Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Security, privacy, and anonymization...
~
Tripathy, B. K., (1957-)
Linked to FindBook
Google Book
Amazon
博客來
Security, privacy, and anonymization in social networks = emerging research and opportunities /
Record Type:
Electronic resources : Monograph/item
Title/Author:
Security, privacy, and anonymization in social networks/ by B.K. Tripathy and Kiran Baktha.
Reminder of title:
emerging research and opportunities /
Author:
Tripathy, B. K.,
other author:
Baktha, Kiran,
Published:
Hershey, Pennsylvania :IGI Global, : [2018],
Description:
1 online resource (viii, 176 p.)
[NT 15003449]:
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
Subject:
Online social networks - Security measures. -
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4
ISBN:
9781522551591 (ebook)
Security, privacy, and anonymization in social networks = emerging research and opportunities /
Tripathy, B. K.,1957-
Security, privacy, and anonymization in social networks
emerging research and opportunities /[electronic resource] :by B.K. Tripathy and Kiran Baktha. - Hershey, Pennsylvania :IGI Global,[2018] - 1 online resource (viii, 176 p.)
Includes bibliographical references and index.
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
Restricted to subscribers or individual electronic text purchasers.
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--
ISBN: 9781522551591 (ebook)Subjects--Topical Terms:
1458430
Online social networks
--Security measures.
LC Class. No.: TK5105.59 / .T75 2018e
Dewey Class. No.: 006.7/54
Security, privacy, and anonymization in social networks = emerging research and opportunities /
LDR
:01771nmm a2200277 a 4500
001
2137978
003
IGIG
005
20181030104102.0
006
m o d
007
cr cn
008
181117s2018 pau fob 001 0 eng d
010
$z
2017036591
020
$a
9781522551591 (ebook)
020
$a
9781522551584 (hardcover)
035
$a
(OCoLC)1022126236
035
$a
1071025349
040
$a
CaBNVSL
$b
eng
$c
CaBNVSL
$d
CaBNVSL
050
4
$a
TK5105.59
$b
.T75 2018e
082
0 4
$a
006.7/54
$2
23
100
1
$a
Tripathy, B. K.,
$d
1957-
$e
author.
$3
3311035
245
1 0
$a
Security, privacy, and anonymization in social networks
$h
[electronic resource] :
$b
emerging research and opportunities /
$c
by B.K. Tripathy and Kiran Baktha.
260
$a
Hershey, Pennsylvania :
$b
IGI Global,
$c
[2018]
300
$a
1 online resource (viii, 176 p.)
504
$a
Includes bibliographical references and index.
505
0
$a
Chapter 1. Fundamentals of social networks -- Chapter 2. Social network anonymization -- Chapter 3. Social network anonymization techniques -- Chapter 4. Clustering approaches -- Chapter 5. Graph modification approaches -- Chapter 6. Weighted and directed graph approaches -- Chapter 7. De-anonymization techniques.
506
$a
Restricted to subscribers or individual electronic text purchasers.
520
3
$a
"This book provides basic concepts related to social networks. It emphasizes on anonymization techniques and focuses on a specific attack on privacy of social networks, called the neighborhood attack and provide anonymization algorithms. It also discusses the other important approach for social network anonymization, the graph modification approach and the various algorithms developed following this approach"--
$c
Provided by publisher.
650
0
$a
Online social networks
$x
Security measures.
$3
1458430
650
0
$a
Computer crimes
$x
Prevention.
$3
819286
650
0
$a
Privacy, Right of.
$3
606607
650
0
$a
Anonymous persons.
$3
3311037
650
0
$a
Confidential communications.
$3
565798
700
1
$a
Baktha, Kiran,
$d
1995-
$e
author.
$3
3311036
856
4 0
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-5158-4
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9344672
電子資源
11.線上閱覽_V
電子書
EB TK5105.59 .T75 2018e
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login