Analysis and detection of fake profile over social network
Latest developments have seen exponential increase in clientele of social networks.
Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily …
Facebook has 1.5 billion users. More than 10 million likes and shares are executed daily …
Uncanny valley effects on friendship decisions in virtual social networking service
Drawing on the uncanny valley effects (UVE) hypothesis and related works on avatar-based
interactions, this study investigates the role of UVE (ie, a feeling of eeriness), induced by …
interactions, this study investigates the role of UVE (ie, a feeling of eeriness), induced by …
Your privacy information are leaking when you surfing on the social networks: A survey of the degree of online self-disclosure (DOSD)
J Ge, J Peng, Z Chen - 2014 ieee 13th international conference …, 2014 - ieeexplore.ieee.org
Surfing on the online social networks is becoming a daily experience of many modern
people. Many factors cause users to willingly share their privacy information in online social …
people. Many factors cause users to willingly share their privacy information in online social …
A secure and sustainable framework to mitigate hazardous activities in online social networks
Recent years have seen continuous exposure of online social network (OSN) users to the
security vulnerability due to socio-technical cyber hazards committed by OSN associates …
security vulnerability due to socio-technical cyber hazards committed by OSN associates …
Detecting unintentional information leakage in social media news comments
This paper is concerned with unintentional information leakage (UIL) through social
networks, and in particular, Facebook Organizations often use forms of self censorship in …
networks, and in particular, Facebook Organizations often use forms of self censorship in …
Data-flow assisted behavioral partitioning for embedded systems
In this paper we present a novel compiler-directed approach tosystem-level partitioning for a
given description of system functionalityin a hardware description language (HDL). The …
given description of system functionalityin a hardware description language (HDL). The …
Publishing and sharing encrypted data with potential friends in online social networks
H Shuai, WT Zhu, X Liu - Security and Communication …, 2014 - Wiley Online Library
Making friends by publishing and sharing personal data in a special interest group has
become popular in online social networks. Data security is a major concern, as digital …
become popular in online social networks. Data security is a major concern, as digital …
[PDF][PDF] The Relationship Between Boundary Permeability, Boundary Ownership, Boundary Linkages and Religiosity on Self-disclosure in Facebook among …
NHM Noor, NSM Nasir - ipptar.gov.my
The meteoric rise in the popularity and functionality of social networking sites (SNSs) has
provided a new magnitude for social interaction and connection. Due to this expansion …
provided a new magnitude for social interaction and connection. Due to this expansion …
News censorship in social networks: A study of circumvention in the commentsphere
We study the interplay between online news, reader comments, and social networks, to
detect and characterize a new form of unintentional information leakage-the accidental …
detect and characterize a new form of unintentional information leakage-the accidental …
[ספר][B] Friend Recommendation in Social Multimedia Networks
S Huang - 2017 - search.proquest.com
With the rapid development of computer science and internet technologies, social media
and social network has experienced explosive growth over the last decades. Social …
and social network has experienced explosive growth over the last decades. Social …