Muutke küpsiste eelistusi

E-raamat: Securing Social Networks in Cyberspace [Taylor & Francis e-raamat]

Edited by (International Islamic University Malaysia, Kuala Lumpur)
  • Formaat: 298 pages, 6 Tables, black and white; 75 Line drawings, black and white; 25 Halftones, black and white; 100 Illustrations, black and white
  • Ilmumisaeg: 11-Oct-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003134527
  • Taylor & Francis e-raamat
  • Hind: 143,10 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Tavahind: 204,43 €
  • Säästad 30%
  • Formaat: 298 pages, 6 Tables, black and white; 75 Line drawings, black and white; 25 Halftones, black and white; 100 Illustrations, black and white
  • Ilmumisaeg: 11-Oct-2021
  • Kirjastus: CRC Press
  • ISBN-13: 9781003134527

This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues and family; sharing and posting information; managing audio, video and photos; and all other aspects of using social media sites.



This book collates the key security and privacy concerns faced by individuals and organizations who use various social networking sites. This includes activities such as connecting with friends, colleagues and family; sharing and posting information; managing audio, video and photos; and all other aspects of using social media sites both professionally and personally. In the setting of Internet of Things (IoT) that can connect millions of devices at any one time, the security of such actions is paramount. This book discusses user privacy and trust, location privacy, protecting children, managing multimedia content, cyber bullying, and much more. Current state-of-the-art defense mechanisms that can bring long-term solutions to tackling these threats, will be considered in the book.

This book can be used as a reference item for easy understanding of complex Cybersecurity issues in Social Network or Social Networking Services. It would be beneficial for the academicians and graduate level researchers mainly. Also, general readers may find it beneficial in protecting their social media related profiles.

Preface ix
Acknowledgment xi
Editor xiii
Contributors xv
PART I Protection of Personal Information in Social Networks
Chapter 1 User Awareness for Securing Social Networks
3(14)
Abhijit Bhowmik
S. M. Raihan Gafur
Abrar Rafid
Saiful Azad
Mufti Mahmud
M. Shamim Kaiser
Chapter 2 Privacy-Preserving Analytics for Social Network Data: A Survey of Currently Prevalent Tools
17(18)
Rishabh Jindal
Ahmed Falah
Adnan Anwar
Mohiuddin Ahmed
Chapter 3 Enabling Location k-Anonymity in Social Networks
35(18)
Francesco Buccafurri
Vincenzo De Angelis
Maria Francesco Idone
Cecilia Labrini
PART II Securing Multimedia Contents
Chapter 4 Automated Content Classification in Social Media Platforms
53(20)
Thomas M. Chen
Chapter 5 Steganographic Botnet C&C Channel Using Twitter
73(50)
Nicholas Pantic
Mohammad Husain
Chapter 6 A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter
123(18)
P. R. Vishnu
Basant Agarwal
P. Vinod
K. A. Dhanya
Alice Baroni
PART III Cyberbullying, Cyberstalking, and Related Issues
Chapter 7 Cyberbullying and Cyberstalking on Online Social Networks
141(22)
Umit Can
Bilal Alatas
Chapter 8 Cyberbullying Severity Detection Using Deep Learning Techniques: A Multi-Class Classification over Varied Class Balance Data
163(32)
Sharyar Wani
Khan Nasik Sami
Zian Md Afique Amin
Yonis Gulzar
Chapter 9 Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19
195(26)
Mohammad Shadab Khan
Sharyar Wani
Eima Fatima
PART IV Other Issues for Securing Social Networks and Online Profiles
Chapter 10 Profiling Online Users: Emerging Approaches and Challenges
221(20)
Mohammad Mamun
Muhammad Al-Digeil
Sherif Saad Ahmed
Chapter 11 Securing Mobile Social Networks
241(14)
Robert Gordon
Chapter 12 Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point: Limitations and Countermeasures
255(22)
Md. Tanvir Hasan
Md. Redwan Hossain
Al-Sakib Khan Pathan
Chapter 13 A Tutorial on Cross-Site Scripting Attack: Defense against Online Social Networks
277(20)
Vassilis Papaspirou
Leandros Maglaras
Mohamed Amine Ferrag
Index 297
Al-Sakib Khan Pathan is a Professor of Computer Science and Engineering. Currently, he is with the Independent University, Bangladesh as an Adjunct Professor. He received PhD degree in Computer Engineering in 2009 from Kyung Hee University, South Korea and B.Sc. degree in Computer Science and Information Technology from Islamic University of Technology (IUT), Bangladesh in 2003. His research interests include wireless sensor networks, network security, cloud computing, and e-services technologies. Currently he is also working on some multidisciplinary issues.