Без темы
<<  Analyze Opportunity Part 1 Analyzing mathematical texts with parts of Greimas semiotic theory  >>
Картинок нет
Картинки из презентации «Analyzing and Securing Social Networks» к уроку на тему «Без темы»

Автор: Chris Clifton. Чтобы познакомиться с картинкой полного размера, нажмите на её эскиз. Чтобы можно было использовать все картинки для урока , скачайте бесплатно презентацию «Analyzing and Securing Social Networks.ppt» со всеми картинками в zip-архиве размером 145 КБ.

Analyzing and Securing Social Networks

содержание презентации «Analyzing and Securing Social Networks.ppt»
Сл Текст Сл Текст
1Analyzing and Securing Social 19Identification in Social Networks. 237-242
Networks. Dr. Bhavani Thuraisingham The Frank Nagle, Lisa Singh: Can Friends Be
University of Texas at Dallas Introduction Trusted? Exploring Privacy in Online
to the Course January 18, 2013. Social Networks. 312-315.
2Objective of the Unit. This unit 20Papers to Read for March 29, 2013.
provides an overview of the course. The Nico Schlitter, Tanja Falkowski: Mining
course describes concepts, developments, the Dynamics of Music Preferences from a
challenges, and directions in analyzing Social Networking Site. 243-248 Joseph
social networks and securing social Bonneau, Jonathan Anderson, George
networks Recommended Book for first part Danezis: Prying Data out of a Social
of the course: Social Networks and the Network. 249-254 Petros Xanthopoulos,
Semantic Web by Peter Mika, Springer 2007 Ashwin Arulselvan, Vladimir Boginski,
Focus for second part of the course Panos M. Pardalos: A Retrospective Review
Selected papers on Analyzing and Securing of Social Networks. 300-305 Sampson Pun,
Social Networks from the ACM/IEEE ASONAM Amir H. Chinaei, Ken Barker: Twins (1):
Conferences 2009-2012. Extending SQL to Support Corporation
3Outline of the Unit. Outline of Course Privacy Policies in Social Networks.
Course Work Course Rules Contact Appendix. 306-311.
4Course Schedule. January 18, 2013 21IEEE/ACM Joint Conference Advances in
Intro to course, Intro to social networks, Social Network Analysis and Mining, 2010
Intro to cyber security January 25, 2013 (ASONAM). Papers to Read for April 5,
Intro to semantic web, Intro to data, info 2013.
and knowledge management February 1, 2013 22Papers to Read for April 5, 2013. Lyta
Data analytics, Social network analysis Penna, Andrew Clark, George M. Mohay: A
system example February 8-March1, 2013 Framework for Improved Adolescent and
Chapters from the book by Peter Mika Child Safety in MMOs. 33-40 B. K.
Additional Topics: XML Security, Tripathy, G. K. Panda: A New Approach to
Hadoop/MapReduce /Cloud; Location mining Manage Security against Neighborhood
in social networks, Security and Privacy Attacks in Social Networks. 264-269 P?l
for social networks March 1, 2013 – Roe Sunds?y, Johannes Bjelland, Geoffrey
Lectures, review for exam #1 March 8, Canright, Kenth Eng?-Monsen, Rich Ling:
2013: Exam #1. Product Adoption Networks and Their Growth
5Course Schedule. March 15, 2013: in a Large Mobile Phone Network. 208-216.
Spring Break March 22, 2013 –Insider 23Papers to Read for April 5, 2013. M.
Threat Analysis (modeling insider Saravanan, Garigipati Prasad, Karishma
communication as graphs); Helpful Surana, D. Suganthi: Labeling Communities
suggestions for Programming Project Using Structural Properties. 217-224 Uffe
(StormRider, JenaHbase, SPARQL query Kock Wiil, Jolanta Gniadek, Nasrullah
processing in the cloud) March 29 – April Memon: Measuring Link Importance in
12, 2013 Lectures, Selected papers to read Terrorist Networks. 225-232 Thomas
and present in class (ASONAM 2009, 2010, Couronn?, Alina Stoica, Jean-Samuel
2011) April 19, 2013 – Guest Lectures Beuscart: Online Social Network Popularity
April 26, 2013 – Selected papers, to read Evolution: An Additive Mixture Model.
and present in class (ASONAM 2012) May 3, 346-350 M. Omair Shafiq, Reda Alhajj, Jon
2013: Lectures, Review for exam #2 May 10, G. Rokne: Community Aware Personalized Web
2013: Exam #2. Search. 351-355.
6Tentative Schedule. Assignment #1 due 24IEEE/ACM Joint Conference Advances in
date: February 15, 2013 Assignment #2: due Social Network Analysis and Mining, 2011
date: March 1, 2013 (new date: March 22, (ASONAM). Papers to Read for April 12,
2013) Term Paper #1: February 22, 2013 2013.
Exam #1: March 8, 2013 Assignment #3: 25Papers to Read for April 12, 2013.
March 29, 2013 (new date: April 5, 2013) Bruce M. Kapron, Gautam Srivastava, S.
Term paper #2: April 12, 2013 (new date: Venkatesh: Social Network Anonymization
April 19, 2013) Assignment #4: April 19, via Edge Addition. 155-162 Guido Barbian:
2013 ( new date: April 26, 2013) Assessing Trust by Disclosure in Online
Programming Project: May 3, 2013 Exam #2: Social Networks. 163-170 Mohammad A.
May 10, 2013. Tayebi, Laurens Bakker, Uwe Gl?sser, Vahid
7Course Work. Two term papers; each Dabbaghian: Locating Central Actors in
worth 8 points Two exams each worth 24 Co-offending Networks. 171-179 Hsin-Chang
points Programming project worth 12 points Yang, Chung-Hong Lee: Post-Level Spam
Four homework assignments each worth 6 Detection for Social Bookmarking Web
points Total 100 points. Sites. 180-185 Sean Chester, Gautam
8Course Rules. Course attendance is Srivastava: Social Network Privacy for
mandatory; unless permission is obtained Attribute Disclosure Attacks. 445-449.
from instructor for missing a class with a 26Papers to Read for April 12, 2013.
valid reason (documentation needed for Kyung Soo Cho, Jae Yoel Yoon, Iee Joon
medical emergency for student or a close Kim, Ji Yeon Lim, Seung Kwan Kim, Ung-Mo
family member – e.g., spouse, parent, Kim: Mining Information of Anonymous User
child). Attendance will be collected every on a Social Network Service. 450-453
lecture. 3 points will be deducted out of Jenq-Haur Wang, Ming-Sheng Lin: Using
100 for each lecture missed without Inter-comment Similarity for Comment Spam
approval. Each student will work Detection in Chinese Blogs. 189-194
individually Late assignments will not be Ruaylong Lee, Roozbeh Nia, Jason Hsu, Karl
accepted. All assignments have to be N. Levitt, Jeff Rowe, Shyhtsun Felix Wu,
turned in just after the lecture on the Shaozhi Ye: Design and Implementation of
due date No make up exams unless student FAITH, An Experimental System to Intercept
can produce a medical certificate or give and Manipulate Online Social Informatics.
evidence of close family emergency Copying 195-202 Koji Maruhashi, Fan Guo, Christos
material from other sources will not be Faloutsos: MultiAspectForensics: Pattern
permitted unless the source is properly Mining on Large-Scale Heterogeneous
referenced Any student who plagiarizes Networks with Tensor Analysis. 203-210.
from other sources will be reported to the 27IEEE/ACM Joint Conference Advances in
appropriate UTD authroities. Social Network Analysis and Mining, 2012
9Contact. For more information please (ASONAM). Papers to Read for April 26,
contact Dr. Bhavani Thuraisingham 2013.
Professor of Computer Science and Director 28Papers to Read for April 26, 2013.
of Cyber Security Research Center Erik Anna Leontjeva, Konstantin Tretyakov, Jaak
Jonsson School of Engineering and Computer Vilo, Taavi Tamkivi: Fraud Detection:
Science EC31, The University of Texas at Methods of Analysis for Hypergraph Data.
Dallas Richardson, TX 75080 Phone: 1060-1064 Anshu Malhotra, Luam C. Totti,
972-883-4738 Fax: 972-883-2399 Email: Wagner Meira Jr., Ponnurangam Kumaraguru,
bhavani.thuraisingham@utdallas.edu Virgilio Almeida: Studying User Footprints
URL:http://www.utdallas.edu/~bxt043000/. in Different Online Social Networks.
10Assignment #1: Given 2/8/2013; Due: 1065-1070 Mauro Conti, Radha Poovendran,
2/15/2013. Describe how Semantic Web Marco Secchiero: FakeBook: Detecting Fake
Technologies may be used to represent and Profiles in On-Line Social Networks.
reason about Social Networks. Describe 1071-1078 Ali Nazemian, Hoda Gholami,
with examples how Data Mining techniques Fattaneh Taghiyareh: An Improved Model of
may be used to analyze social networks. Trust-aware Recommender Systems Using
11Assignment #2: Given 3/1/2013; Due: Distrust Metric. 1079-1084.
3/22/2013 Prepare answers to help you in 29Papers to Read for April 26, 2013. Yue
Exam #1. Describe with an example Wang, Xintao Wu, Jun Zhu, Yang Xiang: On
application for enforcing access control Learning Cluster Coefficient of Private
policies in online social networks Networks. 395-402 Evangelos E.
Describe an approach that would determine Papalexakis, Alex Beutel, Peter
whether the data in a social network Steenkiste: Network Anomaly Detection
violates the privacy of an individual Using Co-clustering. 403-410 Christine
Describe how web services may be used to Task, Chris Clifton: A Guide to
design an on-line social network and show Differential Privacy Theory in Social
how XACML standard may be used for access Network Analysis. 411-417 Sean Chester,
control. Jared Gaertner, Ulrike Stege, S.
12Assignment #3: Given 3/29/2013; Due: Venkatesh: Anonymizing Subsets of Social
4/5/2013. Describe with examples how large Networks with Degree Constrained
graphs could be used to model Subgraphs. 418-422 Maria Eleni Skarkala,
communication between individuals and Manolis Maragoudakis, Stefanos Gritzalis,
analyzed so that insider threats can be Lilian Mitrou, Hannu Toivonen, Pirjo Moen:
detected Select a privacy preserving data Privacy Preservation by k-Anonymization of
mining techniques (e.g., randomization, Weighted Social Networks. 423-428 ?zg?r
perturbation) and explain how it can be Kafali, Akin G?nay, Pinar Yolum: PROTOSS:
applied to social networks. A Run Time Tool for Detecting Privacy
13Assignment #4: Given 4/12/2013; Due: Violations in Online Social Networks.
4/26//2013. 1. Write a critique of the 429-433.
paper Preventing Private Information 30Index to Lectures for Exam #2. Lecture
Inference Attacks on Social Networks This 16: Insider Threat Detection (Guidance to
paper appears in: Knowledge and Data assignment) Lecture 17: SPARQL Query
Engineering, IEEE Transactions on Processing in the Cloud (Guidance to
Author(s): Heatherly, R. Vanderbilt assignment Lecture 18: Jena-Hbase
University, Nashville Kantarcioglu, M.; (Guidance to assignment) Lecture 19:
Thuraisingham, B. Paper is on the IEEE StormRider (Guidance to assignment)
Explorer web site 2. Give your views on Lecture 20: ASONAM 2009 (March 29) Lecture
our (Dr. Bhavani’s team) Sentiment 21: Dr. Abrol ‘s presentation on sentiment
Analysis web site analysis Lecture 22: ASONAM 2010 (April 5)
http://dml.utdallas.edu/SentimentMining/ . Lecture 23: ASONAM 2011 (April 12) Lecture
14Papers to Read for Exam #1. Satyen 24: Guest Lectures, Mahut Lecture 25:
Abrol, Latifur Khan: Tweethood: ASONAM 2012 (April 26) Lecture 26: Dr.
Agglomerative Clustering on Fuzzy Mohan lecture, Revie.
k-Closest Friends with Variable Depth for 31Papers to Read for Exam #2. Shin-Yan
Location Mining. SocialCom/PASSAT 2010: Chiou, Shih-Ying Chang, Ghita Mezzour,
153-160 Elisa Bertino, Barbara Carminati, Adrian Perrig, Hung-Min Sun: A Trustable
Elena Ferrari, Bhavani M. Thuraisingham, Reputation Scheme Based on Private
Amar Gupta: Selective and Authentic Relationships. 19-24 David Kinzel, Micah
Third-Party Distribution of XML Documents. Klettke, Paul Uppal, Naheed Visram, Keivan
IEEE Trans. Knowl. Data Eng. 16(10): Kianmehr, Reda Alhajj, Jon G. Rokne: The
1263-1278 (2004) (upto section 6) Barbara Economic Benefits of Web Mining. 25-32
Carminati, Elena Ferrari, Raymond Jiyang Chen, Osmar R. Za?ane, Randy
Heatherly, Murat Kantarcioglu, Bhavani M. Goebel: Local Community Identification in
Thuraisingham: A semantic web based Social Networks. 237-242 Nico Schlitter,
framework for social network access Tanja Falkowski: Mining the Dynamics of
control. SACMAT 2009: 177-186. Music Preferences from a Social Networking
15Useful optional papers to read on Site. 243-248 Joseph Bonneau, Jonathan
Security and Access Control that would Anderson, George Danezis: Prying Data out
help. Some useful papers on policy and of a Social Network. 249-254.
access control (especially the paper on 32Papers to Read for Exam #2. Lyta
RBAC) RBAC: Ravi S. Sandhu, Edward J. Penna, Andrew Clark, George M. Mohay: A
Coyne, Hal L. Feinstein, Charles E. Framework for Improved Adolescent and
Youman: Role-Based Access Control Models. Child Safety in MMOs. 33-40 B. K.
IEEE Computer 29(2): 38-47 (1996) UCON: Tripathy, G. K. Panda: A New Approach to
Jaehong Park, Ravi S. Sandhu: The UCONABC Manage Security against Neighborhood
usage control model. ACM Trans. Inf. Syst. Attacks in Social Networks. 264-269 P?l
Secur. 7(1): 128-174 (2004) - Read the Roe Sunds?y, Johannes Bjelland, Geoffrey
first 20 pages (sections 1, 2, 3) DCON: Canright, Kenth Eng?-Monsen, Rich Ling:
Roshan K. Thomas, Ravi S. Sandhu: Towards Product Adoption Networks and Their Growth
a Multi-dimensional Characterization of in a Large Mobile Phone Network. 208-216
Dissemination Control. POLICY 2004: Thomas Couronn?, Alina Stoica, Jean-Samuel
197-200 (IEEE) Privacy: Rakesh Agrawal, Beuscart: Online Social Network Popularity
Ramakrishnan Srikant: Privacy-Preserving Evolution: An Additive Mixture Model.
Data Mining. SIGMOD Conference 2000: 346-350 M. Omair Shafiq, Reda Alhajj, Jon
439-450 Information on the web on XACML G. Rokne: Community Aware Personalized Web
and Attribute-based access control. Search. 351-355.
16Index to Lectures for Exam #1. Lecture 33Papers to Read for Exam #2. Bruce M.
1 – Introduction to Social networks Kapron, Gautam Srivastava, S. Venkatesh:
Lecture 2 – Cyber Security Modules Lecture Social Network Anonymization via Edge
3 – Data and Applications Security Lecture Addition. 155-162 Guido Barbian: Assessing
4 – Data, Information and Knowledge Trust by Disclosure in Online Social
Management Lecture 5 – Semantic Web Networks. 163-170 Mohammad A. Tayebi,
Lecture 6 – Data Mining Lecture 7 – Laurens Bakker, Uwe Gl?sser, Vahid
Location based Social Networks Lecture 8 – Dabbaghian: Locating Central Actors in
Semantic Web and Social Networks (Chapter Co-offending Networks. 171-179 Sean
1 and 2) Lecture 9 – Secure Third Party Chester, Gautam Srivastava: Social Network
Publication of XML Data Lecture 10 – Privacy for Attribute Disclosure Attacks.
Representing and Analyzing Social Networks 445-449 Kyung Soo Cho, Jae Yoel Yoon, Iee
(Chapter 3, 4, 5, 6) Lecture 11 – Joon Kim, Ji Yeon Lim, Seung Kwan Kim,
Hadoop/MapReduce Framework for possible Ung-Mo Kim: Mining Information of
programming project. Anonymous User on a Social Network
17Index to Lectures for Exam #1. Lecture Service. 450-453.
12 – Experimental Cloud Systems Lecture 13 34Papers to Read for Exam #2. Anna
– Case Studies for Semantic Social Network Leontjeva, Konstantin Tretyakov, Jaak
(Chapters 7, 8, 9, 10) Lecture 14 – Vilo, Taavi Tamkivi: Fraud Detection:
Privacy Lecture 15 – Social Networks, Methods of Analysis for Hypergraph Data.
Security and Privacy. 1060-1064 Mauro Conti, Radha Poovendran,
18IEEE/ACM Joint Conference Advances in Marco Secchiero: FakeBook: Detecting Fake
Social Network Analysis and Mining, 2009 Profiles in On-Line Social Networks.
(ASONAM). Papers to Read for March 29, 1071-1078 Evangelos E. Papalexakis, Alex
2013. Beutel, Peter Steenkiste: Network Anomaly
19Papers to Read for March 29, 2013. Detection Using Co-clustering. 403-410
Shin-Yan Chiou, Shih-Ying Chang, Ghita Maria Eleni Skarkala, Manolis
Mezzour, Adrian Perrig, Hung-Min Sun: A Maragoudakis, Stefanos Gritzalis, Lilian
Trustable Reputation Scheme Based on Mitrou, Hannu Toivonen, Pirjo Moen:
Private Relationships. 19-24 David Kinzel, Privacy Preservation by k-Anonymization of
Micah Klettke, Paul Uppal, Naheed Visram, Weighted Social Networks. 423-428 ?zg?r
Keivan Kianmehr, Reda Alhajj, Jon G. Kafali, Akin G?nay, Pinar Yolum: PROTOSS:
Rokne: The Economic Benefits of Web A Run Time Tool for Detecting Privacy
Mining. 25-32 Jiyang Chen, Osmar R. Violations in Online Social Networks.
Za?ane, Randy Goebel: Local Community 429-433.
Analyzing and Securing Social Networks.ppt
http://900igr.net/kartinka/bez_uroka/analyzing-and-securing-social-networks-240209.html
cсылка на страницу

Analyzing and Securing Social Networks

другие презентации на тему «Analyzing and Securing Social Networks»

«Проекты по развитию речи» - Гегель. Рекламный образ. Резюме как вид рекламно – деловых бумаг. «В школе вместо речи – мычание». Приемы создания рекламного образа. Язык и речь, функции языка. Слоган как часть рекламного текста. Век «тотального понижения гуманитарной культуры». Проект включает в себя три периода: Подготовительный; Основной; Заключительный.

«Космическая механика» - Система координат – совокупность чисел, приписанных элементам отсчета. Источник несвободы в механике называется силой. Основные законы. Скорости фронтов взрыва в различных сценариях ОНС. Весомика развлечений для парковых аттракционов. Нептун. Однородные среды первого класса. Главное понятие геометрики – понятие системы отсчета.

«Северо-Западный район России» - В северной столице России проживает около 5 млн. чел. Население. Карты Северо-Западного района. Транспортная сеть. На территорию Северо-Западного района огромное влияние оказали неоднократные оледенения. Северо - Запад. Потенциал Северо-западного региона в долгосрочной перспективе представляется огромным.

«Школьные праздники» - Кукольный театр ставит спектакли даже на английском языке. Весёлые старты проводятся в каждый праздник. Дети получают призы за костюмы и долгожданные подарки. Проводится каждый год на день учителя. 23 февраля. Выпускные балы не только для 11 и 9 классов, но и для малышей. Добрая традиция чаепитием отмечать праздники и дни именинника.

«Методическое объединение классных руководителей» - Совершенствование форм и методов внеаудиторной воспитательной работы. Задачи МО. Функции методического объединения. Методическое объединение классных руководителей. План работы МО. Организация работы МО. Формы и методы работы МО. План формирования папки классного руководителя. Семинары и заседания МО.

«Григорий Ермолаев» - Вы подвигом нас, молодых восхитили! А. Кривцов. За обеспечение связи Ермолаев Григорий Филиппович был награжден. Час мужества пробил на наших часах, И мужество нас не покинет. Остатки людей фашисты использовали как удобрение. И все ж навсегда вы остались Солдаты, Солдаты Победы, весной в сорок пятом…

Без темы

23688 презентаций
Урок

Без урока

1 тема
Картинки
900igr.net > Презентации по > Без темы > Analyzing and Securing Social Networks