{"title":"Dynamics of Overlapping Community Structures with Application to Expert Identification","authors":"Mohsen Shahriari, R. Klamma, M. Jarke","doi":"10.1007/978-3-319-94105-9_7","DOIUrl":"https://doi.org/10.1007/978-3-319-94105-9_7","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127060173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using Subgraph Distributions for Characterizing Networks and Fitting Random Graph Models","authors":"Benjamin Cabrera","doi":"10.1007/978-3-319-94105-9_5","DOIUrl":"https://doi.org/10.1007/978-3-319-94105-9_5","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116814026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manoj M. Apte, Girish Keshav Palshikar, S. Baskaran
{"title":"Frauds in Online Social Networks: A Review","authors":"Manoj M. Apte, Girish Keshav Palshikar, S. Baskaran","doi":"10.1007/978-3-319-78256-0_1","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_1","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128509537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"We Shall Not Only Survive to the Future of Social Networks","authors":"Christophe Thovex","doi":"10.1007/978-3-319-78256-0_6","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_6","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"44 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133719072","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Samer Al-khateeb, Muhammad Nihal Hussain, Nitin Agarwal
{"title":"Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns","authors":"Samer Al-khateeb, Muhammad Nihal Hussain, Nitin Agarwal","doi":"10.1007/978-3-319-78256-0_2","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_2","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115373753","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Hiding Self on Facebook Sidebar Ticker, Surveillance, and Privacy","authors":"C. Chang","doi":"10.1007/978-3-319-78256-0_3","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_3","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"405 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115398202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social Network Analysis to Combat Terrorism: 2015 Paris Attacks","authors":"Animesh Gupta, Tansel Özyer, J. Rokne, R. Alhajj","doi":"10.1007/978-3-319-78256-0_10","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_10","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"112 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113944696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identifying Influential Spreaders in Complex Networks with Probabilistic Links","authors":"Pavlos Basaras, Dimitrios Katsaros","doi":"10.1007/978-3-319-78256-0_4","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_4","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128600349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Emergency Detection and Evacuation Planning Using Social Media","authors":"Coskun Sahin, J. Rokne, R. Alhajj","doi":"10.1007/978-3-319-78256-0_9","DOIUrl":"https://doi.org/10.1007/978-3-319-78256-0_9","url":null,"abstract":"","PeriodicalId":291199,"journal":{"name":"Lecture Notes in Social Networks","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125456966","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}