Creatinine-Test 发表于 2025-3-28 16:15:14

http://reply.papertrans.cn/24/2332/233129/233129_41.png

Daily-Value 发表于 2025-3-28 22:17:59

https://doi.org/10.1007/978-981-97-3153-4tation of anonymity systems is discussed. The second part of the analyses are focused on social networks. Information about user profiling, properties of identifiable social networks and their development in time are presented in the context of the security of anonymous systems.

恶心 发表于 2025-3-29 00:15:26

http://reply.papertrans.cn/24/2332/233129/233129_43.png

哭得清醒了 发表于 2025-3-29 05:38:44

http://reply.papertrans.cn/24/2332/233129/233129_44.png

expository 发表于 2025-3-29 07:15:37

http://reply.papertrans.cn/24/2332/233129/233129_45.png

harmony 发表于 2025-3-29 14:38:59

http://reply.papertrans.cn/24/2332/233129/233129_46.png

转折点 发表于 2025-3-29 15:44:07

Subramanian Senthilkannan Muthually-calculated inferred trust values using recommendations from trusted agents. The effectiveness of our method is demonstrated through simulation experiments on artificially generated social networks. The advantages and disadvantages of using this method on different kinds of Web-based knowledge sharing networks are discussed.

Anthropoid 发表于 2025-3-29 22:55:43

http://reply.papertrans.cn/24/2332/233129/233129_48.png

有危险 发表于 2025-3-30 00:14:36

Book 2012utions from a international selection of world-class experts, concentrating on topics relating to security and privacy (the other two volumes review .Tools, Perspectives, and Applications., and .Mining and Visualization. in CSNs). Topics and features: presents the latest advances in security and pri

Grating 发表于 2025-3-30 04:14:14

mulations of social networks, and the representation and analysis of social networks, with a focus on issues of security, privacy, and anonymization; provides experience reports, survey articles, and intelligence techniques and theories relating to specific problems in network technology..978-1-4471-5815-8978-1-4471-4051-1
页: 1 2 3 4 [5] 6
查看完整版本: Titlebook: Computational Social Networks; Security and Privacy Ajith Abraham Book 2012 Springer-Verlag London 2012 Ad Hoc Network Applications and Ser