{"title":"谣言在相互依赖的社会网络中传播","authors":"Qiyi Han, Runfa Liao, Jie Tang","doi":"10.1109/ICCChinaW.2015.7961572","DOIUrl":null,"url":null,"abstract":"Social networks have been indispensable in people's daily life. With the development of smart mobile devices, the social network applications intend to integrate the existing social relations of computer-based and web-based networking applications. The integration is inevitable to contribute to interdependent networks. The cascading failures are researched deeply, however the rumor spreading is the most critical security threats. In this paper, we analyze the security environment for interdependent social networks and propose a SIDR rumor spreading model to identify the malicious propagation procedure. Finally, we propose some security strategies to control the rumor propagation.","PeriodicalId":121194,"journal":{"name":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","volume":"190 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Rumor spreading in interdependent social networks\",\"authors\":\"Qiyi Han, Runfa Liao, Jie Tang\",\"doi\":\"10.1109/ICCChinaW.2015.7961572\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Social networks have been indispensable in people's daily life. With the development of smart mobile devices, the social network applications intend to integrate the existing social relations of computer-based and web-based networking applications. The integration is inevitable to contribute to interdependent networks. The cascading failures are researched deeply, however the rumor spreading is the most critical security threats. In this paper, we analyze the security environment for interdependent social networks and propose a SIDR rumor spreading model to identify the malicious propagation procedure. Finally, we propose some security strategies to control the rumor propagation.\",\"PeriodicalId\":121194,\"journal\":{\"name\":\"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)\",\"volume\":\"190 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCChinaW.2015.7961572\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 IEEE/CIC International Conference on Communications in China - Workshops (CIC/ICCC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCChinaW.2015.7961572","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Social networks have been indispensable in people's daily life. With the development of smart mobile devices, the social network applications intend to integrate the existing social relations of computer-based and web-based networking applications. The integration is inevitable to contribute to interdependent networks. The cascading failures are researched deeply, however the rumor spreading is the most critical security threats. In this paper, we analyze the security environment for interdependent social networks and propose a SIDR rumor spreading model to identify the malicious propagation procedure. Finally, we propose some security strategies to control the rumor propagation.