A Novel Approach To Prevent Personal Data On A Social Network Using Graph Theory

被引:2
|
作者
Patil, Neha A. [1 ]
Manekar, Amitkumar S. [1 ]
机构
[1] Sandip Inst Technol & Res Ctr, Dept Comp, Nasik, India
来源
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 | 2015年
关键词
Social network analysis; Data mining; Network privacy rules; Graph theory; NLP;
D O I
10.1109/ICCUBEA.2015.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
online social network such as Twitter, LinkedIn are widely used now a days. In these people lists their personal information and favorite activities which meant to be secure. Private information leakage becomes key issues with social network users. Apart from this user are hampered with various types of malicious data attacks which feel users very embarrassing in a real life. Also manual filtering for such a large data is not feasible at all. So various users stay away from social network sites to avoid such activities the social network architecture should be improved so that normal user can take a relief. Proposed work is an automatic prevention mechanism for such a heavy data using NLP and data mining approach. Objective of work is creation of real time rule sets to filter data using graph theory.
引用
收藏
页码:186 / 189
页数:4
相关论文
共 50 条
  • [21] Connectomics and graph theory analyses: Novel insights into network abnormalities in epilepsy
    Gleichgerrcht, Ezequiel
    Kocher, Madison
    Bonilha, Leonardo
    EPILEPSIA, 2015, 56 (11) : 1660 - 1668
  • [22] Structural Analysis of Nanoscale Network Materials Using Graph Theory
    Vecchio, Drew A.
    Mahler, Samuel H.
    Hammig, Mark D.
    Kotov, Nicholas A.
    ACS NANO, 2021, 15 (08) : 12847 - 12859
  • [23] Graph theory-based approach for energy corridors network to Greece
    Doukas, Haris
    Karakosta, Charikleia
    Flamos, Alexandros
    Flouri, Maria
    Psarras, John
    INTERNATIONAL JOURNAL OF ENERGY SECTOR MANAGEMENT, 2011, 5 (01) : 60 - 80
  • [24] Novel Approach of Mining Methods for Social Network Sites
    Sharma, Anu
    Sharma, M. K.
    Dwivedi, R. K.
    PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON SYSTEM MODELING & ADVANCEMENT IN RESEARCH TRENDS (SMART-2016), 2016, : 186 - 188
  • [25] A novel method of digital image encryption using graph theory
    Joshi, Anand B.
    Kumar, Dhanesh
    Kumar, Sachin
    Singh, Sonali
    MULTIMEDIA TOOLS AND APPLICATIONS, 2024, 83 (03) : 6803 - 6828
  • [26] A novel method of digital image encryption using graph theory
    Anand B. Joshi
    Dhanesh Kumar
    Sachin Kumar
    Sonali Singh
    Multimedia Tools and Applications, 2024, 83 : 6803 - 6828
  • [27] Big data analytics for default prediction using graph theory
    Yildirim, Mustafa
    Okay, Feyza Yildirim
    Ozdemir, Suat
    EXPERT SYSTEMS WITH APPLICATIONS, 2021, 176
  • [28] Graph theory-based approach for automatic recognition of CAD data
    Huang, H. C.
    Lo, S. M.
    Zhi, G. S.
    Yuen, R. K. K.
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2008, 21 (07) : 1073 - 1079
  • [29] Predicting the attributes of social network users using a graph-based machine learning method
    Ding, Yuxin
    Yan, Shengli
    Zhang, YiBin
    Dai, Wei
    Dong, Li
    COMPUTER COMMUNICATIONS, 2016, 73 : 3 - 11
  • [30] Determining IT Student Profile Using Data Mining and Social Network Analysis
    Stanca, Liana
    Lacurezeanu, Ramona
    Tiron-Tudor, Adriana
    Bresfelean, Vasile Paul
    Pandelica, Ionut
    INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL, 2020, 15 (05) : 1 - 16