Anna C. Squicciarini - Publications

Information Sciences and Technology Pennsylvania State University, State College, PA, United States 
Information Technology, Computer Science

8 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2015 Squicciarini AC, Lin D, Sundareswaran S, Wede J. Privacy policy inference of user-uploaded images on content sharing sites Ieee Transactions On Knowledge and Data Engineering. 27: 193-206. DOI: 10.1109/Tkde.2014.2320729  0.4
2014 Squicciarini AC, Paci F, Sundareswaran S. PriMa: A comprehensive approach to privacy protection in social network sites Annales Des Telecommunications/Annals of Telecommunications. 69: 21-36. DOI: 10.1007/S12243-013-0371-X  0.52
2012 Sundareswaran S, Squicciarini AC. XSS-Dec: A hybrid solution to mitigate cross-site scripting attacks Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 7371: 223-238. DOI: 10.1007/978-3-642-31540-4_17  1
2011 Sundareswaran S, Squicciarini AC. Privacy through web-traveler policies in social network environments Coliaboratecom 2011 - Proceedings of the 7th International Conference On Collaborative Computing: Networking, Applications and Worksharing. 466-472. DOI: 10.4108/icst.collaboratecom.2011.247169  1
2011 Squicciarini AC, Griffin C, Sundareswaran S. Towards a game theoretical model for identity validation in social network sites Proceedings - 2011 Ieee International Conference On Privacy, Security, Risk and Trust and Ieee International Conference On Social Computing, Passat/Socialcom 2011. 1081-1088. DOI: 10.1109/PASSAT/SocialCom.2011.208  0.6
2010 Sundareswaran S, Squicciarini AC. DeCore: Detecting content repurposing attacks on clients' systems Lecture Notes of the Institute For Computer Sciences, Social-Informatics and Telecommunications Engineering. 50: 199-216. DOI: 10.1007/978-3-642-16161-2_12  1
2010 Sundareswaran S, Squicciarini AC. Image repurposing for Gifar-based attacks 7th Annual Collaboration, Electronic Messaging, Anti-Abuse and Spam Conference, Ceas 2010 1
2009 Squicciarini AC, Sundareswaran S. Web-traveler policies for images on social networks World Wide Web. 12: 461-484. DOI: 10.1007/S11280-009-0070-8  1
Show low-probability matches.