𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Social Network Forensics, Cyber Security, and Machine Learning

✍ Scribed by P. Venkata Krishna, Sasikumar Gurumoorthy, Mohammad S. Obaidat


Publisher
Springer Singapore
Year
2019
Tongue
English
Leaves
121
Series
SpringerBriefs in Applied Sciences and Technology
Edition
1st ed.
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book discusses the issues and challenges in Online Social Networks (OSNs). It highlights various aspects of OSNs consisting of novel social network strategies and the development of services using different computing models. Moreover, the book investigates how OSNs are impacted by cutting-edge innovations.

✦ Table of Contents


Front Matter ....Pages i-viii
Classifying Content Quality and Interaction Quality on Online Social Networks (Amtul Waheed, Jana Shafi, P. Venkata Krishna)....Pages 1-7
Population Classification upon Dietary Data Using Machine Learning Techniques with IoT and Big Data (Jangam J. S. Mani, Sandhya Rani Kasireddy)....Pages 9-27
Investigating Recommender Systems in OSNs (Jana Shafi, Amtul Waheed, P. Venkata Krishna)....Pages 29-44
A Methodology for Processing Opinion Mining on GST in India from Social Media Data Using Recursive Neural Networks and Maximum Entropy Techniques (N. V. Muthu Lakshmi, T. Lakshmi Praveena)....Pages 45-57
A Framework for Sentiment Analysis Based Recommender System for Agriculture Using Deep Learning Approach (Pradeepthi Nimirthi, P. Venkata Krishna, Mohammad S. Obaidat, V. Saritha)....Pages 59-66
A Review on Crypto-Currency Transactions Using IOTA (Technology) (Kundan Dasgupta, M. Rajasekhara Babu)....Pages 67-81
Predicting Ozone Layer Concentration Using Machine Learning Techniques (Aditya Sai Srinivas, Ramasubbareddy Somula, K. Govinda, S. S. Manivannan)....Pages 83-92
Graph Analysis and Visualization of Social Network Big Data (N. Mithili Devi, Sandhya Rani Kasireddy)....Pages 93-104
Research Challenges in Big Data Solutions in Different Applications (Bhawna Dhupia, M. Usha Rani)....Pages 105-116

✦ Subjects


Engineering; Computational Intelligence; Big Data; Mathematical Models of Cognitive Processes and Neural Networks; Signal, Image and Speech Processing; Information Systems Applications (incl.Internet)


πŸ“œ SIMILAR VOLUMES


Privacy-Preserving Machine Learning (Spr
✍ Jin Li, Ping Li, Zheli Liu, Xiaofeng Chen, Tong Li πŸ“‚ Library πŸ“… 2022 πŸ› Springer 🌐 English

<p><span>This book provides a thorough overview of the evolution of privacy-preserving machine learning schemes over the last ten years, after discussing the importance of privacy-preserving techniques. In response to the diversity of Internet services, data services based on machine learning are no

Cyber Security Cryptography and Machine
✍ Itai Dinur, Shlomi Dolev, Sachin Lodha πŸ“‚ Library πŸ“… 2018 πŸ› Springer International Publishing 🌐 English

<p><p>This book constitutes the refereed proceedings of the Second International Symposium on Cyber Security Cryptography and Machine Learning, CSCML 2018, held in Beer-Sheva, Israel, in June 2018.</p><p>The 16 full and 6 short papers presented in this volume were carefully reviewed and selected fro

Machine Learning for Authorship Attribut
✍ Farkhund Iqbal, Mourad Debbabi, Benjamin C. M. Fung πŸ“‚ Library πŸ“… 2020 πŸ› Springer International Publishing;Springer 🌐 English

<p><p>The book first explores the cybersecurity’s landscape and the inherent susceptibility of online communication system such as e-mail, chat conversation and social media in cybercrimes. Common sources and resources of digital crimes, their causes and effects together with the emerging threats fo

Cyber Security Meets Machine Learning
✍ Xiaofeng Chen, Willy Susilo, Elisa Bertino πŸ“‚ Library πŸ“… 2021 πŸ› Springer 🌐 English

<p>Machine learning boosts the capabilities of security solutions in the modern cyber environment. However, there are also security concerns associated with machine learning models and approaches: the vulnerability of machine learning models to adversarial attacks is a fatal flaw in the artificial i

Machine Learning for Cyber Security
✍ Preeti Malik, Lata Nautiyal, Mangey Ram πŸ“‚ Library πŸ“… 2022 πŸ› De Gruyter 🌐 English

<p><span>Without mathematics no science would survive. This especially applies to the engineering sciences which highly depend on the applications of mathematics and mathematical tools such as optimization techniques, finite element methods, differential equations, fluid dynamics, mathematical model

Machine Learning for Cyber Security
πŸ“‚ Library πŸ“… 2023 πŸ› Springer International Publishing 🌐 English

<div>The three-volume proceedings set LNCS 13655,13656 and 13657 constitutes the refereed</div><div>proceedings of the 4th International Conference on Machine Learning for Cyber Security, ML4CS 2022, which taking place during December 2-4, 2022, held in Guangzhou, China.</div><div></div><div>The 100