Securing social networks in cyberspace:
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
[S.l.]
CRC PRESS
2021
|
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | xvii, 298 Seiten Illustrationen, Diagramme. - illustrations (black and white) 26 cm |
ISBN: | 0367681730 9780367681739 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV047574025 | ||
003 | DE-604 | ||
005 | 20211220 | ||
007 | t | ||
008 | 211104s2021 a||| |||| 00||| eng d | ||
020 | |a 0367681730 |9 0-367-68173-0 | ||
020 | |a 9780367681739 |9 978-0-367-68173-9 | ||
035 | |a (OCoLC)1289765338 | ||
035 | |a (DE-599)BVBBV047574025 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-739 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Pathan, Al-Sakib Khan |e Verfasser |0 (DE-588)1122046650 |4 aut | |
245 | 1 | 0 | |a Securing social networks in cyberspace |
264 | 1 | |a [S.l.] |b CRC PRESS |c 2021 | |
300 | |a xvii, 298 Seiten |b Illustrationen, Diagramme. - illustrations (black and white) |c 26 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |2 gnd |9 rswk-swf |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Online social networks / Security measures | |
653 | 0 | |a Computer security | |
653 | 0 | |a Computer networks / Security measures | |
653 | 0 | |a Computer security | |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Soziales Netzwerk |0 (DE-588)4055762-5 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i ebook version |z 9781000463354 |
856 | 4 | 2 | |m Digitalisierung UB Passau - ADAM Catalogue Enrichment |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959570&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-032959570 |
Datensatz im Suchindex
_version_ | 1804182922294460416 |
---|---|
adam_text | Contents Preface..........................................................................................................................................................................ix Acknowledgment..............................................................................................................................xi Editor.............................................................................................................................................. xiii Contributors.............................................................................................................................................................. xv PART I Protection of Personal Information in Social Networks Chapter 1 User Awareness for Securing Social Networks........................................................... 3 Abhijit Bhowmik, S. M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser Chapter 2 Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools........................................................................................................... 17 Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed Chapter 3 Enabling Location k-Anonymity in Social Networks............................................... 35 Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Mone, and Cecilia Labrini Part II Chapter 4 Securing Multimedia Contents Automated Content Classification in Social Media Platforms.................................. 53 Thomas M. Chen Chapter 5 Steganographic Botnet C C
Channel Using Twitter................................................ 73 Nicholas Pantie and Mohammad Husain Chapter 6 A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter.................................................................................................. 123 P. R. Vishnu, Basant Agarwal, P. Vinod, К. A. Dhanya, and Alice Baroni Part III Chapter 7 Cyberbullying, Cyberstalking, and Related Issues Cyberbullying and Cyberstalking on Online Social Networks...............................141 Umit Сап and Bilal Alatas VII
1 viii Chapter 8 Contents Cyberbullying Severity Detection Using Deep Learning Techniques: A Multi-Class Classification over Varied Class Balance Data.............163 Sharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar Chapter 9 Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19.................................................................................. 195 Mohammad Shadab Khan, Sharyar Wani, and Eima Fatima Part IV Other Issues for Securing Social Networks and Online Profiles Chapter 10 Profiling Online Users: Emerging Approaches and Challenges................................221 Mohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed Chapter 11 Securing Mobile Social Networks............................................................................... 241 Robert Gordon Chapter 12 Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures.................... 255 Md. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan Chapter 13 A Tutorial on Cross-Site Scripting Attack: Defense against Online Social Networks................................................................................................ 277 Vassilis Papaspirou, Leandros Magiaras, and Mohamed Amine Ferrag Index 297
|
adam_txt |
Contents Preface.ix Acknowledgment.xi Editor. xiii Contributors. xv PART I Protection of Personal Information in Social Networks Chapter 1 User Awareness for Securing Social Networks. 3 Abhijit Bhowmik, S. M. Raihan Gafur, Abrar Rafid, Saiful Azad, Mufti Mahmud, and M. Shamim Kaiser Chapter 2 Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools. 17 Rishabh Jindal, Ahmed Falah, Adnan Anwar, and Mohiuddin Ahmed Chapter 3 Enabling Location k-Anonymity in Social Networks. 35 Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Mone, and Cecilia Labrini Part II Chapter 4 Securing Multimedia Contents Automated Content Classification in Social Media Platforms. 53 Thomas M. Chen Chapter 5 Steganographic Botnet C C
Channel Using Twitter. 73 Nicholas Pantie and Mohammad Husain Chapter 6 A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter. 123 P. R. Vishnu, Basant Agarwal, P. Vinod, К. A. Dhanya, and Alice Baroni Part III Chapter 7 Cyberbullying, Cyberstalking, and Related Issues Cyberbullying and Cyberstalking on Online Social Networks.141 Umit Сап and Bilal Alatas VII
1 viii Chapter 8 Contents Cyberbullying Severity Detection Using Deep Learning Techniques: A Multi-Class Classification over Varied Class Balance Data.163 Sharyar Wani, Khan Nasik Sami, Zian Md Afique Amin, and Yonis Gulzar Chapter 9 Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19. 195 Mohammad Shadab Khan, Sharyar Wani, and Eima Fatima Part IV Other Issues for Securing Social Networks and Online Profiles Chapter 10 Profiling Online Users: Emerging Approaches and Challenges.221 Mohammad Mamun, Muhammad Al-Digeil, and Sherif Saad Ahmed Chapter 11 Securing Mobile Social Networks. 241 Robert Gordon Chapter 12 Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures. 255 Md. Tanvir Hasan, Md. Redwan Hossain, and Al-Sakib Khan Pathan Chapter 13 A Tutorial on Cross-Site Scripting Attack: Defense against Online Social Networks. 277 Vassilis Papaspirou, Leandros Magiaras, and Mohamed Amine Ferrag Index 297 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author | Pathan, Al-Sakib Khan |
author_GND | (DE-588)1122046650 |
author_facet | Pathan, Al-Sakib Khan |
author_role | aut |
author_sort | Pathan, Al-Sakib Khan |
author_variant | a s k p ask askp |
building | Verbundindex |
bvnumber | BV047574025 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1289765338 (DE-599)BVBBV047574025 |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01698nam a2200421 c 4500</leader><controlfield tag="001">BV047574025</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211220 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">211104s2021 a||| |||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">0367681730</subfield><subfield code="9">0-367-68173-0</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9780367681739</subfield><subfield code="9">978-0-367-68173-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1289765338</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV047574025</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Pathan, Al-Sakib Khan</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1122046650</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Securing social networks in cyberspace</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">[S.l.]</subfield><subfield code="b">CRC PRESS</subfield><subfield code="c">2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xvii, 298 Seiten</subfield><subfield code="b">Illustrationen, Diagramme. - illustrations (black and white)</subfield><subfield code="c">26 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Online social networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer networks / Security measures</subfield></datafield><datafield tag="653" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Soziales Netzwerk</subfield><subfield code="0">(DE-588)4055762-5</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">ebook version</subfield><subfield code="z">9781000463354</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UB Passau - ADAM Catalogue Enrichment</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959570&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-032959570</subfield></datafield></record></collection> |
id | DE-604.BV047574025 |
illustrated | Illustrated |
index_date | 2024-07-03T18:31:22Z |
indexdate | 2024-07-10T09:15:15Z |
institution | BVB |
isbn | 0367681730 9780367681739 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-032959570 |
oclc_num | 1289765338 |
open_access_boolean | |
owner | DE-739 |
owner_facet | DE-739 |
physical | xvii, 298 Seiten Illustrationen, Diagramme. - illustrations (black and white) 26 cm |
publishDate | 2021 |
publishDateSearch | 2021 |
publishDateSort | 2021 |
publisher | CRC PRESS |
record_format | marc |
spelling | Pathan, Al-Sakib Khan Verfasser (DE-588)1122046650 aut Securing social networks in cyberspace [S.l.] CRC PRESS 2021 xvii, 298 Seiten Illustrationen, Diagramme. - illustrations (black and white) 26 cm txt rdacontent n rdamedia nc rdacarrier Computersicherheit (DE-588)4274324-2 gnd rswk-swf Soziales Netzwerk (DE-588)4055762-5 gnd rswk-swf Computer networks / Security measures Online social networks / Security measures Computer security Computersicherheit (DE-588)4274324-2 s Soziales Netzwerk (DE-588)4055762-5 s DE-604 ebook version 9781000463354 Digitalisierung UB Passau - ADAM Catalogue Enrichment application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959570&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Pathan, Al-Sakib Khan Securing social networks in cyberspace Computersicherheit (DE-588)4274324-2 gnd Soziales Netzwerk (DE-588)4055762-5 gnd |
subject_GND | (DE-588)4274324-2 (DE-588)4055762-5 |
title | Securing social networks in cyberspace |
title_auth | Securing social networks in cyberspace |
title_exact_search | Securing social networks in cyberspace |
title_exact_search_txtP | Securing social networks in cyberspace |
title_full | Securing social networks in cyberspace |
title_fullStr | Securing social networks in cyberspace |
title_full_unstemmed | Securing social networks in cyberspace |
title_short | Securing social networks in cyberspace |
title_sort | securing social networks in cyberspace |
topic | Computersicherheit (DE-588)4274324-2 gnd Soziales Netzwerk (DE-588)4055762-5 gnd |
topic_facet | Computersicherheit Soziales Netzwerk |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=032959570&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT pathanalsakibkhan securingsocialnetworksincyberspace |