Security, privacy, and anonymization in social networks: emerging research and opportunities
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA)
IGI Global
[2018]
|
Schlagworte: | |
Online-Zugang: | DE-862 DE-863 |
Zusammenfassung: | "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- |
Beschreibung: | 15 PDFs (viii, 176 Seiten) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522551591 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00187086 | ||
003 | IGIG | ||
005 | 20180203141053.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 180204s2018 pau fob 001 0 eng d | ||
010 | |z 2017036591 | ||
020 | |a 9781522551591 |q ebook | ||
020 | |z 9781522551584 |q hardcover | ||
024 | 7 | |a 10.4018/978-1-5225-5158-4 |2 doi | |
035 | |a (CaBNVSL)slc20085741 | ||
035 | |a (OCoLC)1022126236 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a TK5105.59 |b .T75 2018e | |
082 | 7 | |a 006.7/54 |2 23 | |
100 | 1 | |a Tripathy, B. K., |d 1957- |e author. | |
245 | 1 | 0 | |a Security, privacy, and anonymization in social networks |b emerging research and opportunities |c by B.K. Tripathy and Kiran Baktha. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) |b IGI Global |c [2018] | |
300 | |a 15 PDFs (viii, 176 Seiten) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | 0 | |a Description based on title screen (IGI Global, viewed 02/04/2018). | |
650 | 0 | |a Anonymous persons. | |
650 | 0 | |a Computer crimes |x Prevention. | |
650 | 0 | |a Confidential communications. | |
650 | 0 | |a Online social networks |x Security measures. | |
650 | 0 | |a Privacy, Right of. | |
653 | |a Edge Clustering Models. | ||
653 | |a Fast K-Degree Anonymization (FKDA) | ||
653 | |a Greedy Algorithms for Social Network Anonymization (GASNA) | ||
653 | |a Neighborhood Attacks. | ||
653 | |a Sequential Clustering Algorithms. | ||
653 | |a Undirected Networks. | ||
653 | |a Vertex-Clustering Algorithms. | ||
653 | |a Weighted Social Networks. | ||
700 | 1 | |a Baktha, Kiran |d 1995- |e author. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2017036591 | |
776 | 0 | 8 | |i Print version: |z 1522551581 |z 9781522551584 |w (DLC) 2017036591 |
966 | 4 | 0 | |l DE-862 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4 |3 Volltext |
966 | 4 | 0 | |l DE-863 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-862 | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00187086 |
---|---|
_version_ | 1826942594430533632 |
adam_text | |
any_adam_object | |
author | Tripathy, B. K., 1957- Baktha, Kiran 1995- |
author_facet | Tripathy, B. K., 1957- Baktha, Kiran 1995- |
author_role | aut aut |
author_sort | Tripathy, B. K., 1957- |
author_variant | b k t bk bkt k b kb |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | T - Technology |
callnumber-label | TK5105 |
callnumber-raw | TK5105.59 .T75 2018e |
callnumber-search | TK5105.59 .T75 2018e |
callnumber-sort | TK 45105.59 T75 42018E |
callnumber-subject | TK - Electrical and Nuclear Engineering |
collection | ZDB-98-IGB |
contents | Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. |
ctrlnum | (CaBNVSL)slc20085741 (OCoLC)1022126236 |
dewey-full | 006.7/54 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 006 - Special computer methods |
dewey-raw | 006.7/54 |
dewey-search | 006.7/54 |
dewey-sort | 16.7 254 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03034nam a2200589 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00187086</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20180203141053.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">180204s2018 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2017036591</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522551591</subfield><subfield code="q">ebook</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522551584</subfield><subfield code="q">hardcover</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-5158-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20085741</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1022126236</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">TK5105.59</subfield><subfield code="b">.T75 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">006.7/54</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Tripathy, B. K.,</subfield><subfield code="d">1957-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Security, privacy, and anonymization in social networks </subfield><subfield code="b">emerging research and opportunities </subfield><subfield code="c">by B.K. Tripathy and Kiran Baktha.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) </subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">15 PDFs (viii, 176 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 02/04/2018).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Anonymous persons.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer crimes</subfield><subfield code="x">Prevention.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Confidential communications.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Online social networks</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Privacy, Right of.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Edge Clustering Models.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Fast K-Degree Anonymization (FKDA)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Greedy Algorithms for Social Network Anonymization (GASNA)</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Neighborhood Attacks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Sequential Clustering Algorithms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Undirected Networks.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Vertex-Clustering Algorithms.</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Weighted Social Networks.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Baktha, Kiran</subfield><subfield code="d">1995-</subfield><subfield code="e">author.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2017036591</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">1522551581</subfield><subfield code="z">9781522551584</subfield><subfield code="w">(DLC) 2017036591</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-862</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-863</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-862</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00187086 |
illustrated | Not Illustrated |
indexdate | 2025-03-18T14:30:29Z |
institution | BVB |
isbn | 9781522551591 |
language | English |
oclc_num | 1022126236 |
open_access_boolean | |
owner | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
owner_facet | DE-862 DE-BY-FWS DE-863 DE-BY-FWS |
physical | 15 PDFs (viii, 176 Seiten) Also available in print. |
psigel | ZDB-98-IGB FWS_PDA_IGB ZDB-98-IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global |
record_format | marc |
spelling | Tripathy, B. K., 1957- author. Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) IGI Global [2018] 15 PDFs (viii, 176 Seiten) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. Restricted to subscribers or individual electronic text purchasers. "This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 02/04/2018). Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. Edge Clustering Models. Fast K-Degree Anonymization (FKDA) Greedy Algorithms for Social Network Anonymization (GASNA) Neighborhood Attacks. Sequential Clustering Algorithms. Undirected Networks. Vertex-Clustering Algorithms. Weighted Social Networks. Baktha, Kiran 1995- author. IGI Global, publisher. (Original) (DLC)2017036591 Print version: 1522551581 9781522551584 (DLC) 2017036591 |
spellingShingle | Tripathy, B. K., 1957- Baktha, Kiran 1995- Security, privacy, and anonymization in social networks emerging research and opportunities Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques. Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
title | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_auth | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_exact_search | Security, privacy, and anonymization in social networks emerging research and opportunities |
title_full | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_fullStr | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_full_unstemmed | Security, privacy, and anonymization in social networks emerging research and opportunities by B.K. Tripathy and Kiran Baktha. |
title_short | Security, privacy, and anonymization in social networks |
title_sort | security privacy and anonymization in social networks emerging research and opportunities |
title_sub | emerging research and opportunities |
topic | Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
topic_facet | Anonymous persons. Computer crimes Prevention. Confidential communications. Online social networks Security measures. Privacy, Right of. |
work_keys_str_mv | AT tripathybk securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities AT bakthakiran securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities AT igiglobal securityprivacyandanonymizationinsocialnetworksemergingresearchandopportunities |