Sciweavers

6696 search results - page 111 / 1340
» Securing social networks
Sort
View
CIKM
2010
Springer
13 years 8 months ago
Predicting product adoption in large-scale social networks
Online social networks offer opportunities to analyze user behavior and social connectivity and leverage resulting insights for effective online advertising. We study the adopti...
Rushi Bhatt, Vineet Chaoji, Rajesh Parekh
AAAI
2012
12 years 19 days ago
Discovering Spammers in Social Networks
As the popularity of the social media increases, as evidenced in Twitter, Facebook and China’s Renren, spamming activities also picked up in numbers and variety. On social netwo...
Yin Zhu, Xiao Wang, ErHeng Zhong, Nathan Nan Liu, ...
ACSAC
2005
IEEE
14 years 3 months ago
User-Centered Security: Stepping Up to the Grand Challenge
User-centered security has been identified as a grand challenge in information security and assurance. It is on the brink of becoming an established subdomain of both security and...
Mary Ellen Zurko
ICWSM
2010
13 years 11 months ago
Modeling Group Dynamics in Virtual Worlds
In this study, we examine human social interactions within virtual worlds and address the question of how group interactions are affected by the surrounding game environment. To i...
Fahad Shah, Gita Reese Sukthankar, Chris Usher
SOCIALCOM
2010
13 years 8 months ago
Decomposing Social Networks
: Networks having several hundred or more nodes and significant edge probabilities are extremely difficult to visualize. They typically appear as dense clumps, with the various sub...
Whitman Richards, Owen Macindoe