Byers et al., 2003
ViewPDF| Publication | Publication Date | Title |
|---|---|---|
| Byers et al. | Automated analysis of P3P-enabled web sites | |
| Urban et al. | Measuring the impact of the GDPR on data sharing in ad networks | |
| Cranor et al. | P3P deployment on websites | |
| Cothey | A longitudinal study of World Wide Web users' information‐searching behavior | |
| US8583612B2 (en) | Whois server verifying whois records and search engine accesses | |
| Chau et al. | Analysis of the query logs of a web site search engine | |
| Vaughan et al. | Search engine coverage bias: evidence and possible causes | |
| Kallepalli et al. | Measuring and modeling usage and reliability for statistical web testing | |
| Bertot et al. | Web usage statistics: measurement issues and analytical techniques | |
| US7849103B2 (en) | Relationship collaboration system | |
| Leon et al. | Token attempt: the misrepresentation of website privacy policies through the misuse of p3p compact policy tokens | |
| US20070130109A1 (en) | Metadata collection within a trusted relationship to increase search relevance | |
| WO2002017109A1 (en) | Data tracking using ip address filtering over a wide area network | |
| Cranor et al. | An analysis of p3p deployment on commercial, government, and children’s web sites as of may 2003 | |
| OBrien et al. | RAMP–the Repository Analytics and Metrics Portal: A prototype web service that accurately counts item downloads from institutional repositories | |
| Akgul | Web site accessibility, quality and vulnerability assessment: a survey of government web sites in the Turkish Republic | |
| Egelman et al. | An analysis of p3p-enabled web sites among top-20 search results | |
| Huntington et al. | Website usage metrics: A re-assessment of session data | |
| Reay et al. | A large-scale empirical study of P3P privacy policies: Stated actions vs. legal obligations | |
| Fassl et al. | Investigating security folklore: A case study on the tor over vpn phenomenon | |
| Jensen et al. | Tracking website data-collection and privacy practices with the iWatch web crawler | |
| Zhang et al. | Is Google Scholar useful for the evaluation of non‐English scientific journals? The case of Chinese journals | |
| Gernhardt et al. | Use of a non-peer reviewed sources in cyber-security scientific research | |
| CN114330466B (en) | Behavior recognition method and device | |
| Sipior et al. | Trust, privacy, and legal protection in the use of software with surreptitiously installed operations: An empirical evaluation |