[HTML][HTML] Considering weights in real social networks: A review

M Bellingeri, D Bevacqua, F Sartori, M Turchetto… - Frontiers in …, 2023 - frontiersin.org
Network science offers powerful tools to model complex social systems. Most social network
science research focuses on topological networks by simply considering the binary state of …

Social authentication applications, attacks, defense strategies and future research directions: a systematic review

N Alomar, M Alsaleh, A Alarifi - IEEE Communications Surveys …, 2017 - ieeexplore.ieee.org
The ever-increasing volumes of social knowledge shared in online social networks, the
establishment of trustworthy social relationships over these platforms, and the emergence of …

Detection of human, legitimate bot, and malicious bot in online social networks based on wavelets

SB Jr, GFC Campos, GM Tavares, RA Igawa… - ACM Transactions on …, 2018 - dl.acm.org
Social interactions take place in environments that influence people's behaviours and
perceptions. Nowadays, the users of Online Social Network (OSN) generate a massive …

Research in social media: Data sources and methodologies

RS Debreceny, T Wang, M Zhou - Journal of information …, 2019 - publications.aaahq.org
This paper examines both the opportunities and limitations in the use of social media for
accounting research. Given the dynamic nature of social media and the richness of the …

Online social networks security: Threats, attacks, and future directions

J Alqatawna, A Madain, AM Al-Zoubi… - Social media shaping e …, 2017 - Springer
A list of well-known Online Social Networks extend to hundreds of available sites with
hundreds of thousands, millions, and even billions of registered accounts; for instance …

[HTML][HTML] k-NDDP: An Efficient Anonymization Model for Social Network Data Release

S Shakeel, A Anjum, A Asheralieva, M Alam - Electronics, 2021 - mdpi.com
With the evolution of Internet technology, social networking sites have gained a lot of
popularity. People make new friends, share their interests, experiences in life, etc. With …

A machine learning framework for security and privacy issues in building trust for social networking

RS Bhadoria, N Bhoj, MK Srivastav, R Kumar… - Cluster …, 2023 - Springer
Technological advancement has led to a dynamic change in how people interact. The
interaction can be classified as—social networks (virtual) and real-life (physical) interaction …

I am at home: spatial privacy concerns with social media check-ins

J Ajayakumar, K Ghazinour - Procedia computer science, 2017 - Elsevier
Abstract Inclusion of Location Based Services (LBS) on social media including geo-tagging,
and check-ins has been on the rise. Users share their location information, motivated by self …

Knowledge‐based approaches for identity management in online social networks

L Bahri, B Carminati, E Ferrari - Wiley Interdisciplinary Reviews …, 2018 - Wiley Online Library
When we meet a new person, we start by introducing ourselves. We share our names, and
other information about our jobs, cities, family status, and so on. This is how socializing and …

A risk evaluation approach for authorization decisions in social pervasive applications

A Ali-Eldin, J van den Berg, HA Ali - Computers & Electrical Engineering, 2016 - Elsevier
Most research in social networks has focused on the assumption that unknown entities are
malicious and thus the traditional approach was to detect them and deny their access to …