12.07.2015 Views

Caracterização e re-identificação de papéis em Redes de Conexão

Caracterização e re-identificação de papéis em Redes de Conexão

Caracterização e re-identificação de papéis em Redes de Conexão

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

1 2 3 4 5 6 7 8 9 10 Max1 0 2 2 3 2 2 3 3 2 3 132 2 0 2 3 2 2 3 3 2 3 143 2 2 0 3 2 2 3 3 2 3 144 3 3 3 0 3 3 2 2 3 2 125 2 2 2 3 0 2 3 3 2 3 136 2 2 2 3 2 0 3 3 2 3 137 3 3 3 2 3 3 0 2 3 2 128 3 3 3 2 3 3 2 0 3 2 149 2 2 2 3 2 2 3 3 0 3 1310 3 3 3 2 3 3 2 2 3 0 12Tabela 2. Distância ent<strong>re</strong> os 10 vértices <strong>de</strong> maior grauAnônimas.ReferênciasAlbert, R. and Barabási, A.-L. (2002). Statistical mechanics of complex networks. Rev.Mod. Phys., 74(1):47–97.Baeza-Yates, R. and Ribeiro-Neto, B. (1999). Mo<strong>de</strong>rn Information Retrieval. AddisonWesley.Colby Walsworth, Emile Aben, k. c. D. A. (2009). The caida anonymized 2009 internettraces - ¡dates used¿.Cormen, T. H., Leiserson, C. E., Rivest, R. L., and Stein, C. (2001). Introduction toAlgorithms, Second Edition. McGraw-Hill Science/Engineering/Math.Hay, M., Miklau, G., Jensen, D., Towsley, D. F., and Weis, P. (2008). Resisting structural<strong>re</strong>-i<strong>de</strong>ntification in anonymized social networks. VLDB, 1(1):102–114.Hay, M. and Srivastava, S. (2006). Privacy and anonymity in graph data.Iliofotou, M., Pappu, P., Faloutsos, M., Mitzenmacher, M., Singh, S., and Varghese, G.(2007). Network monitoring using traffic dispersion graphs (tdgs). In Proceedingsof the 7th ACM SIGCOMM Internet Measu<strong>re</strong>ment Confe<strong>re</strong>nce, pages 315–320, NewYork, NY, USA. ACM.Kitsak, M., Gallos, L. K., Havlin, S., Liljeros, F., Muchnik, L., Stanley, H. E., andMakse, H. A. (2010). I<strong>de</strong>ntifying influential sp<strong>re</strong>a<strong>de</strong>rs in complex networks. citearxiv:1001.5285 Comment: 31 pages, 12 figu<strong>re</strong>s.Maha<strong>de</strong>van, P., Krioukov, D., Dimitropoulos, X., Huffaker, B., Fomenkov, M., kc claffy,and Vahdat, A. The internet as-level topology: Th<strong>re</strong>e data sources and one <strong>de</strong>finitiv<strong>em</strong>etric.Meiss, M., Menczer, F., and Vespignani, A. (2005). On the lack of typical behavior inthe global web traffic network. In WWW ’05: Proceedings of the 14th internationalconfe<strong>re</strong>nce on World Wi<strong>de</strong> Web, pages 510–518, New York, NY, USA. ACM.Narayanan, A. and Shmatikov, V. (2009). De-anonymizing social networks. Security andPrivacy, IEEE Symposium on, 0:173–187.Pang, R., Allman, M., Paxson, V., and Lee, J. (2006). The <strong>de</strong>vil and packet trace anonymization.SIGCOMM Comput. Commun. Rev., 36(1):29–38.1942

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!