Sciweavers

6696 search results - page 78 / 1340
» Securing social networks
Sort
View
CORR
2008
Springer
126views Education» more  CORR 2008»
13 years 8 months ago
Mining User Profiles to Support Structure and Explanation in Open Social Networking
The proliferation of media sharing and social networking websites has brought with it vast collections of site-specific user generated content. The result is a Social Networking Di...
Avare Stewart, Ernesto Diaz-Aviles, Wolfgang Nejdl
SMC
2007
IEEE
14 years 3 months ago
Network security project management: a security policy-based approach
— Managing security projects is a delicate activity due to the evolution of attacks. In this paper, we develop a new methodology for estimating security effort based on algebraic...
Jihène Krichène, Noureddine Boudriga
KDD
2010
ACM
214views Data Mining» more  KDD 2010»
14 years 26 days ago
Neighbor query friendly compression of social networks
Compressing social networks can substantially facilitate mining and advanced analysis of large social networks. Preferably, social networks should be compressed in a way that they...
Hossein Maserrat, Jian Pei
CCR
2010
133views more  CCR 2010»
13 years 9 months ago
The role of network trace anonymization under attack
In recent years, academic literature has analyzed many attacks on network trace anonymization techniques. These attacks usually correlate external information with anonymized data...
Martin Burkhart, Dominik Schatzmann, Brian Trammel...
COMCOM
2006
154views more  COMCOM 2006»
13 years 9 months ago
Wireless sensor networks for personal health monitoring: Issues and an implementation
Recent technological advances in sensors, low-power integrated circuits, and wireless communications have enabled the design of lowcost, miniature, lightweight, and intelligent ph...
Aleksandar Milenkovic, Chris Otto, Emil Jovanov