What is it about?
Highlights • This paper deals with applying a composition attack to anonymized social network data. • A new algorithm for the composition attack is proposed. • Experiments on synthetic scale-free networks show the usability of the algorithm. • The algorithm pairs rightly 20%–30% from all appropriate nodes in the networks.
Featured Image
Read the Original
This page is a summary of: Composition attack against social network data, Computers & Security, May 2018, Elsevier,
DOI: 10.1016/j.cose.2018.01.002.
You can read the full text:
Contributors
The following have contributed to this page







