Security, privacy, and anonymization in social networks: emerging research and opportunities
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[2018]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- |
Beschreibung: | 15 PDFs (viii, 176 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522551591 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00187086 | ||
003 | IGIG | ||
005 | 20180203141053.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180204s2018 pau fob 001 0 eng d | ||
010 | |z 2017036591 | ||
020 | |a 9781522551591 |q ebook | ||
020 | |z 9781522551584 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-5158-4 |2 doi | |
035 | |a (CaBNVSL)slc20085741 | ||
035 | |a (OCoLC)1022126236 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .T75 2018e | |
082 | 7 | |a 006.7/54 |2 23 | |
100 | 1 | |a Tripathy, B. K., |d 1957- |e author. | |
245 | 1 | 0 | |a Security, privacy, and anonymization in social networks |b emerging research and opportunities |c by B.K. Tripathy and Kiran Baktha. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [2018] | |
300 | |a 15 PDFs (viii, 176 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 02/04/2018). | ||
650 | 0 | |a Anonymous persons. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Confidential communications. | |
650 | 0 | |a Online social networks |x Security measures. | |
650 | 0 | |a Privacy, Right of. | |
700 | 1 | |a Baktha, Kiran |d 1995- |e author. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017036591 | |
776 | 0 | 8 | |i Print version: |z 1522551581 |z 9781522551584 |w (DLC) 2017036591 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00187086 |
---|---|
_version_ | 1816797079821877248 |
adam_text | |
any_adam_object | |
author | Tripathy, B. K., 1957- Baktha, Kiran 1995- |
author_facet | Tripathy, B. K., 1957- Baktha, Kiran 1995- |
author_role | aut aut |
author_sort | Tripathy, B. K., 1957- |
author_variant | b k t bk bkt k b kb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .T75 2018e |
callnumber-search | TK5105.59 .T75 2018e |
callnumber-sort | TK 45105.59 T75 42018E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. |
ctrlnum | (CaBNVSL)slc20085741 (OCoLC)1022126236 |
dewey-full | 006.7/54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.7/54 |
dewey-search | 006.7/54 |
dewey-sort | 16.7 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02656nam a2200493 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00187086</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180203141053.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180204s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017036591</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522551591</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522551584</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5158-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20085741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1022126236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.T75 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.7/54</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tripathy, B. K.,</subfield><subfield code="d">1957-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy, and anonymization in social networks </subfield><subfield code="b">emerging research and opportunities </subfield><subfield code="c">by B.K. Tripathy and Kiran Baktha.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">15 PDFs (viii, 176 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/04/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Anonymous persons.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baktha, Kiran</subfield><subfield code="d">1995-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017036591</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522551581</subfield><subfield code="z">9781522551584</subfield><subfield code="w">(DLC) 2017036591</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00187086 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:53Z |
institution | BVB |
isbn | 9781522551591 |
language | English |
oclc_num | 1022126236 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 15 PDFs (viii, 176 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global, |
record_format | marc |
spelling | Tripathy, B. K., 1957- author. Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [2018] 15 PDFs (viii, 176 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. Restricted to subscribers or individual electronic text purchasers. "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/04/2018). Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. Baktha, Kiran 1995- author. IGI Global, publisher. (Original) (DLC)2017036591 Print version: 1522551581 9781522551584 (DLC) 2017036591 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4 Volltext |
spellingShingle | Tripathy, B. K., 1957- Baktha, Kiran 1995- Security, privacy, and anonymization in social networks emerging research and opportunities Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
title | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_auth | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_exact_search | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_full | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_fullStr | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_full_unstemmed | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_short | Security, privacy, and anonymization in social networks |
title_sort | security privacy and anonymization in social networks emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
topic_facet | Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4 |
work_keys_str_mv | AT tripathybk securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities AT bakthakiran securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities AT igiglobal securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities |