What is it about?

Highlights • This paper deals with applying a composition attack to anonymized social network data. • A new algorithm for the composition attack is proposed. • Experiments on synthetic scale-free networks show the usability of the algorithm. • The algorithm pairs rightly 20%–30% from all appropriate nodes in the networks.

Featured Image

Read the Original

This page is a summary of: Composition attack against social network data, Computers & Security, May 2018, Elsevier,
DOI: 10.1016/j.cose.2018.01.002.
You can read the full text:

Read

Contributors

The following have contributed to this page