Limit search to available items
Book Cover
E-book
Author Thuraisingham, Bhavani M., author

Title Analyzing and securing social networks / Bhavani Thuraisingham [and five others]
Edition 1st
Published Boca Raton : Auerbach, 2016

Copies

Description 1 online resource : illustrations (black and white)
Contents Introduction ; Overview; Analyzing Social Networks; Securing Social Networks; Outline of the Book; Next Steps; ; SUPPORTING TECHNOLOGIES; ; Social Networks: A Survey ; Introduction; Survey of Social Networks; Details of Four Popular Social Networks; Summary and Conclusion; ; Data Security and Privacy; Overview; Security Policies; Policy Enforcement and Related Issues; Data Privacy; Summary and Directions; References; ; Data Mining Techniques; Introduction; Overview of Data Mining Tasks and Techniques; Artificial Neural Networks; Support Vector Machines; Markov Model; Association Rule Mining (ARM); Multiclass Problem; Image Mining; Summary; References; ; Cloud Computing and Semantic Web Technologies; Introduction; Cloud Computing; Semantic Web; Semantic Web and Security; Cloud Computing Frameworks Based on Semantic Web Technologies; Summary and
Directions; References; ; ASPECTS OF ANALYZING AND SECURING SOCIAL NETWORKS; ; Analyzing and Securing Social Networks; Introduction; Applications in Social Media Analytics; Data Mining Techniques for SNA; Security and Privacy; Summary and Directions; References; ; Semantic Web-Based Social Network Representation and Analysis; Introduction; Social Network Representation; Our Approach to Social Network Analysis; Summary and Directions; Reference; ; Confidentiality, Privacy, and Trust for Social Media Data; Introduction; Trust, Privacy,
And Confidentiality; CPT Framework; Our Approach to Confidentiality Management; Privacy for Social Networks; Trust for Social Networks; Integrated System; CPT within the Context of Social Networks; Summary and Directions; References; ; TECHNIQUES AND TOOLS FOR SOCIAL NETWORK ANALYTICS; ; Developments and Challenges in Location Mining; Introduction; Key Aspects of Location Mining; Efforts in Location Mining; Challenges in Location Mining; Geospatial Proximity and Friendship; Our Contributions to Location Mining; Summary and Directions; References; ; TweetHood: A Social Media Analytics Tool; Introduction; TweetHood; Experiments and Results; Summary and Directions; References; ; Tweecalization: Location Mining Using Semisupervised Learning; Introduction; Tweecalization; Trustworthiness and Similarity Measure; Experiments and Results; Summary and Directions; References; ; Tweeque: Identifying
Social Cliques for Location Mining; Introduction; Effect of Migration; Temporal Data Mining; Social Clique Identification; Experiments and Results; Location Prediction; Agglomerative Hierarchical Clustering; MapIt: Location Mining from Unstructured Text; Summary and Directions; References; ; Understanding News Queries with Geo-Content Using Twitter; Introduction; Application of Location Mining and Social Networks for Improving Web Search; Assigning Weights to Tweets; Semantic Similarity; Experiments and Results; Summary and Directions; References; ; SOCIAL NETWORK ANALYTICS AND PRIVACY CONSIDERATIONS; ; Our Approach to Studying Privacy in Social Networks; Introduction; Related Work; Definitional Preliminaries; Analysis; Data Gathering; Summary and Directions; References; ; Classification of Social Networks Incorporating Link Types; Introduction; Related Work; Learning
Methods; Experiments; Results; Summary and Directions; References; ; Extending Classification of Social Networks through Indirect Friendships; Introduction; Related Work and Our Contributions; Definitions; Our Approach; Experiments and Results; Summary and Directions; References; ; Social Network Classification through Data Partitioning; Introduction; Related Work and Our Contributions; Metrics; Distributed Social Network Classification; Experiments; Summary and Directions; References; ; Sanitization of Social Network Data for Release to Semitrusted Third Parties; Introduction; Learning Methods on Social Networks; Hiding Private Information; Experiments; Effect of Sanitization on Other Attack Techniques; Effect of Sanitization on Utility; Summary and Directions; References; ; ACCESS CONTROL AND INFERENCE FOR SOCIAL NETWORKS; ; Access Control for Social
Networks; Introduction; Related Work; Modeling Social Networks Using Semantic Web Technologies; Security Policies for OSNs; Security Policy Specification; Security Rule Enforcement; Summary and Directions; References; ; Implementation of an Access Control System for Social Networks; Introduction; Security in Online Social Networks; Framework Architecture; Experiments; Summary and Directions; References; ; Inference Control for Social Media; Overview; Design of an Inference Controller; Inference Control through Query Modification; Application to Social Media Data; Summary and Directions; References; ; Implementing an Inference Controller for Social Media Data; Overview; Inference and Provenance; Implementation of the Inference Controller; Generators; Use Case: Medical Example; Implementing Constraints; Summary and Directions; References; ; SOCIAL MEDIA INTEGRATION AND ANALYTICS
And Efficient RDF Triple Store; StormRider: Harnessing Storm for Social Networks; Ontology-Driven Query Expansion Using MapReduce Framework; Summary and Directions; References; ; Experimental Cloud Query Processing System for Social Networks; Introduction; Our Approach; Related Work; Architecture; MapReduce Framework; Results Summary and Directions; References; ; Social Networking in the Cloud; Introduction; Foundational Technologies for SNODSOC++; Design of SNODSOC; Toward SNODSOC++; Cloud-Based Social Network Analysis; StormRider: Harnessing Storm for Social Networks; Related Work; Summary and Directions; References; ; SOCIAL MEDIA APPLICATION SYSTEMS; ; Graph Mining for Insider Threat Detection; Introduction; Challenges, Related Work,
And Our Approach; Graph Mining for Insider Threat Detection; Comprehensive Framework; Summary and Directions; References; ; Temporal Geosocial Mobile Semantic Web; Introduction; Challenges for a Successful SARO; Supporting Technologies for SARO; Our Approach to Building a SARO System; Conclusion; References; ; Social Media and Bioterrorism; Introduction; Simulating Bioterrorism through Epidemiology Abstraction; On the Mitigation of Bioterrorism through the Game Theory; Summary and Directions; References; ; Stream Data Analytics for Multipurpose Social Media Applications; Introduction; Our Premise; Modules of InXite; Other Applications; Related Work; Summary and Directions; References; ; SECURE SOCIAL MEDIA SYSTEMS; ; Secure Cloud Query Processing with Relational Data for Social Media; Overview; Related Work; System Architecture; Implementation Details and Results; Summary and
Directions; References; ; Secure Cloud Query Pro
Summary Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental systems have been developed at The University of Texas at Dallas. The material in this book, together with the numerous references listed in each chapter, have been used for a graduate-level course at The University of Texas at Dallas on analyzing and securing social media. Several experimental systems developed by graduate students are also provided. The book is divided into nine main sections: (1) supporting technologies, (2) basics of analyzing and securing social networks, (3) the authors' design and implementation of various social network analytics tools, (4) privacy aspects of social networks, (5) access control and inference control for social networks, (6) experimental systems designed or developed by the authors on analyzing and securing social networks, (7) social media application systems developed by the authors, (8) secure social media systems developed by the authors, and (9) some of the authors' exploratory work and further directions
Bibliography Includes bibliographical references and index
Notes CIP data; item not viewed
Subject Online social networks -- Security measures
Web usage mining.
Data protection.
Computer crimes -- Prevention
Privacy, Right of.
Computer crimes -- Prevention.
Data protection.
Privacy, Right of.
Web usage mining.
Form Electronic book
Author Abrol, Satyen, author
Heatherly, Raymond, author
Kantarcioglu, Murat, author
Khadilkar, Vaibhav, author
Khan, Latifur, author
ISBN 9781482243284
1482243288