Sciweavers

6696 search results - page 88 / 1340
» Securing social networks
Sort
View
WWW
2010
ACM
14 years 5 months ago
Predicting positive and negative links in online social networks
We study online social networks in which relationships can be either positive (indicating relations such as friendship) or negative (indicating relations such as opposition or ant...
Jure Leskovec, Daniel P. Huttenlocher, Jon M. Klei...
IS
2007
13 years 10 months ago
Security Attack Testing (SAT) - testing the security of information systems at design time
For the last few years a considerable number of efforts have been devoted into integrating security issues into information systems development practices. This has led to a number...
Haralambos Mouratidis, Paolo Giorgini
LOCA
2007
Springer
14 years 4 months ago
SocialMotion: Measuring the Hidden Social Life of a Building
In this paper we present an approach to analyzing the social behaviors that occur in a typical office space. We describe a system consisting of over 200 motion sensors connected ...
Christopher Richard Wren, Yuri A. Ivanov, Ishwinde...
ASUNAM
2010
IEEE
13 years 11 months ago
Detecting Highly Overlapping Communities with Model-Based Overlapping Seed Expansion
Abstract--As research into community finding in social networks progresses, there is a need for algorithms capable of detecting overlapping community structure. Many algorithms hav...
Aaron McDaid, Neil Hurley
CCS
2007
ACM
14 years 4 months ago
Towards a taxonomy for information security metrics
Systematic approaches to measuring security are needed in order to obtain evidence of the security performance of products or an organization. In this study we survey the emerging...
Reijo Savola