Librería Portfolio Librería Portfolio

Búsqueda avanzada

TIENE EN SU CESTA DE LA COMPRA

0 productos

en total 0,00 €

ANALYZING AND SECURING SOCIAL NETWORKS
Título:
ANALYZING AND SECURING SOCIAL NETWORKS
Subtítulo:
Autor:
THURAISINGHAM, B
Editorial:
CRC
Año de edición:
2016
Materia
SEGURIDAD Y CRIPTOGRAFIA
ISBN:
978-1-4822-4327-7
Páginas:
574
109,00 €

 

Sinopsis

Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants.

The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided.

The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions.



Table of Contents

Introduction

Overview

Analyzing Social Networks

Securing Social Networks

Outline of the Book

Next Steps

SUPPORTING TECHNOLOGIES

Social Networks: A Survey

Introduction

Survey of Social Networks

Details of Four Popular Social Networks

Summary and Conclusion

Data Security and Privacy

Overview

Security Policies

Policy Enforcement and Related Issues

Data Privacy

Summary and Directions

References

Data Mining Techniques

Introduction

Overview of Data Mining Tasks and Techniques

Artificial Neural Networks

Support Vector Machines

Markov Model

Association Rule Mining (ARM)

Multiclass Problem

Image Mining

Summary

References

Cloud Computing and Semantic Web Technologies

Introduction

Cloud Computing

Semantic Web

Semantic Web and Security

Cloud Computing Frameworks Based on Semantic Web Technologies

Summary and Directions

References


ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS

Analyzing and Securing Social Networks

Introduction

Applications in Social Media Analytics

Data Mining Techniques for SNA

Security and Privacy

Summary and Directions

References

Semantic Web-Based Social Network Representation and Analysis

Introduction

Social Network Representation

Our Approach to Social Network Analysis

Summary and Directions

Reference

Confidentiality, Privacy, and Trust for Social Media Data

Introduction

Trust, Privacy, and Confidentiality

CPT Framework

Our Approach to Confidentiality Management

Privacy for Social Networks

Trust for Social Networks

Integrated System

CPT within the Context of Social Networks

Summary and Directions

References

TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS

Developments and Challenges in Location Mining

Introduction

Key Aspects of Location Mining

Efforts in Location Mining

Challenges in Location Mining

Geospatial Proximity and Friendship

Our Contributions to Location Mining

Summary and Directions

References

TweetHood: A Social Media Analytics Tool

Introduction

TweetHood

Experiments and Results

Summary and Directions

References

Tweecalization: Location Mining Using Semisupervised Learning

Introduction

Tweecalization

Trustworthiness and Similarity Measure

Experiments and Results

Summary and Directions

References

Tweeque: Identifying Social Cliques for Location Mining

Introduction

Effect of Migration

Temporal Data Mining

Social Clique Identification

Experiments and Results

Location Prediction

Agglomerative Hierarchical Clustering

MapIt: Location Mining from Unstructured Text

Summary and Directions

References

Understanding News Queries with Geo-Content Using Twitter

Introduction

Application of Location Mining and Social Networks for Improving Web Search

Assigning Weights to Tweets

Semantic Similarity

Experiments and Results

Summary and Directions

References

SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS

Our Approach to Studying Privacy in Social Networks

Introduction

Related Work

Definitional Preliminaries

Analysis

Data Gathering

Summary and Directions

References

Classification of Social Networks Incorporating Link Types

Introduction

Related Work

Learning Methods

Experiments

Results

Summary and Directions

References

Extending Classification of Social Networks through Indirect Friendships

Introduction

Related Work and Our Contributions

Definitions

Our Approach

Experiments and Results

Summary and Directions

References

Social Network Classification through Data Partitioning

Introduction

Related Work and Our Contributions

Metrics

Distributed Social Network Classification

Experiments

Summary and Directions

References

Sanitization of Social Network Data for Release to Semitrusted Third Parties

Introduction

Learning Methods on Social Networks

Hiding Private Information

Experiments

Effect of Sanitization on Other Attack Techniques

Effect of Sanitization on Utility

Summary and Directions

References

ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS

Access Control for Social Networks

Introduction

Related Work

Modeling Social Networks Using Semantic Web Technologies

Security Policies for OSNs

Security Policy Specification

Security Rule Enforcement

Summary and Directions

References

Implementation of an Access Control System for Social Networks

Introduction

Security in Online Social Networks

Framework Architecture

Experiments

Summary and Directions

References

Inference Control for Social Media

Overview

Design of an Inference Controller

Inference Control through Query Modification

Application to Social Media Data

Summary and Directions

References

Implementing an Inference Controller for Social Media Data

Overview

Inference and Provenance

Implementation of the Inference Controller

Generators

Use Case: Medical Example

Implementing Constraints

Summary and Directions

References

SOCIAL MEDIA INTEGRATION AND ANALYTICS SYSTE