A Novel Approach To Prevent Personal Data On A Social Network Using Graph Theory

被引:2
|
作者
Patil, Neha A. [1 ]
Manekar, Amitkumar S. [1 ]
机构
[1] Sandip Inst Technol & Res Ctr, Dept Comp, Nasik, India
来源
1ST INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION ICCUBEA 2015 | 2015年
关键词
Social network analysis; Data mining; Network privacy rules; Graph theory; NLP;
D O I
10.1109/ICCUBEA.2015.41
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
online social network such as Twitter, LinkedIn are widely used now a days. In these people lists their personal information and favorite activities which meant to be secure. Private information leakage becomes key issues with social network users. Apart from this user are hampered with various types of malicious data attacks which feel users very embarrassing in a real life. Also manual filtering for such a large data is not feasible at all. So various users stay away from social network sites to avoid such activities the social network architecture should be improved so that normal user can take a relief. Proposed work is an automatic prevention mechanism for such a heavy data using NLP and data mining approach. Objective of work is creation of real time rule sets to filter data using graph theory.
引用
收藏
页码:186 / 189
页数:4
相关论文
共 50 条
  • [41] A novel automated fault identification approach in computer networks based on graph theory
    Yu, YJ
    Liu, Q
    Tan, LS
    Xiao, DB
    2003 INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, VOL 1 AND 2, PROCEEDINGS, 2003, : 167 - 173
  • [42] Learning Styles Prediction Using Social Network Analysis and Data Mining Algorithms
    Benabdelouahab, Soukaina
    El Bouhdidi, Jaber
    El Younoussi, Yacine
    de Gea, Juan M. Carrillo
    EMERGING TRENDS IN INTELLIGENT SYSTEMS & NETWORK SECURITY, 2023, 147 : 315 - 322
  • [43] An Efficient Data Enrichment Scheme for Fraud Detection Using Social Network Analysis
    Jamshidi, Soheil
    Hashemi, Mahmoud Reza
    2012 SIXTH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2012, : 1082 - 1087
  • [44] Data Mining Approach for Anomaly Detection in Social Network Analysis
    Sudha, M. Swarna
    Priya, K. Arun
    Lakshmi, A. Kanaka
    Kruthika, A.
    Priya, D. Lakshmi
    Valarmathi, K.
    PROCEEDINGS OF THE 2018 SECOND INTERNATIONAL CONFERENCE ON INVENTIVE COMMUNICATION AND COMPUTATIONAL TECHNOLOGIES (ICICCT), 2018, : 1862 - 1866
  • [45] A Hybrid Approach to Solve OPP Problem Using Graph Theory and AHP
    Ghosh, Pronob K.
    Chatterjee, Soumesh
    Roy, Biman Kumar Saha
    2017 7TH INTERNATIONAL CONFERENCE ON POWER SYSTEMS (ICPS), 2017, : 478 - 484
  • [46] Energy Balanced Heuristic Approach for Path Selection using Graph Theory
    Mahajan, Shilpa
    Malhotra, Jyoteesh
    Sharma, Sandeep
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 101 - 108
  • [47] Gender Differences in Social Support Received by Informal Caregivers: A Personal Network Analysis Approach
    Nieves Rodriguez-Madrid, Maria
    del Rio-Lozano, Maria
    Fernandez-Pena, Rosario
    Jimenez-Pernett, Jaime
    Garcia-Mochon, Leticia
    Lupianez-Castillo, Amparo
    del Mar Garcia-Calvente, Maria
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2019, 16 (01):
  • [48] Using Social Network Theory to Elucidate the Impact of Diversity on the Social Processes in Design
    Torres, David
    Zoltowski, Carla B.
    Buzzanell, Patrice M.
    Feister, Megan Kenny
    Oakes, William C.
    FRONTIERS IN EDUCATION CONFERENCE (FIE), 2015, 2015, : 1154 - 1158
  • [49] Power System Connectivity Monitoring Using a Graph Theory Network Flow Algorithm
    Werho, Trevor
    Vittal, Vijay
    Kolluri, Sharma
    Wong, Sze Mei
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2016, 31 (06) : 4945 - 4952
  • [50] Assessment of process networks using graph and network theory based key figures
    Kreimeyer, Matthias
    Eichinger, Markus
    Lindemann, Udo
    14TH EUROPEAN CONCURRENT ENGINEERING CONFERENCE 2007/4TH FUTURE BUSINESS TECHNOLOGY CONFERENCE, 2007, : 13 - 19