All Stories

  1. A Systematic Mapping Study on Social Network Privacy: Threats and Solutions
  2. Hidden things and implicit interaction
  3. Privacy Threat Modeling
  4. Evasion and Countermeasures Techniques to Detect Dynamic Binary Instrumentation Frameworks
  5. A Set of Privacy Inspection Techniques for Online Social Networks