Cargando…

Analyzing and securing social networks /

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of t...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Thuraisingham, Bhavani M. (Autor), Abrol, Satyen (Autor), Heatherly, Raymond (Autor), Kantarcioglu, Murat (Autor), Khadilkar, Vaibhav (Autor), Khan, Latifur (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : Auerbach, 2016.
Edición:1st.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)
Tabla de Contenidos:
  • Introduction ; Overview; Analyzing Social Networks; Securing Social Networks; Outline of the Book; Next Steps; ; SUPPORTING TECHNOLOGIES; ; Social Networks: A Survey ; Introduction; Survey of Social Networks; Details of Four Popular Social Networks; Summary and Conclusion; ; Data Security and Privacy; Overview; Security Policies; Policy Enforcement and Related Issues; Data Privacy; Summary and Directions; References; ; Data Mining Techniques; Introduction; Overview of Data Mining Tasks and Techniques; Artificial Neural Networks; Support Vector Machines; Markov Model; Association Rule Mining (ARM); Multiclass Problem; Image Mining; Summary; References; ; Cloud Computing and Semantic Web Technologies; Introduction; Cloud Computing; Semantic Web; Semantic Web and Security; Cloud Computing Frameworks Based on Semantic Web Technologies; Summary and.
  • Directions; References; ; ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS; ; Analyzing and Securing Social Networks; Introduction; Applications in Social Media Analytics; Data Mining Techniques for SNA; Security and Privacy; Summary and Directions; References; ; Semantic Web-Based Social Network Representation and Analysis; Introduction; Social Network Representation; Our Approach to Social Network Analysis; Summary and Directions; Reference; ; Confidentiality, Privacy, and Trust for Social Media Data; Introduction; Trust, Privacy,
  • And Confidentiality; CPT Framework; Our Approach to Confidentiality Management; Privacy for Social Networks; Trust for Social Networks; Integrated System; CPT within the Context of Social Networks; Summary and Directions; References; ; TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS; ; Developments and Challenges in Location Mining; Introduction; Key Aspects of Location Mining; Efforts in Location Mining; Challenges in Location Mining; Geospatial Proximity and Friendship; Our Contributions to Location Mining; Summary and Directions; References; ; TweetHood: A Social Media Analytics Tool; Introduction; TweetHood; Experiments and Results; Summary and Directions; References; ; Tweecalization: Location Mining Using Semisupervised Learning; Introduction; Tweecalization; Trustworthiness and Similarity Measure; Experiments and Results; Summary and Directions; References; ; Tweeque: Identifying.
  • Social Cliques for Location Mining; Introduction; Effect of Migration; Temporal Data Mining; Social Clique Identification; Experiments and Results; Location Prediction; Agglomerative Hierarchical Clustering; MapIt: Location Mining from Unstructured Text; Summary and Directions; References; ; Understanding News Queries with Geo-Content Using Twitter; Introduction; Application of Location Mining and Social Networks for Improving Web Search; Assigning Weights to Tweets; Semantic Similarity; Experiments and Results; Summary and Directions; References; ; SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS; ; Our Approach to Studying Privacy in Social Networks; Introduction; Related Work; Definitional Preliminaries; Analysis; Data Gathering; Summary and Directions; References; ; Classification of Social Networks Incorporating Link Types; Introduction; Related Work; Learning.
  • Methods; Experiments; Results; Summary and Directions; References; ; Extending Classification of Social Networks through Indirect Friendships; Introduction; Related Work and Our Contributions; Definitions; Our Approach; Experiments and Results; Summary and Directions; References; ; Social Network Classification through Data Partitioning; Introduction; Related Work and Our Contributions; Metrics; Distributed Social Network Classification; Experiments; Summary and Directions; References; ; Sanitization of Social Network Data for Release to Semitrusted Third Parties; Introduction; Learning Methods on Social Networks; Hiding Private Information; Experiments; Effect of Sanitization on Other Attack Techniques; Effect of Sanitization on Utility; Summary and Directions; References; ; ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS; ; Access Control for Social.
  • Networks; Introduction; Related Work; Modeling Social Networks Using Semantic Web Technologies; Security Policies for OSNs; Security Policy Specification; Security Rule Enforcement; Summary and Directions; References; ; Implementation of an Access Control System for Social Networks; Introduction; Security in Online Social Networks; Framework Architecture; Experiments; Summary and Directions; References; ; Inference Control for Social Media; Overview; Design of an Inference Controller; Inference Control through Query Modification; Application to Social Media Data; Summary and Directions; References; ; Implementing an Inference Controller for Social Media Data; Overview; Inference and Provenance; Implementation of the Inference Controller; Generators; Use Case: Medical Example; Implementing Constraints; Summary and Directions; References; ; SOCIAL MEDIA INTEGRATION AND ANALYTICS.
  • And Efficient RDF Triple Store; StormRider: Harnessing Storm for Social Networks; Ontology-Driven Query Expansion Using MapReduce Framework; Summary and Directions; References; ; Experimental Cloud Query Processing System for Social Networks; Introduction; Our Approach; Related Work; Architecture; MapReduce Framework; Results Summary and Directions; References; ; Social Networking in the Cloud; Introduction; Foundational Technologies for SNODSOC++; Design of SNODSOC; Toward SNODSOC++; Cloud-Based Social Network Analysis; StormRider: Harnessing Storm for Social Networks; Related Work; Summary and Directions; References; ; SOCIAL MEDIA APPLICATION SYSTEMS; ; Graph Mining for Insider Threat Detection; Introduction; Challenges, Related Work,
  • And Our Approach; Graph Mining for Insider Threat Detection; Comprehensive Framework; Summary and Directions; References; ; Temporal Geosocial Mobile Semantic Web; Introduction; Challenges for a Successful SARO; Supporting Technologies for SARO; Our Approach to Building a SARO System; Conclusion; References; ; Social Media and Bioterrorism; Introduction; Simulating Bioterrorism through Epidemiology Abstraction; On the Mitigation of Bioterrorism through the Game Theory; Summary and Directions; References; ; Stream Data Analytics for Multipurpose Social Media Applications; Introduction; Our Premise; Modules of InXite; Other Applications; Related Work; Summary and Directions; References; ; SECURE SOCIAL MEDIA SYSTEMS; ; Secure Cloud Query Processing with Relational Data for Social Media; Overview; Related Work; System Architecture; Implementation Details and Results; Summary and.
  • Directions; References; ; Secure Cloud Query Pro.