ã½ã¼ã·ã£ã«ã¡ãã£ã¢ãåºãå©ç¨ãããããã«ãªãã¾ããããèªåã®çºè¨ã ãã§ã¯ãªããèªåã®å¨è¾ºã«å± ããå£ã®è»½ã人ãããã©ã¤ãã·æ¼æ´©ã®è å¨ã¨ãªã£ã¦ãã¾ãã ãã ãã©ããã£ã人ããå£ã軽ããã®ãã«é¢ãã¦ã®å®¢è¦³çãªææ¨ã¨ããã®ãä¸è¬çã«åå¨ããªãã®ã§ããã©ãã¾ã§ãOKããã«é¢ãã¦ã¯äººã«ãã£ã¦è§£éãéãã¾ãã ãã®ãããªè©±é¡ã«é¢é£ããããªè«æãã第17å ACM SIGKDD international conference on Knowledge discovery and data mining(Proceedings)ã§çºè¡¨ããã¦ãã¾ããã ãExploiting vulnerability to secure user privacy on a social networking siteã(PDF)ã¨ããè«æã§ã¯ãFacebookã«ããã¦å人ãèªåã®ãã©ã¤ãã·ã«å¯¾ããè å¨ã¨æãå¾ã確çãæ¨å®
{{#tags}}- {{label}}
{{/tags}}