Anna C. Squicciarini

Information Sciences and Technology Pennsylvania State University, State College, PA, United States 
Information Technology, Computer Science
"Anna Squicciarini"
BETA: Related publications


You can help our author matching system! If you notice any publications incorrectly attributed to this author, please sign in and mark matches as correct or incorrect.

Squicciarini AC, Lin D, Sundareswaran S, et al. (2015) Privacy policy inference of user-uploaded images on content sharing sites Ieee Transactions On Knowledge and Data Engineering. 27: 193-206
Squicciarini AC, Paci F, Sundareswaran S. (2014) PriMa: A comprehensive approach to privacy protection in social network sites Annales Des Telecommunications/Annals of Telecommunications. 69: 21-36
Sundareswaran S, Squicciarini AC. (2012) XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 223-238
Sundareswaran S, Squicciarini AC. (2011) Privacy through web-traveler policies in social network environments Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 466-472
Squicciarini AC, Griffin C, Sundareswaran S. (2011) Towards a game theoretical model for identity validation in social network sites Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 1081-1088
Sundareswaran S, Squicciarini AC. (2010) DeCore: Detecting content repurposing attacks on clients' systems Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 199-216
Sundareswaran S, Squicciarini AC. (2010) Image repurposing for Gifar-based attacks 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Ceas 2010
Squicciarini AC, Sundareswaran S. (2009) Web-traveler policies for images on social networks World Wide Web. 12: 461-484
See more...