TY - JOUR AU - Yang, C. C. AU - Sageman, M. PY - 2009 DA - 2009// TI - Analysis of terrorist social networks with fractal views JO - J Inf Sci VL - 35 UR - https://doi.org/10.1177/0165551508099089 DO - 10.1177/0165551508099089 ID - Yang2009 ER - TY - BOOK AU - Yang, C. C. AU - Ng, T. PY - 2007 DA - 2007// TI - Terrorism and crime related weblog social network: Link, content analysis and information visualization ID - Yang2007 ER - TY - BOOK AU - Yang, C. C. AU - Liu, N. AU - Sageman, M. PY - 2007 DA - 2007// TI - Analyzing the terrorist social networks with visualization tools ID - Yang2007 ER - TY - STD TI - Yang CC, Tang X: Social networks integration and privacy preservation using subgraph generalization. In Proceedings of the ACM SIGKDD Workshop on CyberSecurity and Intelligence Informatics. ACM, ; 53–61. ID - ref4 ER - TY - JOUR AU - Yang, C. C. AU - Tang, X. PY - 2010 DA - 2010// TI - Information Integration for Terrorist or Criminal Social Networks JO - Ann Inform Syst VL - 9 UR - https://doi.org/10.1007/978-1-4419-1325-8_3 DO - 10.1007/978-1-4419-1325-8_3 ID - Yang2010 ER - TY - STD TI - Tang X, Yang CC: “Generalizing terrorist social networks with K-nearest neighbor and edge betweeness for social network integration and privacy preservation,”.IEEE Int Conf Intell Secur Inform IEEE 49–54. ID - ref6 ER - TY - JOUR AU - Yang, C. C. AU - Thuraisingham, B. PY - 2010 DA - 2010// TI - Privacy-Preserved Social Network Integration and Analysis for Security Informatics JO - IEEE Intell Syst VL - 25 ID - Yang2010 ER - TY - STD TI - Campan A, Truta T: “A clustering approach for data and structural anonymity in social networks,”.Proceeding of the second ACM SIGKDD International Workshop on Privacy, Security, and Trust in KDD ID - ref8 ER - TY - BOOK AU - Hay, M. AU - Miklau, G. AU - Jensen, D. AU - Weis, P. AU - Srivastava, S. PY - 2007 DA - 2007// TI - “Anonymizing social networks,” ID - Hay2007 ER - TY - BOOK PY - 2008 DA - 2008// TI - ACM SIGMOD international conference on Management of data PB - ACM New York CY - NY, USA ID - ref10 ER - TY - JOUR AU - Hay, M. AU - Miklau, G. AU - Jensen, D. AU - Towsley, D. AU - Weis, P. PY - 2008 DA - 2008// TI - Resisting structural re-identification in anonymized social networks JO - Proc VLDB Endowment Arch VL - 1 UR - https://doi.org/10.14778/1453856.1453873 DO - 10.14778/1453856.1453873 ID - Hay2008 ER - TY - CHAP AU - Zhou, B. AU - Pei, J. PY - 2008 DA - 2008// TI - “Preserving privacy in social networks against neighborhood attacks,” BT - IEEE 24th International Conference on Data Engineering ID - Zhou2008 ER - TY - JOUR AU - Zheleva, E. AU - Getoor, L. PY - 2008 DA - 2008// TI - Preserving the privacy of sensitive relationships in graph data JO - Lecture Notes Comput Sci VL - 4980 UR - https://doi.org/10.1007/978-3-540-78478-4_9 DO - 10.1007/978-3-540-78478-4_9 ID - Zheleva2008 ER - TY - STD TI - Backstrom L, Dwork C, Kleinberg J: “Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography,”. In Proceedings of the 16th international conference on World Wide Web. ACM New York, NY, USA; 181–190. ID - ref14 ER - TY - JOUR AU - Cormode, G. AU - Srivastava, D. AU - Yu, T. AU - Zhang, Q. PY - 2008 DA - 2008// TI - Anonymizing bipartite graph data using safe groupings JO - Proc VLDB Endowment Arch VL - 1 UR - https://doi.org/10.14778/1453856.1453947 DO - 10.14778/1453856.1453947 ID - Cormode2008 ER - TY - BOOK AU - Ying, X. AU - Wu, X. PY - 2008 DA - 2008// TI - “Randomizing social networks: a spectrum preserving approach,” SIAM Conf. on Data Mining ID - Ying2008 ER - TY - JOUR AU - Sweeney, L. PY - 2002 DA - 2002// TI - k-anonymity: A model for protecting privacy JO - Int J Uncertainty Fuzziness Knowledge Based Syst VL - 10 UR - https://doi.org/10.1142/S0218488502001648 DO - 10.1142/S0218488502001648 ID - Sweeney2002 ER - TY - CHAP AU - Samarati, P. PY - 2001 DA - 2001// TI - “Protecting respondents' identities in microdata release,” BT - IEEE Transac Knowledge Data Eng ID - Samarati2001 ER - TY - JOUR AU - Machanavajjhala, A. AU - Kifer, D. AU - Gehrke, J. AU - Venkitasubramaniam, M. PY - 2007 DA - 2007// TI - “l-diversity: Privacy beyond k-anonymity” JO - ACM Trans Knowledge Discov Data (TKDD) VL - 1 UR - https://doi.org/10.1145/1217299.1217302 DO - 10.1145/1217299.1217302 ID - Machanavajjhala2007 ER - TY - BOOK PY - 2006 DA - 2006// TI - ACM SIGMOD international conference on Management of data PB - ACM New York CY - NY, USA ID - ref20 ER - TY - STD TI - Wong R, Li J, Fu A, Wang K: “(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing,”. ACM Press, ; 754–759. ID - ref21 ER - TY - STD TI - Frikken K, Golle P: “Private social network analysis: How to assemble pieces of a graph privately,”. ACM New York, NY, USA; :89–98. ID - ref22 ER - TY - BOOK AU - Sageman, M. PY - 2004 DA - 2004// TI - Understanding Terror Networks UR - https://doi.org/10.9783/9780812206791 DO - 10.9783/9780812206791 ID - Sageman2004 ER -