{"title":"Privacy Breach Analysis in Social Networks","authors":"F. Nagle","doi":"10.1007/978-94-007-6359-3_4","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_4","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125093226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"SAINT: Supervised Actor Identification for Network Tuning","authors":"Michael Farrugia, N. Hurley, A. Quigley","doi":"10.1007/978-94-007-6359-3_6","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_6","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124394656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Study of Malware Propagation via Online Social Networking","authors":"M. R. Faghani, U. T. Nguyen","doi":"10.1007/978-94-007-6359-3_13","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_13","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115229797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Predicting Number of Zombies in a DDoS Attacks Using Isotonic Regression","authors":"B. Gupta, Nadeem Jamali","doi":"10.1007/978-94-007-6359-3_8","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_8","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134260630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Murthy, Alexander Gross, Alex Takata, Stephanie Bond
{"title":"Evaluation and Development of Data Mining Tools for Social Network Analysis","authors":"D. Murthy, Alexander Gross, Alex Takata, Stephanie Bond","doi":"10.1007/978-94-007-6359-3_10","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_10","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127003854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Elhajj, Abdallah M. ElSheikh, Omar Addam, Mohamad Alzohbi, Omar Zarour, Alper Aksaç, O. Öztürk, Tansel Özyer, M. Ridley, R. Alhajj
{"title":"Estimating the Importance of Terrorists in a Terror Network","authors":"Ahmed Elhajj, Abdallah M. ElSheikh, Omar Addam, Mohamad Alzohbi, Omar Zarour, Alper Aksaç, O. Öztürk, Tansel Özyer, M. Ridley, R. Alhajj","doi":"10.1007/978-94-007-6359-3_14","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_14","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"53 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114100679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data","authors":"F. Johansson, P. Svenson","doi":"10.1007/978-94-007-6359-3_3","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_3","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134073774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Overlapping Community Structure and Modular Overlaps in Complex Networks","authors":"Qinna Wang, E. Fleury","doi":"10.1007/978-94-007-6359-3_2","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_2","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131224768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yang Yang, Yizhou Sun, Saurav Pandit, N. Chawla, Jiawei Han
{"title":"Perspective on Measurement Metrics for Community Detection Algorithms","authors":"Yang Yang, Yizhou Sun, Saurav Pandit, N. Chawla, Jiawei Han","doi":"10.1007/978-94-007-6359-3_12","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_12","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115159984","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Developing a Hybrid Framework for a Web-Page Recommender System","authors":"V. Anastopoulos, P. Karampelas, R. Alhajj","doi":"10.1007/978-94-007-6359-3_9","DOIUrl":"https://doi.org/10.1007/978-94-007-6359-3_9","url":null,"abstract":"","PeriodicalId":387659,"journal":{"name":"Mining Social Networks and Security Informatics","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124910957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}