Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.

LEADER 00000cam a2200769Mi 4500 
001    988947732 
003    OCoLC 
005    20240129213017.0 
006    m     o  d         
007    cr ||||||||||| 
008    160404s2016    flua    ob    001 0 eng d 
015    GBB659140|2bnb 
016 7  017817807|2Uk 
020    9781482243284|q(PDF ebook) 
020    1482243288|q(PDF ebook) 
020    |q(hbk.) 
029 1  UKMGB|b017817807 
029 1  AU@|b000060010247 
035    (OCoLC)988947732 
037    TANDF_365822|bIngram Content Group 
040    NLE|beng|erda|epn|cNLE|dOCLCO|dOCLCQ|dOCLCF|dOCLCQ|dUWW
       |dLVT|dESU|dUKAHL|dUKMGB|dOCLCO|dOCLCA 
049    INap 
082 04 006.754 
082 04 006.754|223 
099    eBook O'Reilly for Public Libraries 
100 1  Thuraisingham, Bhavani M.,|eauthor. 
245 10 Analyzing and securing social networks /|cBhavani 
       Thuraisingham [and five others].|h[O'Reilly electronic 
       resource] 
250    1st. 
264  1 Boca Raton :|bAuerbach,|c2016. 
300    1 online resource :|billustrations (black and white) 
336    text|btxt|2rdacontent 
336    still image|bsti|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
504    Includes bibliographical references and index. 
505 0  Introduction ; Overview; Analyzing Social Networks; 
       Securing Social Networks; Outline of the Book; Next Steps;
       ; SUPPORTING TECHNOLOGIES; ; Social Networks: A Survey ; 
       Introduction; Survey of Social Networks; Details of Four 
       Popular Social Networks; Summary and Conclusion; ; Data 
       Security and Privacy; Overview; Security Policies; Policy 
       Enforcement and Related Issues; Data Privacy; Summary and 
       Directions; References; ; Data Mining Techniques; 
       Introduction; Overview of Data Mining Tasks and 
       Techniques; Artificial Neural Networks; Support Vector 
       Machines; Markov Model; Association Rule Mining (ARM); 
       Multiclass Problem; Image Mining; Summary; References; ; 
       Cloud Computing and Semantic Web Technologies; 
       Introduction; Cloud Computing; Semantic Web; Semantic Web 
       and Security; Cloud Computing Frameworks Based on Semantic
       Web Technologies; Summary and. 
505 0  Directions; References; ; ASPECTS OF ANALYZING AND 
       SECURING SOCIAL NETWORKS; ; Analyzing and Securing Social 
       Networks; Introduction; Applications in Social Media 
       Analytics; Data Mining Techniques for SNA; Security and 
       Privacy; Summary and Directions; References; ; Semantic 
       Web-Based Social Network Representation and Analysis; 
       Introduction; Social Network Representation; Our Approach 
       to Social Network Analysis; Summary and Directions; 
       Reference; ; Confidentiality, Privacy, and Trust for 
       Social Media Data; Introduction; Trust, Privacy, 
505 0  And Confidentiality; CPT Framework; Our Approach to 
       Confidentiality Management; Privacy for Social Networks; 
       Trust for Social Networks; Integrated System; CPT within 
       the Context of Social Networks; Summary and Directions; 
       References; ; TECHNIQUES AND TOOLS FOR SOCIAL NETWORK 
       ANALYTICS; ; Developments and Challenges in Location 
       Mining; Introduction; Key Aspects of Location Mining; 
       Efforts in Location Mining; Challenges in Location Mining;
       Geospatial Proximity and Friendship; Our Contributions to 
       Location Mining; Summary and Directions; References; ; 
       TweetHood: A Social Media Analytics Tool; Introduction; 
       TweetHood; Experiments and Results; Summary and 
       Directions; References; ; Tweecalization: Location Mining 
       Using Semisupervised Learning; Introduction; 
       Tweecalization; Trustworthiness and Similarity Measure; 
       Experiments and Results; Summary and Directions; 
       References; ; Tweeque: Identifying. 
505 0  Social Cliques for Location Mining; Introduction; Effect 
       of Migration; Temporal Data Mining; Social Clique 
       Identification; Experiments and Results; Location 
       Prediction; Agglomerative Hierarchical Clustering; MapIt: 
       Location Mining from Unstructured Text; Summary and 
       Directions; References; ; Understanding News Queries with 
       Geo-Content Using Twitter; Introduction; Application of 
       Location Mining and Social Networks for Improving Web 
       Search; Assigning Weights to Tweets; Semantic Similarity; 
       Experiments and Results; Summary and Directions; 
       References; ; SOCIAL NETWORK ANALYTICS AND PRIVACY 
       CONSIDERATIONS; ; Our Approach to Studying Privacy in 
       Social Networks; Introduction; Related Work; Definitional 
       Preliminaries; Analysis; Data Gathering; Summary and 
       Directions; References; ; Classification of Social 
       Networks Incorporating Link Types; Introduction; Related 
       Work; Learning. 
505 0  Methods; Experiments; Results; Summary and Directions; 
       References; ; Extending Classification of Social Networks 
       through Indirect Friendships; Introduction; Related Work 
       and Our Contributions; Definitions; Our Approach; 
       Experiments and Results; Summary and Directions; 
       References; ; Social Network Classification through Data 
       Partitioning; Introduction; Related Work and Our 
       Contributions; Metrics; Distributed Social Network 
       Classification; Experiments; Summary and Directions; 
       References; ; Sanitization of Social Network Data for 
       Release to Semitrusted Third Parties; Introduction; 
       Learning Methods on Social Networks; Hiding Private 
       Information; Experiments; Effect of Sanitization on Other 
       Attack Techniques; Effect of Sanitization on Utility; 
       Summary and Directions; References; ; ACCESS CONTROL AND 
       INFERENCE FOR SOCIAL NETWORKS; ; Access Control for 
       Social. 
505 0  Networks; Introduction; Related Work; Modeling Social 
       Networks Using Semantic Web Technologies; Security 
       Policies for OSNs; Security Policy Specification; Security
       Rule Enforcement; Summary and Directions; References; ; 
       Implementation of an Access Control System for Social 
       Networks; Introduction; Security in Online Social 
       Networks; Framework Architecture; Experiments; Summary and
       Directions; References; ; Inference Control for Social 
       Media; Overview; Design of an Inference Controller; 
       Inference Control through Query Modification; Application 
       to Social Media Data; Summary and Directions; References; 
       ; Implementing an Inference Controller for Social Media 
       Data; Overview; Inference and Provenance; Implementation 
       of the Inference Controller; Generators; Use Case: Medical
       Example; Implementing Constraints; Summary and Directions;
       References; ; SOCIAL MEDIA INTEGRATION AND ANALYTICS. 
505 0  And Efficient RDF Triple Store; StormRider: Harnessing 
       Storm for Social Networks; Ontology-Driven Query Expansion
       Using MapReduce Framework; Summary and Directions; 
       References; ; Experimental Cloud Query Processing System 
       for Social Networks; Introduction; Our Approach; Related 
       Work; Architecture; MapReduce Framework; Results Summary 
       and Directions; References; ; Social Networking in the 
       Cloud; Introduction; Foundational Technologies for SNODSOC
       ++; Design of SNODSOC; Toward SNODSOC++; Cloud-Based 
       Social Network Analysis; StormRider: Harnessing Storm for 
       Social Networks; Related Work; Summary and Directions; 
       References; ; SOCIAL MEDIA APPLICATION SYSTEMS; ; Graph 
       Mining for Insider Threat Detection; Introduction; 
       Challenges, Related Work, 
505 0  And Our Approach; Graph Mining for Insider Threat 
       Detection; Comprehensive Framework; Summary and 
       Directions; References; ; Temporal Geosocial Mobile 
       Semantic Web; Introduction; Challenges for a Successful 
       SARO; Supporting Technologies for SARO; Our Approach to 
       Building a SARO System; Conclusion; References; ; Social 
       Media and Bioterrorism; Introduction; Simulating 
       Bioterrorism through Epidemiology Abstraction; On the 
       Mitigation of Bioterrorism through the Game Theory; 
       Summary and Directions; References; ; Stream Data 
       Analytics for Multipurpose Social Media Applications; 
       Introduction; Our Premise; Modules of InXite; Other 
       Applications; Related Work; Summary and Directions; 
       References; ; SECURE SOCIAL MEDIA SYSTEMS; ; Secure Cloud 
       Query Processing with Relational Data for Social Media; 
       Overview; Related Work; System Architecture; 
       Implementation Details and Results; Summary and. 
505 0  Directions; References; ; Secure Cloud Query Pro. 
520 8  Analyzing and Securing Social Networks focuses on the two 
       major technologies that have been developed for online 
       social networks (OSNs): (i) data mining technologies for 
       analyzing these networks and extracting useful information
       such as location, demographics, and sentiments of the 
       participants of the network, and (ii) security and privacy
       technologies that ensure the privacy of the participants 
       of the network as well as provide controlled access to the
       information posted and exchanged by the participants. The 
       authors explore security and privacy issues for social 
       media systems, analyze such systems, and discuss 
       prototypes they have developed for social media systems 
       whose data are represented using semantic web 
       technologies. These experimental systems have been 
       developed at The University of Texas at Dallas. The 
       material in this book, together with the numerous 
       references listed in each chapter, have been used for a 
       graduate-level course at The University of Texas at Dallas
       on analyzing and securing social media. Several 
       experimental systems developed by graduate students are 
       also provided. The book is divided into nine main sections
       : (1) supporting technologies, (2) basics of analyzing and
       securing social networks, (3) the authors' design and 
       implementation of various social network analytics tools, 
       (4) privacy aspects of social networks, (5) access control
       and inference control for social networks, (6) 
       experimental systems designed or developed by the authors 
       on analyzing and securing social networks, (7) social 
       media application systems developed by the authors, (8) 
       secure social media systems developed by the authors, and 
       (9) some of the authors' exploratory work and further 
       directions. 
588 0  CIP data; item not viewed. 
590    O'Reilly|bO'Reilly Online Learning: Academic/Public 
       Library Edition 
650  0 Online social networks|xSecurity measures. 
650  0 Web usage mining. 
650  0 Data protection. 
650  0 Computer crimes|xPrevention. 
650  0 Privacy, Right of. 
650  6 Réseaux sociaux (Internet)|xSécurité|xMesures. 
650  6 Analyse du comportement des internautes. 
650  6 Protection de l'information (Informatique) 
650  7 Computer crimes|xPrevention.|2fast|0(OCoLC)fst00872068 
650  7 Data protection.|2fast|0(OCoLC)fst00887958 
650  7 Privacy, Right of.|2fast|0(OCoLC)fst01077444 
650  7 Web usage mining.|2fast|0(OCoLC)fst01173271 
700 1  Abrol, Satyen,|eauthor. 
700 1  Heatherly, Raymond,|eauthor. 
700 1  Kantarcioglu, Murat,|eauthor. 
700 1  Khadilkar, Vaibhav,|eauthor. 
700 1  Khan, Latifur,|eauthor. 
776 08 |iPrint version :|z9781482243277 
856 40 |uhttps://ezproxy.naperville-lib.org/login?url=https://
       learning.oreilly.com/library/view/~/9781482243284/?ar
       |zAvailable on O'Reilly for Public Libraries 
938    Askews and Holts Library Services|bASKH|nAH29505904 
994    92|bJFN