Analyzing and securing social networks by Thuraisingham, Bhavani M

By Thuraisingham, Bhavani M

Show description

Read Online or Download Analyzing and securing social networks PDF

Similar security & encryption books

Black Hat Physical Device Security: Exploiting Hardware and Software

Black Hat, Inc. is the most excellent, around the world supplier of defense education, consulting, and meetings. during this e-book the Black Hat specialists express readers the kinds of assaults that may be performed to actual units akin to movement detectors, video tracking and closed circuit structures, authentication platforms, thumbprint and voice print units, retina scans, and extra.

Handbook of Research on Secure Multimedia Distribution

New applied sciences and ideas are continuously being constructed inside of multimedia distribution. In such an ever-evolving atmosphere, academidans, researchers, and execs of this self-discipline want entry to the most up-tp-date information regarding the ideas, concerns, developments, and applied sciences during this rising box.

RFID+ Study Guide and Practice Exams

Content material: Acknowledgments, web page vAuthor, web page viiTechnical Editor, web page viiAuthor's Acknowledgments, web page viiiForeword, Pages xvii-xxviChapter 1 - RFID+ Physics, Math, and RFID: brain the distance, Pages 1-20Chapter 2 - RFID+ The Physics of RFID, Pages 21-53Chapter three - RFID+ operating with RFID Tags, Pages 55-84Chapter four - RFID+ operating with Interrogation Zones, Pages 85-111Chapter five - RFID+ operating with rules and criteria, Pages 113-134Chapter 6 - RFID+ identifying the RFID approach layout, Pages 135-166Chapter 7 - RFID+ appearing web site research, Pages 167-187Chapter eight - RFID+ appearing install, Pages 189-217Chapter nine - RFID+ operating with RFID Peripherals, Pages 219-246Chapter 10 - RFID+ tracking and Troubleshooting RFID platforms, Pages 247-270Glossary, Pages 271-279Appendix A - solutions to bankruptcy Self assessments, Pages 281-293Appendix B - ultimate examination, Pages 295-316Bibliography and assets, web page 317Index, Pages 319-326

Extra info for Analyzing and securing social networks

Sample text

The community of users has grown to promote racial separatism and gang activity. BlackPlanet was utilized by Senator Barack Obama in 2007 to gain support for votes in 2008. In 2009, BlackPlanet introduced mobile support for smartphones to their community. com/), created in 1999 by Jet Berelson, is a niche social network for the gothic community. The community is encouraged to share stories of love, music, and fashion. VampireFreaks offers online music and clothing stores. They have almost 2 million users and affectionately refer to user-created groups as cults.

Until 2013, MySpace faced a general decline in member traffic when it was purchased by pop idol Justin Timberlake and rebranded. MySpace currently supports more than 30 million users with a shared Bulletin Board system. Each bulletin board provides space for users to post music, links, pictures, and embedded video for others to peruse. com/) was created in 2003 by Joshua Schachter as social bookmarking service. Delicious is a network of more than 9 million users who share and group their bookmarks.

Tweecalization is a location mining system that uses semisupervised learning. Chapter 12 describes our tool called Tweeque, which identifies social cliques for location mining. Chapter 13 describes aspects of understanding news queries with geo-content using Twitter. Section IV consists of five chapters that describe privacy aspects of social networks. In particular, we describe our research on applying various data analytics techniques to extract sensitive attributes of users. Chapter 14 describes our approach to studying privacy in social networks.

Download PDF sample

Rated 4.32 of 5 – based on 44 votes