[1]
. R. Ribak and K. Levy-Eshkol, “HACKERS’ PRIVACY APPROACHES: HOW PRIVACY VIOLATION AND PRIVACY PROTECTION GO HAND IN HAND”, SPIR, Jan. 2025.