Security, privacy, and anonymization in social networks: emerging research and opportunities
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, PA
IGI Global
[2018]
|
Schlagworte: | |
Online-Zugang: | DE-1050 DE-1049 DE-91 DE-898 DE-83 Volltext |
Zusammenfassung: | "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"... |
Beschreibung: | 1 Online-Ressource |
ISBN: | 9781522551591 |
DOI: | 10.4018/978-1-5225-5158-4 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV044747276 | ||
003 | DE-604 | ||
005 | 20190813 | ||
007 | cr|uuu---uuuuu | ||
008 | 180205s2018 xxu|||| o||u| ||||||eng d | ||
020 | |a 9781522551591 |9 978-1-5225-5159-1 | ||
035 | |a (OCoLC)1037913503 | ||
035 | |a (DE-599)BVBBV044747276 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-83 | ||
050 | 0 | |a TK5105.59 | |
082 | 0 | |a 006.7/54 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Tripathy, B. K. |d 1957- |0 (DE-588)1076475728 |4 aut | |
245 | 1 | 0 | |a Security, privacy, and anonymization in social networks |b emerging research and opportunities |c B.K. Tripathy, Kiran Baktha |
264 | 1 | |a Hershey, PA |b IGI Global |c [2018] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
520 | |a "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"... | ||
650 | 4 | |a Online social networks |x Security measures | |
650 | 4 | |a Computer crimes |x Prevention | |
650 | 4 | |a Privacy, Right of | |
650 | 4 | |a Anonymous persons | |
650 | 4 | |a Confidential communications | |
650 | 0 | 7 | |a Privatsphäre |0 (DE-588)4123980-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Internetkriminalität |0 (DE-588)7864395-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Online-Community |0 (DE-588)1071012568 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Internetkriminalität |0 (DE-588)7864395-8 |D s |
689 | 0 | 1 | |a Online-Community |0 (DE-588)1071012568 |D s |
689 | 0 | 2 | |a Privatsphäre |0 (DE-588)4123980-5 |D s |
689 | 0 | |8 1\p |5 DE-604 | |
700 | 1 | |a Baktha, Kiran |d 1995- |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, hardcover |z 978-1-5225-5158-4 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-5158-4 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
883 | 1 | |8 1\p |a cgwrk |d 20201028 |q DE-101 |u https://d-nb.info/provenance/plan#cgwrk | |
912 | |a ZDB-98-IGB |a ZDB-1-IGE | ||
966 | e | |u https://doi.org/10.4018/978-1-5225-5158-4 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/187086 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE2018 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5158-4 |l DE-91 |p ZDB-1-IGE |q TUM_Paketkauf |x Verlag |3 Volltext | |
966 | e | |u https://www.igi-global.com/gateway/book/187086 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-5158-4 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1805079007667945472 |
---|---|
adam_text | |
any_adam_object | |
author | Tripathy, B. K. 1957- Baktha, Kiran 1995- |
author_GND | (DE-588)1076475728 |
author_facet | Tripathy, B. K. 1957- Baktha, Kiran 1995- |
author_role | aut aut |
author_sort | Tripathy, B. K. 1957- |
author_variant | b k t bk bkt k b kb |
building | Verbundindex |
bvnumber | BV044747276 |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 |
callnumber-search | TK5105.59 |
callnumber-sort | TK 45105.59 |
callnumber-subject | TK - Electrical and Nuclear Engineering |
classification_rvk | ST 277 |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1037913503 (DE-599)BVBBV044747276 |
dewey-full | 006.7/54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.7/54 |
dewey-search | 006.7/54 |
dewey-sort | 16.7 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-5158-4 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV044747276</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20190813</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">180205s2018 xxu|||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522551591</subfield><subfield code="9">978-1-5225-5159-1</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1037913503</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV044747276</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">TK5105.59</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.7/54</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tripathy, B. K.</subfield><subfield code="d">1957-</subfield><subfield code="0">(DE-588)1076475728</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy, and anonymization in social networks</subfield><subfield code="b">emerging research and opportunities</subfield><subfield code="c">B.K. Tripathy, Kiran Baktha</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Privacy, Right of</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Anonymous persons</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Confidential communications</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Online-Community</subfield><subfield code="0">(DE-588)1071012568</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Internetkriminalität</subfield><subfield code="0">(DE-588)7864395-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Online-Community</subfield><subfield code="0">(DE-588)1071012568</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Privatsphäre</subfield><subfield code="0">(DE-588)4123980-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="8">1\p</subfield><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baktha, Kiran</subfield><subfield code="d">1995-</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, hardcover</subfield><subfield code="z">978-1-5225-5158-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-5158-4</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="883" ind1="1" ind2=" "><subfield code="8">1\p</subfield><subfield code="a">cgwrk</subfield><subfield code="d">20201028</subfield><subfield code="q">DE-101</subfield><subfield code="u">https://d-nb.info/provenance/plan#cgwrk</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5158-4</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/187086</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE2018</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5158-4</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">TUM_Paketkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://www.igi-global.com/gateway/book/187086</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-5158-4</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV044747276 |
illustrated | Not Illustrated |
indexdate | 2024-07-20T06:38:08Z |
institution | BVB |
isbn | 9781522551591 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030143010 |
oclc_num | 1037913503 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE2018 ZDB-1-IGE TUM_Paketkauf ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global |
record_format | marc |
spelling | Tripathy, B. K. 1957- (DE-588)1076475728 aut Security, privacy, and anonymization in social networks emerging research and opportunities B.K. Tripathy, Kiran Baktha Hershey, PA IGI Global [2018] 1 Online-Ressource txt rdacontent c rdamedia cr rdacarrier "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"... Online social networks Security measures Computer crimes Prevention Privacy, Right of Anonymous persons Confidential communications Privatsphäre (DE-588)4123980-5 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 gnd rswk-swf Online-Community (DE-588)1071012568 gnd rswk-swf Internetkriminalität (DE-588)7864395-8 s Online-Community (DE-588)1071012568 s Privatsphäre (DE-588)4123980-5 s 1\p DE-604 Baktha, Kiran 1995- aut Erscheint auch als Druck-Ausgabe, hardcover 978-1-5225-5158-4 https://doi.org/10.4018/978-1-5225-5158-4 Verlag URL des Erstveröffentlichers Volltext 1\p cgwrk 20201028 DE-101 https://d-nb.info/provenance/plan#cgwrk |
spellingShingle | Tripathy, B. K. 1957- Baktha, Kiran 1995- Security, privacy, and anonymization in social networks emerging research and opportunities Online social networks Security measures Computer crimes Prevention Privacy, Right of Anonymous persons Confidential communications Privatsphäre (DE-588)4123980-5 gnd Internetkriminalität (DE-588)7864395-8 gnd Online-Community (DE-588)1071012568 gnd |
subject_GND | (DE-588)4123980-5 (DE-588)7864395-8 (DE-588)1071012568 |
title | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_auth | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_exact_search | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_full | Security, privacy, and anonymization in social networks emerging research and opportunities B.K. Tripathy, Kiran Baktha |
title_fullStr | Security, privacy, and anonymization in social networks emerging research and opportunities B.K. Tripathy, Kiran Baktha |
title_full_unstemmed | Security, privacy, and anonymization in social networks emerging research and opportunities B.K. Tripathy, Kiran Baktha |
title_short | Security, privacy, and anonymization in social networks |
title_sort | security privacy and anonymization in social networks emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Online social networks Security measures Computer crimes Prevention Privacy, Right of Anonymous persons Confidential communications Privatsphäre (DE-588)4123980-5 gnd Internetkriminalität (DE-588)7864395-8 gnd Online-Community (DE-588)1071012568 gnd |
topic_facet | Online social networks Security measures Computer crimes Prevention Privacy, Right of Anonymous persons Confidential communications Privatsphäre Internetkriminalität Online-Community |
url | https://doi.org/10.4018/978-1-5225-5158-4 |
work_keys_str_mv | AT tripathybk securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities AT bakthakiran securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities |