轻浮思想 发表于 2025-3-23 10:05:24

Anonymisation of Social Networks and Rough Set Approach changes in the social structure and roles of individuals in it. There are many evidences (HIPAA (2002) Health insurance portability and accountability act. Available online http://www.hhs.gov/ocr/hipaa; Lambert, J Off Stat 9:313–331, 1993; Xu (2006) Utility based anonymisation using local recording

Malfunction 发表于 2025-3-23 17:27:58

Behavioural Patterns and Social Networks in Anonymity Systemsreal-world traffic data. We perform a set of analyses targeting the behavioural patterns of users and their impact on such systems. The first part of the analyses are focused on the properties of email communication relevant to the designers of anonymous systems. The two parameters we are interested

Infiltrate 发表于 2025-3-23 18:35:12

Ajith AbrahamPresents the latest advances in security and privacy issues in computational social networks, and illustrates how both organizations and individuals can be protected from real-world threats.Discusses

moribund 发表于 2025-3-24 01:47:38

http://image.papertrans.cn/c/image/233129.jpg

Calibrate 发表于 2025-3-24 04:38:27

https://doi.org/10.1007/978-1-4471-4051-1Ad Hoc Network Applications and Services; Anonymity and Privacy; Ethical Dilemmas; Information Sharing;

Defense 发表于 2025-3-24 09:48:43

978-1-4471-5815-8Springer-Verlag London 2012

BRIDE 发表于 2025-3-24 12:44:04

Steve Evans,Lloyd Fernando,Miying Yangial network service is an online service, platform, or site that focuses on building and reflecting of social relations among people. A social network service essentially consists of a representation of each user called a ., his/her social links, and a variety of additional services. Recent years ha

组装 发表于 2025-3-24 18:18:46

http://reply.papertrans.cn/24/2332/233129/233129_18.png

漂泊 发表于 2025-3-24 21:31:31

Steve Evans,Lloyd Fernando,Miying Yangionships and often share a wealth of personal information to their own benefit. The potential privacy risks of such behavior are often underestimated or ignored. The problem is exacerbated by lacking experience and awareness in users, as well as poorly designed tools for privacy management on the pa

Projection 发表于 2025-3-25 00:10:37

http://reply.papertrans.cn/24/2332/233129/233129_20.png
页: 1 [2] 3 4 5 6
查看完整版本: Titlebook: Computational Social Networks; Security and Privacy Ajith Abraham Book 2012 Springer-Verlag London 2012 Ad Hoc Network Applications and Ser