eBooks-it.org Logo
eBooks-IT.org Inner Image

Mining Social Networks and Security Informatics

Mining Social Networks and Security Informatics Image

Book Details:

Publisher:Springer
Series: Springer
Author:Tansel Ozyer
Edition:1
ISBN-10:9400763581
ISBN-13:9789400763586
Pages:283
Published:Jun 12 2013
Posted:Nov 19 2014
Language:English
Book format:PDF
Book size:6.33 MB

Book Description:

Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics. The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.

Download Link:

Related Books:

Mobile Clouds

Exploiting Distributed Resources in Wireless, Mobile and Social Networks
Mobile Clouds Image
Includes a preface written by Professor Leonard Kleinrock, Distinguished Professor of Computer Science, UCLA, USA This book discusses and explores the concept of mobile cloud , creating an inspiring research space for exploiting opportunistic resource sharing, and covering from theoretical research approaches to the development of commercially profitable ideas. A mobile cloud is a cooperative arrangement of dynamically connected communication nodes sharing opportunistic resources. In this book, authors provide a comprehensive and motivating overview of this rapidly emerging technology. The book explores how distributed resources can be shared by mobile users in very different ways and for various purposes. The book provides many stimulating examples ...

Analyzing and Securing Social Networks

Analyzing and Securing Social Networks Image
Analyzing and Securing Social Networks focuses on the two major technologies that have been developed for online social networks (OSNs): (i) data mining technologies for analyzing these networks and extracting useful information such as location, demographics, and sentiments of the participants of the network, and (ii) security and privacy technologies that ensure the privacy of the participants of the network as well as provide controlled access to the information posted and exchanged by the participants. The authors explore security and privacy issues for social media systems, analyze such systems, and discuss prototypes they have developed for social media systems whose data are represented using semantic web technologies. These experimental syst...

Building an Information Security Awareness Program

Defending Against Social Engineering and Technical Threats
Building an Information Security Awareness Program Image
The best defense against the increasing threat of social engineering attacks is Security Awareness Training to warn your organization's staff of the risk and educate them on how to protect your organization's data. Social engineering is not a new tactic, but Building an Security Awareness Program is the first book that shows you how to build a successful security awareness training program from the ground up. Building an Security Awareness Program provides you with a sound technical basis for developing a new training program. The book also tells you the best ways to garner management support for implementing the program. Author Bill Gardner is one of the founding members of the Security Awareness Training Framework. Here, he walks you through the pr...



2007 - 2021 © eBooks-IT.org