User talk:Exploredragon/Evercookie/Bibliography

Andrés, José Angel González. 2011. “Identity Denial in Internet.” Inteligencia y Seguridad 2011(10):75–101.

Anon. 2013. “Dataveillance and Countervailance.” "Raw Data" Is an Oxymoron.

Ayenson, Mika, Dietrich James Wambach, Ashkan Soltani, Nathan Good, and Chris Jay Hoofnagle. 2011. “Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning.” SSRN Electronic Journal.

Azad, Babak Amin, Oleksii Starov, Pierre Laperdrix, and Nick Nikiforakis. 2020. “Web Runner 2049: Evaluating Third-Party Anti-Bot Services.” Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science 135–59.

Boda, Károly, Ádám Máté Földes, Gábor György Gulyás, and Sándor Imre. 2012. “User Tracking on the Web via Cross-Browser Fingerprinting.” Information Security Technology for Applications Lecture Notes in Computer Science 31–46.

Bowman, Laura J. 2012. “Pulling Back the Curtain: Online Consumer Tracking.” Journal of Law and Policy for the Information Society 7.

Bujlow, Tomasz, ValenT Ín Carela-Espanol, Josep Sole-Pareta, and Pere Barlet-RosProceedings of the IEEE. 2017. “A Survey on Web Tracking: Mechanisms, Implications, and Defenses.” Proceedings of the IEEE 105:1476–1510.

Davik, Christine Suzanne. 2013. “We Know Who You Are and What You Are Made Of: The Illusion of Internet Anonymity and Its Impact on Protection from Genetic Discrimination.” Case Western Reserve Law Review 64(1).

Hennigan, Eric, Christoph Kerschbaumer, Stefan Brunthaler, and Michael Franz. n.d. “Tracking the Information Flow for Dynamically Typed Programming Languages by Instruction Set Extension.” Research Gate. Retrieved (https://www.researchgate.net/publication/266885652_Tracking_Information_Flow_for_Dynamically_Typed_Programming_Languages_by_Instruction_Set_Extension).

Hoofnagle, Chris Jay, Ashkan Soltani, Nathaniel Good, Dietrich J. Wambach, and Mika D. Ayenson. 2012. “Behavioral Advertising: The Offer You Cannot Refuse.” Harvard Law & Policy Review 6.

Hupperich, Thomas, Henry Hosseini, and Thorsten Holz. 2016. “Leveraging Sensor Fingerprinting for Mobile Device Authentication.” Detection of Intrusions and Malware, and Vulnerability Assessment Lecture Notes in Computer Science 377–96.

Kamara, Irene and Eleni Kosta. 2016. “Do Not Track Initiatives: Regaining the Lost User Control.” International Data Privacy Law 6(4):276–90.

Kramar, Tomas, Michal Barla, and Maria Bielikova. 2012. “ PERSONALIZING SEARCH USING SOCIALLY ENHANCED INTEREST MODEL, BUILT FROM THE STREAM OF USER’S ACTIVITY.” Journal of Web Engineering 12.

Steindel, Tracy A. 2011. “A Path toward User Control of Online Profiling.” Michigan Telecommunications and Technology Law Review 17(2).

Urban, Tobias, Dennis Tatang, Thorsten Holz, and Norbert Pohlmann. 2018. “Towards Understanding Privacy Implications of Adware and Potentially Unwanted Programs.” Computer Security Lecture Notes in Computer Science 449–69.

Arthur S. Hayes (2014) The USPS as an OSP: A Remedy for Users’ Online Privacy Concerns, Communication Law and Policy, 19:4, 465-507, DOI: 10.1080/10811680.2014.955770

Heckman, Kristin E., Frank J. Stech, Roshan K. Thomas, Ben Schmoker, and Alexander W. Tsow. 2015. “Cyber Denial, Deception and Counter Deception.” Advances in Information Security.

Ayala, Luis. 2016. Cybersecurity Lexicon.

Christl, Wolfie and Sarah Spiekermann. 2016. Networks of Control a Report on Corporate Surveillance, Digital Tracking, Big Data & Privacy. Wien: facultas.

Fifield, David and Serge Egelman. 2015. “Fingerprinting Web Users Through Font Metrics.” Financial Cryptography and Data Security Lecture Notes in Computer Science 107–24. Exploredragon (talk) 02:13, 19 October 2020 (UTC)