Sciweavers

254 search results - page 24 / 51
» Analysis of privacy in online social networks of runet
Sort
View
SOUPS
2009
ACM
15 years 6 months ago
Social applications: exploring a more secure framework
Online social network sites, such as MySpace, Facebook and others have grown rapidly, with hundreds of millions of active users. A new feature on many sites is social applications...
Andrew Besmer, Heather Richter Lipford, Mohamed Sh...
CEC
2007
IEEE
15 years 6 months ago
Evolving cooperation in the non-iterated prisoner's dilemma: A social network inspired approach
— Online service provision is becoming increasingly decentralized as system designers pursue the benefits gained from utilizing nodes at the periphery of the network. However, d...
T. S. Ellis, X. Yao
ISI
2008
Springer
14 years 11 months ago
Detecting Hidden Hierarchy in Terrorist Networks: Some Case Studies
This paper provides a novel algorithm to automatically detect the hidden hierarchy in terrorist networks. The algorithm is based on centrality measures used in social network analy...
Nasrullah Memon, Henrik Legind Larsen, David L. Hi...
ISI
2004
Springer
15 years 5 months ago
Semantic Analysis for Monitoring Insider Threats
Malicious insiders’ difficult-to-detect activities pose serious threats to the intelligence community (IC) when these activities go undetected. A novel approach that integrates ...
Svetlana Symonenko, Elizabeth D. Liddy, Ozgur Yilm...
SEMWEB
2010
Springer
14 years 9 months ago
Measuring the Dynamic Bi-directional Influence between Content and Social Networks
The Social Semantic Web has begun to provide connections between users within social networks and the content they produce across the whole of the Social Web. Thus, the Social Sema...
Shenghui Wang, Paul T. Groth