Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Keywords
  • 1
    Online Resource
    Online Resource
    [S.l.] : CRC PRESS
    UID:
    gbv_1786015382
    Format: 1 online resource
    ISBN: 9781000463354 , 1000463354 , 9781003134527 , 1003134521 , 9781000463323 , 100046332X
    Content: 〈P〉〈STRONG〉Part I: Protection of Personal Information in Social Networks〈/STRONG〉〈/P〉〈P〉1. User Awareness for Securing Social Networks〈/P〉〈I〉〈P〉Abhijit Bhowmik, S. M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser〈/P〉〈/I〉〈P〉2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools〈/P〉〈I〉〈P〉Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed〈/P〉〈/I〉〈P〉3. Enabling Location 〈I〉k〈/I〉-Anonymity in Social Networks〈/P〉〈I〉〈P〉Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia Labrini〈/P〉〈/I〉〈B〉〈P〉Part II: Securing Multimedia Contents〈/P〉〈/B〉〈P〉4. Automated Content Classification in Social Media Platforms〈/P〉〈I〉〈P〉Thomas M. Chen〈/P〉〈/I〉〈P〉5. Steganographic Botnet C&C Channel Using Twitter〈/P〉〈I〉〈P〉Nicholas Pantic and Mohammad Husain〈/P〉〈/I〉〈P〉6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter〈/P〉〈I〉〈P〉P. R. Vishnu, Basant Agarwal, P. Vinod, K. A. Dhanya, and Alice Baroni〈/P〉〈/I〉〈B〉〈P〉Part III: Cyberbullying, Cyberstalking, and Related Issues〈/P〉〈/B〉〈P〉7. Cyberbullying and Cyberstalking on Online Social Networks〈/P〉〈I〉〈P〉Umit Can and Bilal Alatas〈/P〉〈/I〉〈P〉8. Cyberbullying Severity Detection Using Deep Learning Techniques -- A Multi-Class Classification over Varied Class Balance Data〈/P〉〈I〉〈P〉Sharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar〈/P〉〈/I〉〈P〉9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19〈/P〉〈I〉〈P〉Mohammad Shadab Khan, Sharyar Wani, and Eima Fatima〈/P〉〈/I〉〈B〉〈P〉Part IV: Other Issues for Securing Social Networks and Online Profiles〈/P〉〈/B〉〈P〉10. Profiling Online Users: Emerging Approaches and Challenges〈/P〉〈I〉〈P〉Mohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed〈/P〉〈/I〉〈P〉11. Securing Mobile Social Networks〈/P〉〈I〉〈P〉Robert Gordon〈/P〉〈/I〉〈P〉12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures〈/P〉〈I〉〈P〉Md. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan〈/P〉〈/I〉〈P〉13. A Tutorial on Cross-Site Scripting Attack -- Defense against Online Social Networks〈/P〉〈I〉〈P〉Vassilis Papaspirou, Leandros Maglaras, and Mohamed Amine Ferrag〈/P〉〈/I〉
    Additional Edition: ISBN 0367681730
    Additional Edition: ISBN 9780367681739
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 0367681730
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Boca Raton, FL :CRC Press,
    UID:
    almahu_9949385218402882
    Format: 1 online resource (xvii, 298 pages)
    Edition: First edition.
    ISBN: 9781000463354 , 1000463354 , 9781003134527 , 1003134521 , 9781000463323 , 100046332X
    Content: This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.
    Note: Part I: Protection of Personal Information in Social Networks. 1. User Awareness for Securing Social NetworksAbhijit Bhowmik, S.M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent ToolsRishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed3. Enabling Location k-Anonymity in Social NetworksFrancesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia LabriniPart II: Securing Multimedia Contents4. Automated Content Classification in Social Media PlatformsThomas M. Chen5. Steganographic Botnet C & C Channel Using TwitterNicholas Pantic and Mohammad Husain6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in TwitterP. R. Vishnu, Basant Agarwal, P. Vinod, K.A. Dhanya, and Alice BaroniPart III: Cyberbullying, Cyberstalking, and Related Issues7. Cyberbullying and Cyberstalking on Online Social NetworksUmit Can and Bilal Alatas8. Cyberbullying Severity Detection Using Deep Learning Techniques -- A Multi-Class Classification over Varied Class Balance DataSharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19Mohammad Shadab Khan, Sharyar Wani, and Eima FatimaPart IV: Other Issues for Securing Social Networks and Online Profiles10. Profiling Online Users: Emerging Approaches and ChallengesMohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed11. Securing Mobile Social NetworksRobert Gordon12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and CountermeasuresMd. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan13. A Tutorial on Cross-Site Scripting Attack -- Defense against Online Social NetworksVassilis Papaspirou, Leandros Maglaras, and Mohamed Amine Ferrag
    Additional Edition: Print version: ISBN 0367681730
    Additional Edition: ISBN 9780367681739
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1003034527?
Did you mean 1003030521?
Did you mean 1003103421?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages