Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Boca Raton, FL :CRC Press,
    UID:
    almahu_9949385218402882
    Format: 1 online resource (xvii, 298 pages)
    Edition: First edition.
    ISBN: 9781000463354 , 1000463354 , 9781003134527 , 1003134521 , 9781000463323 , 100046332X
    Content: This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues, and family; sharing and posting information; managing audio, video, and photos; and all other aspects of using social media sites both professionally and personally. In the setting of the Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. Securing Social Networks in Cyberspace discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyberbullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats are considered in the book. This book can be used as a reference for an easy understanding of complex cybersecurity issues in social networking platforms and services. It is beneficial for academicians and graduate-level researchers. General readers may find it beneficial in protecting their social-media-related profiles.
    Note: Part I: Protection of Personal Information in Social Networks. 1. User Awareness for Securing Social NetworksAbhijit Bhowmik, S.M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent ToolsRishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed3. Enabling Location k-Anonymity in Social NetworksFrancesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, and Cecilia LabriniPart II: Securing Multimedia Contents4. Automated Content Classification in Social Media PlatformsThomas M. Chen5. Steganographic Botnet C & C Channel Using TwitterNicholas Pantic and Mohammad Husain6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in TwitterP. R. Vishnu, Basant Agarwal, P. Vinod, K.A. Dhanya, and Alice BaroniPart III: Cyberbullying, Cyberstalking, and Related Issues7. Cyberbullying and Cyberstalking on Online Social NetworksUmit Can and Bilal Alatas8. Cyberbullying Severity Detection Using Deep Learning Techniques -- A Multi-Class Classification over Varied Class Balance DataSharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19Mohammad Shadab Khan, Sharyar Wani, and Eima FatimaPart IV: Other Issues for Securing Social Networks and Online Profiles10. Profiling Online Users: Emerging Approaches and ChallengesMohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed11. Securing Mobile Social NetworksRobert Gordon12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and CountermeasuresMd. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan13. A Tutorial on Cross-Site Scripting Attack -- Defense against Online Social NetworksVassilis Papaspirou, Leandros Maglaras, and Mohamed Amine Ferrag
    Additional Edition: Print version: ISBN 0367681730
    Additional Edition: ISBN 9780367681739
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages