|
|
|
|
LEADER |
03861nam a2200565 4500 |
001 |
978-3-319-78256-0 |
003 |
DE-He213 |
005 |
20191025052418.0 |
007 |
cr nn 008mamaa |
008 |
180803s2019 gw | s |||| 0|eng d |
020 |
|
|
|a 9783319782560
|9 978-3-319-78256-0
|
024 |
7 |
|
|a 10.1007/978-3-319-78256-0
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a H61.3
|
072 |
|
7 |
|a J
|2 bicssc
|
072 |
|
7 |
|a SOC000000
|2 bisacsh
|
072 |
|
7 |
|a UXJ
|2 thema
|
082 |
0 |
4 |
|a 300.00285
|2 23
|
245 |
1 |
0 |
|a Social Networks and Surveillance for Society
|h [electronic resource] /
|c edited by Tansel Özyer, Sambit Bakshi, Reda Alhajj.
|
250 |
|
|
|a 1st ed. 2019.
|
264 |
|
1 |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2019.
|
300 |
|
|
|a VII, 179 p. 45 illus. in color.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Social Networks,
|x 2190-5428
|
505 |
0 |
|
|a Chapter1. Frauds in Online Social Networks: A Review -- Chapter2. Leveraging Social Network Analysis and Cyber Forensics Approaches to Study Cyber Propaganda Campaigns -- Chapter3. Hiding Self on Facebook Sidebar Ticker, Surveillance and Privacy -- Chapter4. Identifying In uential Spreaders in Complex Networks with Probabilistic Links -- Chapter5. Decentralized Online Social Networks Architectures -- Chapter6. We Shall Not Only Survive To The Future of Social Networks -- Chapter7. A Centrality Measure for Directed Networks: m - Ranking Method -- Chapter8. Searching on Facebook Through the Lens of the Concept of Privacy -- Chapter9. Emergency Detection and Evacuation Planning Using Social Media -- Chapter10. Social Network Analysis to Combat Terrorism: 2015 Paris Attacks.
|
520 |
|
|
|a This book focuses on recent technical advancements and state-of-the art technologies for analyzing characteristic features and probabilistic modelling of complex social networks and decentralized online network architectures. Such research results in applications related to surveillance and privacy, fraud analysis, cyber forensics, propaganda campaigns, as well as for online social networks such as Facebook. The text illustrates the benefits of using advanced social network analysis methods through application case studies based on practical test results from synthetic and real-world data. This book will appeal to researchers and students working in these areas. .
|
650 |
|
0 |
|a Social sciences-Data processing.
|
650 |
|
0 |
|a Social sciences-Computer programs.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a Social media.
|
650 |
|
0 |
|a Application software.
|
650 |
1 |
4 |
|a Computational Social Sciences.
|0 http://scigraph.springernature.com/things/product-market-codes/X34000
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|0 http://scigraph.springernature.com/things/product-market-codes/I18030
|
650 |
2 |
4 |
|a Social Media.
|0 http://scigraph.springernature.com/things/product-market-codes/412020
|
650 |
2 |
4 |
|a Computer Appl. in Social and Behavioral Sciences.
|0 http://scigraph.springernature.com/things/product-market-codes/I23028
|
700 |
1 |
|
|a Özyer, Tansel.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Bakshi, Sambit.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
700 |
1 |
|
|a Alhajj, Reda.
|e editor.
|4 edt
|4 http://id.loc.gov/vocabulary/relators/edt
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319782553
|
776 |
0 |
8 |
|i Printed edition:
|z 9783319782577
|
776 |
0 |
8 |
|i Printed edition:
|z 9783030086572
|
830 |
|
0 |
|a Lecture Notes in Social Networks,
|x 2190-5428
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-319-78256-0
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-SLS
|
950 |
|
|
|a Social Sciences (Springer-41176)
|