Pub Date : 2021-08-06DOI: 10.1201/9781003134527-10
Umit Can, B. Alatas
{"title":"Cyberbullying and Cyberstalking on Online Social Networks","authors":"Umit Can, B. Alatas","doi":"10.1201/9781003134527-10","DOIUrl":"https://doi.org/10.1201/9781003134527-10","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124841176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-16
M. Hasan, Md. Redwan Hossain, A. Pathan
{"title":"Protecting Regular and Social Network Users in a Wireless Network by Detecting Rogue Access Point","authors":"M. Hasan, Md. Redwan Hossain, A. Pathan","doi":"10.1201/9781003134527-16","DOIUrl":"https://doi.org/10.1201/9781003134527-16","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121155546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-14
M. Mamun, Muhammad Al-Digeil, S. Ahmed
{"title":"Profiling Online Users","authors":"M. Mamun, Muhammad Al-Digeil, S. Ahmed","doi":"10.1201/9781003134527-14","DOIUrl":"https://doi.org/10.1201/9781003134527-14","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129323408","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
P. Vishnu, Basant Agarwal, P. Vinod, K. Dhanya, A. Baroni
{"title":"A Deep Learning-Based Model for an Efficient Hate-Speech Detection in Twitter","authors":"P. Vishnu, Basant Agarwal, P. Vinod, K. Dhanya, A. Baroni","doi":"10.1201/9781003134527-8","DOIUrl":"https://doi.org/10.1201/9781003134527-8","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"69 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131917116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Rishabh Jindal, Ahmed Falah, A. Anwar, Mohiuddin Ahmed
{"title":"Privacy-Preserving Analytics for Social Network Data","authors":"Rishabh Jindal, Ahmed Falah, A. Anwar, Mohiuddin Ahmed","doi":"10.1201/9781003134527-3","DOIUrl":"https://doi.org/10.1201/9781003134527-3","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121866397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-15
R. Gordon
{"title":"Securing Mobile Social Networks","authors":"R. Gordon","doi":"10.1201/9781003134527-15","DOIUrl":"https://doi.org/10.1201/9781003134527-15","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"2008 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131707730","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-12
Mohammad Shadab Khan, Sharyar Wani, Eima Fatima
{"title":"Cyberbullying among Neurodiverse Learners during Online Teaching and Learning amidst COVID-19","authors":"Mohammad Shadab Khan, Sharyar Wani, Eima Fatima","doi":"10.1201/9781003134527-12","DOIUrl":"https://doi.org/10.1201/9781003134527-12","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128879549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automated Content Classification in Social Media Platforms","authors":"Thomas M. Chen","doi":"10.1201/9781003134527-6","DOIUrl":"https://doi.org/10.1201/9781003134527-6","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129503202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-17
Vassilis Papaspirou, L. Maglaras, M. Ferrag
{"title":"A Tutorial on Cross-Site Scripting Attack","authors":"Vassilis Papaspirou, L. Maglaras, M. Ferrag","doi":"10.1201/9781003134527-17","DOIUrl":"https://doi.org/10.1201/9781003134527-17","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114194498","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2021-08-06DOI: 10.1201/9781003134527-11
Sharyar Wani, Yonis Gulzar
{"title":"Cyberbullying Severity Detection Using Deep Learning Techniques","authors":"Sharyar Wani, Yonis Gulzar","doi":"10.1201/9781003134527-11","DOIUrl":"https://doi.org/10.1201/9781003134527-11","url":null,"abstract":"","PeriodicalId":206884,"journal":{"name":"Securing Social Networks in Cyberspace","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122157430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}