Securing Social Networks in Cyberspace
portes grátis
Securing Social Networks in Cyberspace
Pathan, Al-Sakib Khan
Taylor & Francis Ltd
10/2024
298
Mole
9780367681753
15 a 20 dias
Descrição não disponível.
Part I: Protection of Personal Information in Social Networks 1. User Awareness for Securing Social Networks 2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools 3. Enabling Location k-Anonymity in Social Networks Part II: Securing Multimedia Contents 4. Automated Content Classification in Social Media Platforms 5. Steganographic Botnet C&C Channel Using Twitter 6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter Part III: Cyberbullying, Cyberstalking, and Related Issues 7. Cyberbullying and Cyberstalking on Online Social Networks 8. Cyberbullying Severity Detection Using Deep Learning Techniques - A Multi-Class Classification over Varied Class Balance Data 9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19 Part IV: Other Issues for Securing Social Networks and Online Profiles 10. Profiling Online Users: Emerging Approaches and Challenges 11. Securing Mobile Social Networks 12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures 13. A Tutorial on Cross-Site Scripting Attack - Defense against Online Social Networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Arquitectura do computador e projecto lógico
- Guias de Internet e serviços on-line
- Segurança do computador
- Redes de computadores e comunicações
- Aspectos éticos e sociais da Tecnologia Informática
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
- Sistemas Distribuídos
- Interacção homem-computador
Rogue Access Point;Cross-site Scripting Attack;Hate Speech;Latent Dirichlet Allocation;Deep Learning Techniques;Cyberbullying Incidents;Machine Learning;Machine Learning Algorithms;Covert Channel;RNN;Huffman Code;Social Media Platforms;DP;SQL Injection;XSS Attacks;Feature Selection Algorithms;XSS Vulnerabilities;LBS Provider;Cyberbullying Events;Multi-class Classification;Social Network Provider;Deep Learning Models;Cross-site Scripting;Fake AP;Unauthorized AP
Part I: Protection of Personal Information in Social Networks 1. User Awareness for Securing Social Networks 2. Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools 3. Enabling Location k-Anonymity in Social Networks Part II: Securing Multimedia Contents 4. Automated Content Classification in Social Media Platforms 5. Steganographic Botnet C&C Channel Using Twitter 6. A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter Part III: Cyberbullying, Cyberstalking, and Related Issues 7. Cyberbullying and Cyberstalking on Online Social Networks 8. Cyberbullying Severity Detection Using Deep Learning Techniques - A Multi-Class Classification over Varied Class Balance Data 9. Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19 Part IV: Other Issues for Securing Social Networks and Online Profiles 10. Profiling Online Users: Emerging Approaches and Challenges 11. Securing Mobile Social Networks 12. Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures 13. A Tutorial on Cross-Site Scripting Attack - Defense against Online Social Networks
Este título pertence ao(s) assunto(s) indicados(s). Para ver outros títulos clique no assunto desejado.
- Arquitectura do computador e projecto lógico
- Guias de Internet e serviços on-line
- Segurança do computador
- Redes de computadores e comunicações
- Aspectos éticos e sociais da Tecnologia Informática
- Privacidade e protecção de dados
- Aspectos jurídicos da Tecnologia Informática
- Sistemas Distribuídos
- Interacção homem-computador
Rogue Access Point;Cross-site Scripting Attack;Hate Speech;Latent Dirichlet Allocation;Deep Learning Techniques;Cyberbullying Incidents;Machine Learning;Machine Learning Algorithms;Covert Channel;RNN;Huffman Code;Social Media Platforms;DP;SQL Injection;XSS Attacks;Feature Selection Algorithms;XSS Vulnerabilities;LBS Provider;Cyberbullying Events;Multi-class Classification;Social Network Provider;Deep Learning Models;Cross-site Scripting;Fake AP;Unauthorized AP