語系:
繁體中文
English
日文
簡体中文
說明(常見問題)
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Security, privacy, and anonymization...
~
Baktha, Kiran, (1995-)
Security, privacy, and anonymization in social networks[electronic resource] :emerging research and opportunities /
紀錄類型:
書目-電子資源 : Monograph/item
杜威分類號:
006.7/54
書名/作者:
Security, privacy, and anonymization in social networks : emerging research and opportunities // by B.K. Tripathy and Kiran Baktha.
作者:
Tripathy, B. K.,
其他作者:
Baktha, Kiran,
出版者:
Hershey, Pennsylvania : : IGI Global,, [2018]
面頁冊數:
1 online resource (viii, 176 p.)
標題:
Online social networks - Security measures.
標題:
Computer crimes - Prevention.
標題:
Privacy, Right of.
標題:
Anonymous persons.
標題:
Confidential communications.
ISBN:
9781522551591 (ebook)
ISBN:
9781522551584 (hardcover)
書目註:
Includes bibliographical references and index.
內容註:
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
摘要、提要註:
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4
Security, privacy, and anonymization in social networks[electronic resource] :emerging research and opportunities /
Tripathy, B. K.,1957-
Security, privacy, and anonymization in social networks
emerging research and opportunities /[electronic resource] :by B.K. Tripathy and Kiran Baktha. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (viii, 176 p.)
Includes bibliographical references and index.
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
Restricted to subscribers or individual electronic text purchasers.
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--
ISBN: 9781522551591 (ebook)Subjects--Topical Terms:
445505
Online social networks
--Security measures.
LC Class. No.: TK5105.59 / .T75 2018e
Dewey Class. No.: 006.7/54
Security, privacy, and anonymization in social networks[electronic resource] :emerging research and opportunities /
LDR
:01771nmm a2200277 a 4500
001
512560
003
IGIG
005
20181030104102.0
006
m o d
007
cr cn
008
210927s2018 pau fob 001 0 eng d
010
$z
2017036591
020
$a
9781522551591 (ebook)
020
$a
9781522551584 (hardcover)
035
$a
(OCoLC)1022126236
035
$a
1071025349
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.T75 2018e
082
0 4
$a
006.7/54
$2
23
100
1
$a
Tripathy, B. K.,
$d
1957-
$e
editor.
$3
570988
245
1 0
$a
Security, privacy, and anonymization in social networks
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by B.K. Tripathy and Kiran Baktha.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (viii, 176 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--
$c
Provided by publisher.
650
0
$a
Online social networks
$x
Security measures.
$3
445505
650
0
$a
Computer crimes
$x
Prevention.
$3
405109
650
0
$a
Privacy, Right of.
$3
341009
650
0
$a
Anonymous persons.
$3
733200
650
0
$a
Confidential communications.
$3
478447
700
1
$a
Baktha, Kiran,
$d
1995-
$e
author.
$3
733199
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4
筆 0 讀者評論
多媒體
多媒體檔案
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4
評論
新增評論
分享你的心得
Export
取書館別
處理中
...
變更密碼
登入