Identification of pathogenic social media accounts: from data to intelligence to prediction
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
[2021]
|
Schriftenreihe: | SpringerBriefs in Computer Science
|
Schlagworte: | |
Online-Zugang: | BTU01 FCO01 FHA01 FHD01 FHI01 FHM01 FHN01 FHR01 FLA01 FRO01 FWS01 FWS02 HTW01 TUM01 UBA01 UBG01 UBM01 UBR01 UBT01 UBW01 UBY01 UER01 UPA01 Volltext |
Beschreibung: | 1 Online-Ressource (IX, 95 Seiten) Illustrationen |
ISBN: | 9783030614317 |
ISSN: | 2191-5768 |
DOI: | 10.1007/978-3-030-61431-7 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV047135758 | ||
003 | DE-604 | ||
005 | 20221017 | ||
007 | cr|uuu---uuuuu | ||
008 | 210211s2021 |||| o||u| ||||||eng d | ||
020 | |a 9783030614317 |c Online |9 978-3-030-61431-7 | ||
024 | 7 | |a 10.1007/978-3-030-61431-7 |2 doi | |
035 | |a (ZDB-2-SCS)9783030614317 | ||
035 | |a (OCoLC)1237588990 | ||
035 | |a (DE-599)BVBBV047135758 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-19 |a DE-858 |a DE-Aug4 |a DE-898 |a DE-188 |a DE-523 |a DE-473 |a DE-29 |a DE-863 |a DE-1050 |a DE-20 |a DE-862 |a DE-384 |a DE-573 |a DE-M347 |a DE-703 |a DE-706 |a DE-739 |a DE-634 |a DE-92 |a DE-861 |a DE-91 |a DE-355 |a DE-860 | ||
082 | 0 | |a 006.3 |2 23 | |
084 | |a DAT 000 |2 stub | ||
100 | 1 | |a Alvari, Hamidreza |e Verfasser |4 aut | |
245 | 1 | 0 | |a Identification of pathogenic social media accounts |b from data to intelligence to prediction |c Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
264 | 1 | |a Cham |b Springer |c [2021] | |
300 | |a 1 Online-Ressource (IX, 95 Seiten) |b Illustrationen | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
490 | 0 | |a SpringerBriefs in Computer Science |x 2191-5768 | |
650 | 4 | |a Artificial Intelligence | |
650 | 4 | |a Data Mining and Knowledge Discovery | |
650 | 4 | |a Machine Learning | |
650 | 4 | |a Mobile and Network Security | |
650 | 4 | |a Artificial intelligence | |
650 | 4 | |a Data mining | |
650 | 4 | |a Machine learning | |
650 | 4 | |a Computer networks / Security measures | |
650 | 0 | 7 | |a Data Mining |0 (DE-588)4428654-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheit |0 (DE-588)4054790-5 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Künstliche Intelligenz |0 (DE-588)4033447-8 |D s |
689 | 0 | 1 | |a Data Mining |0 (DE-588)4428654-5 |D s |
689 | 0 | 2 | |a Maschinelles Lernen |0 (DE-588)4193754-5 |D s |
689 | 0 | 3 | |a Sicherheit |0 (DE-588)4054790-5 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Shaabani, Elham |4 aut | |
700 | 1 | |a Shakarian, Paulo |d 1980- |0 (DE-588)1234085496 |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, Paperback |z 978-3-030-61430-0 |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-3-030-61432-4 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-030-61431-7 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-2-SCS |a ZDB-2-SEB | ||
940 | 1 | |q ZDB-2-SCS_2021 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-032541789 | ||
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FCO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHD01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FHR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FWS01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l FWS02 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l HTW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l TUM01 |p ZDB-2-SEB |q TUM_Einzelkauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UBY01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-030-61431-7 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-FWS_katkey | 871895 |
---|---|
_version_ | 1806194200138481664 |
adam_txt | |
any_adam_object | |
any_adam_object_boolean | |
author | Alvari, Hamidreza Shaabani, Elham Shakarian, Paulo 1980- |
author_GND | (DE-588)1234085496 |
author_facet | Alvari, Hamidreza Shaabani, Elham Shakarian, Paulo 1980- |
author_role | aut aut aut |
author_sort | Alvari, Hamidreza |
author_variant | h a ha e s es p s ps |
building | Verbundindex |
bvnumber | BV047135758 |
classification_tum | DAT 000 |
collection | ZDB-2-SCS ZDB-2-SEB |
ctrlnum | (ZDB-2-SCS)9783030614317 (OCoLC)1237588990 (DE-599)BVBBV047135758 |
dewey-full | 006.3 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.3 |
dewey-search | 006.3 |
dewey-sort | 16.3 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
doi_str_mv | 10.1007/978-3-030-61431-7 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>04668nmm a2200877zc 4500</leader><controlfield tag="001">BV047135758</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221017 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">210211s2021 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783030614317</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-030-61431-7</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-030-61431-7</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-2-SCS)9783030614317</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1237588990</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047135758</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-19</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-523</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-863</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-862</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-355</subfield><subfield code="a">DE-860</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">006.3</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 000</subfield><subfield code="2">stub</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Alvari, Hamidreza</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Identification of pathogenic social media accounts</subfield><subfield code="b">from data to intelligence to prediction</subfield><subfield code="c">Hamidreza Alvari, Elham Shaabani, Paulo Shakarian</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (IX, 95 Seiten)</subfield><subfield code="b">Illustrationen</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">SpringerBriefs in Computer Science</subfield><subfield code="x">2191-5768</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial Intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data Mining and Knowledge Discovery</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine Learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Mobile and Network Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Artificial intelligence</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data mining</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Machine learning</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Künstliche Intelligenz</subfield><subfield code="0">(DE-588)4033447-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Data Mining</subfield><subfield code="0">(DE-588)4428654-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Maschinelles Lernen</subfield><subfield code="0">(DE-588)4193754-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Sicherheit</subfield><subfield code="0">(DE-588)4054790-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shaabani, Elham</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shakarian, Paulo</subfield><subfield code="d">1980-</subfield><subfield code="0">(DE-588)1234085496</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, Paperback</subfield><subfield code="z">978-3-030-61430-0</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-3-030-61432-4</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield><subfield code="a">ZDB-2-SEB</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2021</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032541789</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FCO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHD01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FHR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FWS01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">FWS02</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">HTW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">TUM01</subfield><subfield code="p">ZDB-2-SEB</subfield><subfield code="q">TUM_Einzelkauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UBY01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-030-61431-7</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV047135758 |
illustrated | Not Illustrated |
index_date | 2024-07-03T16:33:53Z |
indexdate | 2024-08-01T16:03:38Z |
institution | BVB |
isbn | 9783030614317 |
issn | 2191-5768 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032541789 |
oclc_num | 1237588990 |
open_access_boolean | |
owner | DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-92 DE-861 DE-91 DE-BY-TUM DE-355 DE-BY-UBR DE-860 |
owner_facet | DE-19 DE-BY-UBM DE-858 DE-Aug4 DE-898 DE-BY-UBR DE-188 DE-523 DE-473 DE-BY-UBG DE-29 DE-863 DE-BY-FWS DE-1050 DE-20 DE-862 DE-BY-FWS DE-384 DE-573 DE-M347 DE-703 DE-706 DE-739 DE-634 DE-92 DE-861 DE-91 DE-BY-TUM DE-355 DE-BY-UBR DE-860 |
physical | 1 Online-Ressource (IX, 95 Seiten) Illustrationen |
psigel | ZDB-2-SCS ZDB-2-SEB ZDB-2-SCS_2021 ZDB-2-SEB TUM_Einzelkauf |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | Springer |
record_format | marc |
series2 | SpringerBriefs in Computer Science |
spellingShingle | Alvari, Hamidreza Shaabani, Elham Shakarian, Paulo 1980- Identification of pathogenic social media accounts from data to intelligence to prediction Artificial Intelligence Data Mining and Knowledge Discovery Machine Learning Mobile and Network Security Artificial intelligence Data mining Machine learning Computer networks / Security measures Data Mining (DE-588)4428654-5 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Maschinelles Lernen (DE-588)4193754-5 gnd Sicherheit (DE-588)4054790-5 gnd |
subject_GND | (DE-588)4428654-5 (DE-588)4033447-8 (DE-588)4193754-5 (DE-588)4054790-5 |
title | Identification of pathogenic social media accounts from data to intelligence to prediction |
title_auth | Identification of pathogenic social media accounts from data to intelligence to prediction |
title_exact_search | Identification of pathogenic social media accounts from data to intelligence to prediction |
title_exact_search_txtP | Identification of pathogenic social media accounts from data to intelligence to prediction |
title_full | Identification of pathogenic social media accounts from data to intelligence to prediction Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
title_fullStr | Identification of pathogenic social media accounts from data to intelligence to prediction Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
title_full_unstemmed | Identification of pathogenic social media accounts from data to intelligence to prediction Hamidreza Alvari, Elham Shaabani, Paulo Shakarian |
title_short | Identification of pathogenic social media accounts |
title_sort | identification of pathogenic social media accounts from data to intelligence to prediction |
title_sub | from data to intelligence to prediction |
topic | Artificial Intelligence Data Mining and Knowledge Discovery Machine Learning Mobile and Network Security Artificial intelligence Data mining Machine learning Computer networks / Security measures Data Mining (DE-588)4428654-5 gnd Künstliche Intelligenz (DE-588)4033447-8 gnd Maschinelles Lernen (DE-588)4193754-5 gnd Sicherheit (DE-588)4054790-5 gnd |
topic_facet | Artificial Intelligence Data Mining and Knowledge Discovery Machine Learning Mobile and Network Security Artificial intelligence Data mining Machine learning Computer networks / Security measures Data Mining Künstliche Intelligenz Maschinelles Lernen Sicherheit |
url | https://doi.org/10.1007/978-3-030-61431-7 |
work_keys_str_mv | AT alvarihamidreza identificationofpathogenicsocialmediaaccountsfromdatatointelligencetoprediction AT shaabanielham identificationofpathogenicsocialmediaaccountsfromdatatointelligencetoprediction AT shakarianpaulo identificationofpathogenicsocialmediaaccountsfromdatatointelligencetoprediction |