標題: Titlebook: Computational Social Networks; Security and Privacy Ajith Abraham Book 2012 Springer-Verlag London 2012 Ad Hoc Network Applications and Ser [打印本頁] 作者: lexicographer 時間: 2025-3-21 18:14
書目名稱Computational Social Networks影響因子(影響力)
書目名稱Computational Social Networks影響因子(影響力)學科排名
書目名稱Computational Social Networks網絡公開度
書目名稱Computational Social Networks網絡公開度學科排名
書目名稱Computational Social Networks被引頻次
書目名稱Computational Social Networks被引頻次學科排名
書目名稱Computational Social Networks年度引用
書目名稱Computational Social Networks年度引用學科排名
書目名稱Computational Social Networks讀者反饋
書目名稱Computational Social Networks讀者反饋學科排名
作者: Felicitous 時間: 2025-3-21 23:52
Blogging Around the Globe: Motivations, Privacy Concerns, and Social Networkingntent that is changing the way people access information, form social networks, and interact with acquaintances. Moreover, blogs are associated with extensive social communities defined by interconnecting references, and are considered to be one of the early catalysts for propelling the popularity o作者: 緊張過度 時間: 2025-3-22 04:23 作者: DOSE 時間: 2025-3-22 04:52
Privacy Settings in Online Social Networks as a Conflict of Interests: Regulating User Behavior on , this evaluation, an institutional economics point of view shall be applied. Against this background, the following analysis of how Facebook as a provider of an online social network designs its platform in such a way that their own interests, as many users’ data to keep visible and searchable, are 作者: synovitis 時間: 2025-3-22 09:28 作者: FLUSH 時間: 2025-3-22 13:49 作者: FLUSH 時間: 2025-3-22 17:30
Exploring Influence and Interests Among Users Within Social Networksthe main definitions of influence, which are based on a small set of “snapshot” observations of a social network. The former is particularly useful because large-scale social network data sets are often only available in snapshots or crawls. In our work, considering a rich dataset of user preference作者: 裙帶關系 時間: 2025-3-23 00:35
User Cooperation, Virality and Gaming in a Social Mobile Network: The Gedda-Headz Conceptaming concept that brings these two areas together. Gedda-Headz is a social mobile network that mainly focuses on multiplayer mobile gaming. First we will thoroughly discuss how users may cooperate with each other in Gedda-Headz, as cooperation is very important in a mobile environment. Among other 作者: acrobat 時間: 2025-3-23 02:51 作者: 喃喃訴苦 時間: 2025-3-23 06:06
Providing Group Anonymity in Social Networkse different information regardless of where they live or work. However, giving out any sensitive information can pose significant security threats for the owner of the information. As more privacy challenges arise, people become concerned about their security. Many social networking websites provide作者: 輕浮思想 時間: 2025-3-23 10:05
Anonymisation of Social Networks and Rough Set Approach changes in the social structure and roles of individuals in it. There are many evidences (HIPAA (2002) Health insurance portability and accountability act. Available online http://www.hhs.gov/ocr/hipaa; Lambert, J Off Stat 9:313–331, 1993; Xu (2006) Utility based anonymisation using local recording作者: Malfunction 時間: 2025-3-23 17:27
Behavioural Patterns and Social Networks in Anonymity Systemsreal-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested作者: Infiltrate 時間: 2025-3-23 18:35
Ajith AbrahamPresents the latest advances in security and privacy issues in computational social networks, and illustrates how both organizations and individuals can be protected from real-world threats.Discusses 作者: moribund 時間: 2025-3-24 01:47
http://image.papertrans.cn/c/image/233129.jpg作者: Calibrate 時間: 2025-3-24 04:38
https://doi.org/10.1007/978-1-4471-4051-1Ad Hoc Network Applications and Services; Anonymity and Privacy; Ethical Dilemmas; Information Sharing; 作者: Defense 時間: 2025-3-24 09:48
978-1-4471-5815-8Springer-Verlag London 2012作者: BRIDE 時間: 2025-3-24 12:44
Steve Evans,Lloyd Fernando,Miying Yangial network service is an online service, platform, or site that focuses on building and reflecting of social relations among people. A social network service essentially consists of a representation of each user called a ., his/her social links, and a variety of additional services. Recent years ha作者: 組裝 時間: 2025-3-24 18:18 作者: 漂泊 時間: 2025-3-24 21:31
Steve Evans,Lloyd Fernando,Miying Yangionships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated or ignored. The problem is exacerbated by lacking experience and awareness in users, as well as poorly designed tools for privacy management on the pa作者: Projection 時間: 2025-3-25 00:10 作者: 胎兒 時間: 2025-3-25 06:20 作者: 圣人 時間: 2025-3-25 10:26 作者: CORE 時間: 2025-3-25 13:41
G. Q. Jin,W. D. Li,S. Wang,S. M. Gaothe main definitions of influence, which are based on a small set of “snapshot” observations of a social network. The former is particularly useful because large-scale social network data sets are often only available in snapshots or crawls. In our work, considering a rich dataset of user preference作者: 攀登 時間: 2025-3-25 17:43 作者: 威脅你 時間: 2025-3-25 22:59 作者: Outmoded 時間: 2025-3-26 03:21 作者: 微生物 時間: 2025-3-26 06:46 作者: 為寵愛 時間: 2025-3-26 11:11
https://doi.org/10.1007/978-981-97-3153-4real-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested作者: Inflammation 時間: 2025-3-26 15:46
G. Q. Jin,W. D. Li,S. Wang,S. M. Gao we study the measurement of influence within the network according to interest dependencies. We validate our analysis using the history of user social interactions on Facebook. Furthermore, this chapter shows how these ideas can be applied in real-world scenarios, namely for recommendation and advertising systems.作者: corpuscle 時間: 2025-3-26 17:23
Heribert Meffert,Christian Raucher, an effective framework for service selection of social network is proposed. The experimental results on overhead, social service deduction time, average delay have also been obtained. The results show that the proposed framework is effective.作者: 使殘廢 時間: 2025-3-26 20:59 作者: Palatial 時間: 2025-3-27 03:57
Exploring Influence and Interests Among Users Within Social Networks we study the measurement of influence within the network according to interest dependencies. We validate our analysis using the history of user social interactions on Facebook. Furthermore, this chapter shows how these ideas can be applied in real-world scenarios, namely for recommendation and advertising systems.作者: 竊喜 時間: 2025-3-27 07:06
An Effective User-Driven Framework for Selection of Social Network Serviceser, an effective framework for service selection of social network is proposed. The experimental results on overhead, social service deduction time, average delay have also been obtained. The results show that the proposed framework is effective.作者: 主動 時間: 2025-3-27 09:38
Providing Group Anonymity in Social Networksty-intensive information is present in this data set. In this chapter, the task we have set is providing group anonymity in social networks. By group anonymity we understand the property of a group of people to be indistinguishable within a particular dataset. We also propose a technique to solve the task using wavelet transforms.作者: 按時間順序 時間: 2025-3-27 13:42
Book 2012lysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology..作者: Handedness 時間: 2025-3-27 19:47
Privacy Settings in Online Social Networks as a Conflict of Interests: Regulating User Behavior on ,implemented. Both the GUI of the platform (website) and the various possibilities for mobile use, such as special “mobile” versions of the website and smartphone applications (apps) for various platforms, will be evaluated.作者: Endometrium 時間: 2025-3-28 00:33 作者: 新星 時間: 2025-3-28 05:50
Measurement Methods of User Behavior in Online Social Networksonline social networks. Both passive and active methods are considered; the measurement frameworks are compared based on several properties including the details of the datasets and the resource consumption of the methods. In addition, state-of-the-art applications of the measurement ideas are given for illustration purposes.作者: Intuitive 時間: 2025-3-28 06:44
ividuals can be protected from real-world threats.Discusses .This book is the second of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, concentrating on topics rela作者: HPA533 時間: 2025-3-28 11:28
Steve Evans,Lloyd Fernando,Miying Yangternational teams of researchers indicate motivations for blogging and attitudes regarding privacy are strikingly different in countries with large blogging communities. These differences are reflected in the content of blogs and profoundly influence blog-based social networks, which tend to be region-centric.作者: Creatinine-Test 時間: 2025-3-28 16:15 作者: Daily-Value 時間: 2025-3-28 22:17
https://doi.org/10.1007/978-981-97-3153-4tation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identifiable social networks and their development in time are presented in the context of the security of anonymous systems.作者: 惡心 時間: 2025-3-29 00:15 作者: 哭得清醒了 時間: 2025-3-29 05:38 作者: expository 時間: 2025-3-29 07:15 作者: harmony 時間: 2025-3-29 14:38 作者: 轉折點 時間: 2025-3-29 15:44
Subramanian Senthilkannan Muthually-calculated inferred trust values using recommendations from trusted agents. The effectiveness of our method is demonstrated through simulation experiments on artificially generated social networks. The advantages and disadvantages of using this method on different kinds of Web-based knowledge sharing networks are discussed.作者: Anthropoid 時間: 2025-3-29 22:55 作者: 有危險 時間: 2025-3-30 00:14
Book 2012utions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review .Tools, Perspectives, and Applications., and .Mining and Visualization. in CSNs). Topics and features: presents the latest advances in security and pri作者: Grating 時間: 2025-3-30 04:14
mulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology..978-1-4471-5815-8978-1-4471-4051-1作者: 迅速飛過 時間: 2025-3-30 08:32
Security, Privacy, and Trust in Social Networksusers with similar interests and compile and share lists of contacts. The information they share are not only viewed by the trusted users but also by the adversaries. This chapter is to encompass research studies in the areas of security, trust, and privacy applicable to social networks. The contrib