Mining Social Networks and Security Informatics最新文献

筛选
英文 中文
Privacy Breach Analysis in Social Networks 社交网络中的隐私泄露分析
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_4
F. Nagle
{"title":"Privacy Breach Analysis in Social Networks","authors":"F. Nagle","doi":"10.1007/978-94-007-6359-3_4","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_4","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
SAINT: Supervised Actor Identification for Network Tuning 网络调优的监督行为者识别
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_6
Michael Farrugia, N. Hurley, A. Quigley
{"title":"SAINT: Supervised Actor Identification for Network Tuning","authors":"Michael Farrugia, N. Hurley, A. Quigley","doi":"10.1007/978-94-007-6359-3_6","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_6","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Study of Malware Propagation via Online Social Networking 恶意软件在在线社交网络中的传播研究
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_13
M. R. Faghani, U. T. Nguyen
{"title":"A Study of Malware Propagation via Online Social Networking","authors":"M. R. Faghani, U. T. Nguyen","doi":"10.1007/978-94-007-6359-3_13","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_13","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression 利用等渗回归预测DDoS攻击中的僵尸数量
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_8
B. Gupta, Nadeem Jamali
{"title":"Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression","authors":"B. Gupta, Nadeem Jamali","doi":"10.1007/978-94-007-6359-3_8","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_8","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Evaluation and Development of Data Mining Tools for Social Network Analysis 社会网络分析数据挖掘工具的评价与发展
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_10
D. Murthy, Alexander Gross, Alex Takata, Stephanie Bond
{"title":"Evaluation and Development of Data Mining Tools for Social Network Analysis","authors":"D. Murthy, Alexander Gross, Alex Takata, Stephanie Bond","doi":"10.1007/978-94-007-6359-3_10","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_10","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Estimating the Importance of Terrorists in a Terror Network 评估恐怖分子在恐怖网络中的重要性
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_14
Ahmed Elhajj, Abdallah M. ElSheikh, Omar Addam, Mohamad Alzohbi, Omar Zarour, Alper Aksaç, O. Öztürk, Tansel Özyer, M. Ridley, R. Alhajj
{"title":"Estimating the Importance of Terrorists in a Terror Network","authors":"Ahmed Elhajj, Abdallah M. ElSheikh, Omar Addam, Mohamad Alzohbi, Omar Zarour, Alper Aksaç, O. Öztürk, Tansel Özyer, M. Ridley, R. Alhajj","doi":"10.1007/978-94-007-6359-3_14","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_14","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"53 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data 从非结构化文本数据构建和分析不确定社会网络
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_3
F. Johansson, P. Svenson
{"title":"Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data","authors":"F. Johansson, P. Svenson","doi":"10.1007/978-94-007-6359-3_3","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_3","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Overlapping Community Structure and Modular Overlaps in Complex Networks 复杂网络中的重叠社团结构与模块重叠
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_2
Qinna Wang, E. Fleury
{"title":"Overlapping Community Structure and Modular Overlaps in Complex Networks","authors":"Qinna Wang, E. Fleury","doi":"10.1007/978-94-007-6359-3_2","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_2","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Perspective on Measurement Metrics for Community Detection Algorithms 社区检测算法的度量指标展望
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_12
Yang Yang, Yizhou Sun, Saurav Pandit, N. Chawla, Jiawei Han
{"title":"Perspective on Measurement Metrics for Community Detection Algorithms","authors":"Yang Yang, Yizhou Sun, Saurav Pandit, N. Chawla, Jiawei Han","doi":"10.1007/978-94-007-6359-3_12","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_12","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Developing a Hybrid Framework for a Web-Page Recommender System 网页推荐系统的混合框架开发
Mining Social Networks and Security Informatics Pub Date : 1900-01-01 DOI: 10.1007/978-94-007-6359-3_9
V. Anastopoulos, P. Karampelas, R. Alhajj
{"title":"Developing a Hybrid Framework for a Web-Page Recommender System","authors":"V. Anastopoulos, P. Karampelas, R. Alhajj","doi":"10.1007/978-94-007-6359-3_9","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_9","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信