ScienceOpen:
research and publishing network
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
My ScienceOpen
Sign in
Register
Dashboard
Blog
About
Search
Advanced search
My ScienceOpen
Sign in
Register
Dashboard
Search
Search
Advanced search
For Publishers
Discovery
Metadata
Peer review
Hosting
Publishing
For Researchers
Join
Publish
Review
Collect
Blog
About
Done
Inviting an author to review:
SignalP 5.0 improves signal peptide predictions using deep neural networks
Find an author and click ‘
Invite to review selected article
’ near their name.
Search for authors
Search for similar articles
Invite by email
2
views
10
references
Top references
cited by
1
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,346
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Computational Intelligence in Security for Information Systems 2010
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
other
Author(s):
Carlos Laorden
,
Borja Sanz
,
Gonzalo Alvarez
,
Pablo G. Bringas
Publication date
(Print):
2010
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
Annual Reviews WHO Top Threats to Global Health
Most cited references
10
Record
: found
Abstract
: not found
Conference Proceedings
: not found
To join or not to join
Elena Zheleva
,
Lise Getoor
(2009)
0
comments
Cited
46
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Michael Kaminsky
,
Haifeng Yu
,
Phillip Gibbons
…
(2008)
0
comments
Cited
28
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
On the leakage of personally identifiable information via online social networks
Craig Wills
,
Balachander Krishnamurthy
(2009)
0
comments
Cited
22
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2010
Pages
: 135-142
DOI:
10.1007/978-3-642-16626-6_15
SO-VID:
e1ad40a1-16c2-452b-be08-61481126f169
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 3
An Incremental Density-Based Clustering Technique for Large Datasets
pp. 13
BSDT ROC and Cognitive Learning Hypothesis
pp. 25
Evolving Fuzzy Classifier for Data Mining - an Information Retrieval Approach
pp. 33
Mereotopological Analysis of Formal Concepts in Security Ontologies
pp. 43
A Multi-agent Data Mining System for Defect Forecasting in a Decentralized Manufacturing Environment
pp. 51
A Distributed Hierarchical Multi-agent Architecture for Detecting Injections in SQL Queries
pp. 61
Incorporating Temporal Constraints in the Analysis Task of a Hybrid Intelligent IDS
pp. 73
Performances of Speech Signal Biometric Systems Based on Signal to Noise Ratio Degradation
pp. 81
Lipreading Using n–Gram Feature Vector
pp. 89
Face Processing for Security: A Short Review
pp. 99
Ontologies-Based Automated Intrusion Response System
pp. 107
Semi-supervised Fingerprinting of Protocol Messages
pp. 117
Monitoring of Spatial-Aggregated IP-Flow Records
pp. 125
Improving Network Security through Traffic Log Anomaly Detection Using Time Series Analysis
pp. 135
A Threat Model Approach to Threats and Vulnerabilities in On-line Social Networks
pp. 143
An SLA-Based Approach for Network Anomaly Detection
pp. 151
Understanding Honeypot Data by an Unsupervised Neural Visualization
pp. 163
Permuted Image DCT Watermarking
pp. 173
A Developed WaterMark Technique for Distributed Database Security
pp. 183
Trident, a New Pseudo Random Number Generator Based on Coupled Chaotic Maps
pp. 191
The Impact of the SHA-3 Casting Cryptography Competition on the Spanish IT Market
pp. 203
A New Task Engineering Approach for Workflow Access Control
pp. 213
OPBUS: Fault Tolerance Against Integrity Attacks in Business Processes
pp. 223
A Key Distribution Scheme for Live Streaming Multi-tree Overlays
pp. 231
Intelligent Methods for Scheduling in Transportation
Similar content
2,346
Fish conservation in freshwater and marine realms: status, threats and management
Authors:
Angela H Arthington
,
Ian J. Winfield
,
William Gladstone
…
A Novel Experience-Driven and Federated Intelligent Threat-Defense Framework in IoMT
Authors:
Bushra Tahir
,
Alireza Jolfaei
,
Muhammad Tariq
Threats To The Lepidoptera and Self-Defence Against It
Authors:
Shauri Sulakhe
See all similar
Cited by
1
Supervised machine learning for the detection of troll profiles in twitter social network: application to a real case of cyberbullying
Authors:
Patxi Galán-García
,
José Gaviria De La Puerta
,
Carlos Laorden Gómez
…
See all cited by