporal graphs using dynamic time warping." Social Network Analysis and Mining 10, no. 1 (June 29, 2020). http://dx.doi.org/10.1007/s13278-020-00664-5.
Full text