語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Cyber security and social media appl...
~
Ozyer, Sibel Tarıyan.
FindBook
Google Book
Amazon
博客來
Cyber security and social media applications
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Cyber security and social media applications/ edited by Sibel Tarıyan Ozyer, Buket Kaya.
其他作者:
Ozyer, Sibel Tarıyan.
出版者:
Cham :Springer Nature Switzerland : : 2023.,
面頁冊數:
v, 187 p. :ill., digital ;24 cm.
內容註:
Chapter 1. Powering Blogosphere Analytics with BlogTracker: COVID-19 Case Study (Akinnubi) -- Chapter 2. Parallelized Cyber Reconnaissance Automation: A Real-Time and Scheduled Security Scanner (Malkawi) -- Chapter 3. Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds in a Multitasking Environment (Korkiakoski) -- Chapter 4. Effects of Global and Local Network Structure on Number of Driver Nodes in Complex Networks (Sadaf) -- Chapter 5. A Lightweight Global Taxonomy Induction System for E-Commerce Concept Labels (Shen) -- Chapter 6. Exploring Online Video Narratives and Networks using VTracker (Marcoux) -- Chapter 7. Twitter Credibility Score for Preventing Fake News Dissemination on Twitter (Alhajj) -- Chapter 8. Detecting Trending Topics and Influence on Social Media (Alhajj)
Contained By:
Springer Nature eBook
標題:
Computer security. -
電子資源:
https://doi.org/10.1007/978-3-031-33065-0
ISBN:
9783031330650
Cyber security and social media applications
Cyber security and social media applications
[electronic resource] /edited by Sibel Tarıyan Ozyer, Buket Kaya. - Cham :Springer Nature Switzerland :2023. - v, 187 p. :ill., digital ;24 cm. - Lecture notes in social networks,2190-5436. - Lecture notes in social networks..
Chapter 1. Powering Blogosphere Analytics with BlogTracker: COVID-19 Case Study (Akinnubi) -- Chapter 2. Parallelized Cyber Reconnaissance Automation: A Real-Time and Scheduled Security Scanner (Malkawi) -- Chapter 3. Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds in a Multitasking Environment (Korkiakoski) -- Chapter 4. Effects of Global and Local Network Structure on Number of Driver Nodes in Complex Networks (Sadaf) -- Chapter 5. A Lightweight Global Taxonomy Induction System for E-Commerce Concept Labels (Shen) -- Chapter 6. Exploring Online Video Narratives and Networks using VTracker (Marcoux) -- Chapter 7. Twitter Credibility Score for Preventing Fake News Dissemination on Twitter (Alhajj) -- Chapter 8. Detecting Trending Topics and Influence on Social Media (Alhajj)
This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention of fake news dissemination, and detection of trending topics and influence from social media are investigated. This book helps the reader in developing their own perspective about how to deal with cyber security and how to benefit from the development in technology to tackle cyber security issues. The reader of this book will realize how to use various machine learning techniques for tackling various applications involving social medial analysis.
ISBN: 9783031330650
Standard No.: 10.1007/978-3-031-33065-0doiSubjects--Topical Terms:
540555
Computer security.
LC Class. No.: QA76.9.A25
Dewey Class. No.: 005.8
Cyber security and social media applications
LDR
:02919nmm a2200337 a 4500
001
2333180
003
DE-He213
005
20230725010559.0
006
m d
007
cr nn 008maaau
008
240402s2023 sz s 0 eng d
020
$a
9783031330650
$q
(electronic bk.)
020
$a
9783031330643
$q
(paper)
024
7
$a
10.1007/978-3-031-33065-0
$2
doi
035
$a
978-3-031-33065-0
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
QA76.9.A25
072
7
$a
JFD
$2
bicssc
072
7
$a
SOC052000
$2
bisacsh
072
7
$a
JBCT1
$2
thema
082
0 4
$a
005.8
$2
23
090
$a
QA76.9.A25
$b
C994 2023
245
0 0
$a
Cyber security and social media applications
$h
[electronic resource] /
$c
edited by Sibel Tarıyan Ozyer, Buket Kaya.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2023.
300
$a
v, 187 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Lecture notes in social networks,
$x
2190-5436
505
0
$a
Chapter 1. Powering Blogosphere Analytics with BlogTracker: COVID-19 Case Study (Akinnubi) -- Chapter 2. Parallelized Cyber Reconnaissance Automation: A Real-Time and Scheduled Security Scanner (Malkawi) -- Chapter 3. Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds in a Multitasking Environment (Korkiakoski) -- Chapter 4. Effects of Global and Local Network Structure on Number of Driver Nodes in Complex Networks (Sadaf) -- Chapter 5. A Lightweight Global Taxonomy Induction System for E-Commerce Concept Labels (Shen) -- Chapter 6. Exploring Online Video Narratives and Networks using VTracker (Marcoux) -- Chapter 7. Twitter Credibility Score for Preventing Fake News Dissemination on Twitter (Alhajj) -- Chapter 8. Detecting Trending Topics and Influence on Social Media (Alhajj)
520
$a
This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention of fake news dissemination, and detection of trending topics and influence from social media are investigated. This book helps the reader in developing their own perspective about how to deal with cyber security and how to benefit from the development in technology to tackle cyber security issues. The reader of this book will realize how to use various machine learning techniques for tackling various applications involving social medial analysis.
650
0
$a
Computer security.
$3
540555
650
0
$a
Social media.
$3
786190
650
1 4
$a
Social Media.
$3
2186794
650
2 4
$a
Machine Learning.
$3
3382522
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
898250
650
2 4
$a
Computer Imaging, Vision, Pattern Recognition and Graphics.
$3
890871
700
1
$a
Ozyer, Sibel Tarıyan.
$3
3663743
700
1
$a
Kaya, Buket.
$3
3663744
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Lecture notes in social networks.
$3
2058983
856
4 0
$u
https://doi.org/10.1007/978-3-031-33065-0
950
$a
Literature, Cultural and Media Studies (SpringerNature-41173)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9459385
電子資源
11.線上閱覽_V
電子書
EB QA76.9.A25
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入