Analyzing and Securing Social Networks
Analyzing and Securing Social Networks
Click to enlarge
Author(s): Abrol, Satyen
Kantarcioglu, Murat
Thuraisingham, Bhavani
Thuraisingham, Bhavani M.
ISBN No.: 9781482243277
Pages: 574
Year: 201604
Format: Trade Cloth (Hard Cover)
Price: $ 130.12
Dispatch delay: Dispatched between 7 to 15 days
Status: Available

Introduction Overview Analyzing Social Networks Securing Social Networks Outline of the Book Next Steps SUPPORTING TECHNOLOGIES Social Networks: A Survey Introduction Survey of Social Networks Details of Four Popular Social Networks Summary and Conclusion Data Security and Privacy Overview Security Policies Policy Enforcement and Related Issues Data Privacy Summary and Directions References Data Mining Techniques Introduction Overview of Data Mining Tasks and Techniques Artificial Neural Networks Support Vector Machines Markov Model Association Rule Mining (ARM) Multiclass Problem Image Mining Summary References Cloud Computing and Semantic Web Technologies Introduction Cloud Computing Semantic Web Semantic Web and Security Cloud Computing Frameworks Based on Semantic Web Technologies Summary and Directions References ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS Analyzing and Securing Social Networks Introduction Applications in Social Media Analytics Data Mining Techniques for SNA Security and Privacy Summary and Directions References Semantic Web-Based Social Network Representation and Analysis Introduction Social Network Representation Our Approach to Social Network Analysis Summary and Directions Reference Confidentiality, Privacy, and Trust for Social Media Data Introduction Trust, Privacy, and Confidentiality CPT Framework Our Approach to Confidentiality Management Privacy for Social Networks Trust for Social Networks Integrated System CPT within the Context of Social Networks Summary and Directions References TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS Developments and Challenges in Location Mining Introduction Key Aspects of Location Mining Efforts in Location Mining Challenges in Location Mining Geospatial Proximity and Friendship Our Contributions to Location Mining Summary and Directions References TweetHood: A Social Media Analytics Tool Introduction TweetHood Experiments and Results Summary and Directions References Tweecalization: Location Mining Using Semisupervised Learning Introduction Tweecalization Trustworthiness and Similarity Measure Experiments and Results Summary and Directions References Tweeque: Identifying Social Cliques for Location Mining Introduction Effect of Migration Temporal Data Mining Social Clique Identification Experiments and Results Location Prediction Agglomerative Hierarchical Clustering MapIt: Location Mining from Unstructured Text Summary and Directions References Understanding News Queries with Geo-Content Using Twitter Introduction Application of Location Mining and Social Networks for Improving Web Search Assigning Weights to Tweets Semantic Similarity Experiments and Results Summary and Directions References SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS Our Approach to Studying Privacy in Social Networks Introduction Related Work Definitional Preliminaries Analysis Data Gathering Summary and Directions References Classification of Social Networks Incorporating Link Types Introduction Related Work Learning Methods Experiments Results Summary and Directions References Extending Classification of Social Networks through Indirect Friendships Introduction Related Work and Our Contributions Definitions Our Approach Experiments and Results Summary and Directions References Social Network Classification through Data Partitioning Introduction Related Work and Our Contributions Metrics Distributed Social Network Classification Experiments Summary and Directions References Sanitization of Social Network Data for Release to Semitrusted Third Parties Introduction Learning Methods on Social Networks Hiding Private Information Experiments Effect of Sanitization on Other Attack Techniques Effect of Sanitization on Utility Summary and Directions References ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS Access Control for Social Networks Introduction Related Work Modeling Social Networks Using Semantic Web Technologies Security Policies for OSNs Security Policy Specification Security Rule Enforcement Summary and Directions References Implementation of an Access Control System for Social Networks Introduction Security in Online Social Networks Framework Architecture Experiments Summary and Directions References Inference Control for Social Media Overview Design of an Inference Controller Inference Control through Query Modification Application to Social Media Data Summary and Directions References Implementing an Inference Controller for Social Media Data Overview Inference and Provenance Implementation of the Inference Controller Generators Use Case: Medical Example Implementing Constraints Summary and Directions References SOCIAL MEDIA INTEGRATION AND ANALYTICS SYSTEMS Social Graph Extraction, Integration, and Analysis Introduction Entity Extraction and Integration Ontology-Based Heuristic Reasoning Graph Analysis Managing and Querying Large RDF Graphs Summary and Directions References Semantic Web-Based Social Network Integration Overview Information Integration in Social Networks Jena-HBase: A Distributed, Scalable, and Efficient RDF Triple Store StormRider: Harnessing Storm for Social Networks Ontology-Driven Query Expansion Using MapReduce Framework Summary and Directions References Experimental Cloud Query Processing System for Social Networks Introduction Our Approach Related Work Architecture MapReduce Framework Results Summary and Directions References Social Networking in the Cloud Introduction Foundational Technologies for SNODSOC++ Design of SNODSOC Toward SNODSOC++ Cloud-Based Social Network Analysis StormRider: Harnessing Storm for Social Networks Related Work Summary and Directions References SOCIAL MEDIA APPLICATION SYSTEMS Graph Mining for Insider Threat Detection Introduction Challenges, Related Work, and Our Approach Graph Mining for Insider Threat Detection Comprehensive Framework Summary and Directions References Temporal Geosocial Mobile Semantic Web Introduction Challenges for a Successful SARO Supporting Technologies for SARO Our Approach to Building a SARO System Conclusion References Social Media and Bioterrorism Introduction Simulating Bioterrorism through Epidemiology Abstraction On the Mitigation of Bioterrorism through the Game Theory Summary and Directions References Stream Data Analytics for Multipurpose Social Media Applications Introduction Our Premise Modules of InXite Other Applications Related Work Summary and Directions References SECURE SOCIAL MEDIA SYSTEMS Secure Cloud Query Processing with Relational Data for Social Media Overview Related Work System Architecture Implementation Details and Results Summary and Directions References Secure Cloud Query Processing for Semantic Web-Based Social Media Overview Background Access Control System Architecture Experimental Setup and Results Summary and Directions References Cloud-Centric Assured Information Sharing for Social Networks Introduction Design Philosophy System Design Related Work Commercial Developments Extensions for Social Media Applications Summary and Directions References Social Network Integration and Analysis with Privacy Preservation Introduction Social Network Analysis Limitations of Current Approaches for Privacy-Preserving Social Networks Privacy Preservation of Social Network Data Approach by Yang and Thuraisingham Framework of Information Sharing and Privacy Preservation for Integrating Social Networks Summary and Directions References Attacks on Social Media and Data Analytics Solutions Introduction Malware and Attacks Attacks on Social Media Data Analytics Solutions Cloud-Based Malware Detection for Evolving Data Streams Summary and Directions References SECURE SOCIAL MEDIA DIRECTIONS Unified Framework for Analyzing and Securing Social Me.


To be able to view the table of contents for this publication then please subscribe by clicking the button below...
To be able to view the full description for this publication then please subscribe by clicking the button below...