Security in IoT Social Networks

Book description

Security in IoT Social Networks takes a deep dive into security threats and risks, focusing on real-world social and financial effects. Mining and analyzing enormously vast networks is a vital part of exploiting Big Data. This book provides insight into the technological aspects of modeling, searching, and mining for corresponding research issues, as well as designing and analyzing models for resolving such challenges. The book will help start-ups grow, providing research directions concerning security mechanisms and protocols for social information networks. The book covers structural analysis of large social information networks, elucidating models and algorithms and their fundamental properties.

Moreover, this book includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models. This book is a detailed reference for academicians, professionals, and young researchers. The wide range of topics provides extensive information and data for future research challenges in present-day social information networks.

  • Provides several characteristics of social, network, and physical security associated with social information networks
  • Presents the security mechanisms and events related to social information networks
  • Covers emerging topics, such as network information structures like on-line social networks, heterogeneous and homogeneous information networks, and modern information networks
  • Includes smart solutions based on artificial intelligence, machine learning, and deep learning for enhancing the performance of social information network security protocols and models

Table of contents

  1. Cover image
  2. Title page
  3. Table of Contents
  4. Copyright
  5. Contributors
  6. Chapter 1. Security in social networks
    1. 1. Introduction
    2. 2. Types of social networks
    3. 3. Social networks security requirements
    4. 4. SN security technical
    5. 5. What information is public?
    6. 6. Fraud on social networks
    7. 7. Tips to stay safe, private, and secure
    8. 8. Staying safe on social media sites
    9. 9. SNS security issues and challenges
    10. 10. Five top social media security threats
    11. 11. Privacy and security of social networks for home users
    12. 12. Social media security tips to mitigate risks
    13. 13. Securing Social Security's future
    14. 14. Humans want Social Security
    15. 15. Social Security can be strengthened
    16. 16. Conclusion
  7. Chapter 2. Emerging social information networks applications and architectures
    1. 1. Introduction
    2. 2. Background with new technologies
    3. 3. Knowledge representation and data processing management
    4. 4. Social information networks applications and architecture
    5. 5. Conclusion
  8. Chapter 3. Cyber security in mobile social networks
    1. 1. Introduction
    2. 2. Challenges in mobile app security
    3. 3. What is a mobile threat?
    4. 4. Types of wireless attacks
    5. 5. Attacks based on communication
    6. 6. Attacks based on vulnerabilities in software applications and hardware
    7. 7. Portability of malware across platforms
    8. 8. How to secure your mobile device
    9. 9. Mobile security threats you should take seriously
    10. 10. Tips for securing Wi-Fi
    11. 11. Challenges and open issues
    12. 12. Conclusion
  9. Chapter 4. Influence of social information networks and their propagation
    1. 1. Social influence: a brief outline
    2. 2. Social media “friends”
    3. 3. Homophily or influence?
    4. 4. Social networks and influence
    5. 5. Social influence and viral cascades
    6. 6. Viral marketing and its impact
    7. 7. Case study and applications
    8. 8. Summary
  10. Chapter 5. Pragmatic studies of diffusion in social networks
    1. 1. Introduction
    2. 2. Literature survey
    3. 3. Research guidelines
    4. 4. Predictive model
    5. 5. Future directions
    6. 6. Discussion and conclusion
  11. Chapter 6. Forensic analysis in social networking applications
    1. 1. Introduction
    2. 2. Background
    3. 3. Digital forensics
    4. 4. Investigation models in digital forensic
    5. 5. Integrating behavioral analysis
    6. 6. Sexually exploitative child imagery
    7. 7. Offender typologies and theories
    8. 8. Research methodologies
    9. 9. Conclusion
  12. Chapter 7. Recommender systems: security threats and mechanisms
    1. 1. Introduction
    2. 2. Features of recommender systems
    3. 3. Common classification of recommender systems
    4. 4. Sources of recommender systems
    5. 5. Literature review
    6. 6. Quality measures for evaluating recommender systems
    7. 7. Challenges in implementing recommender systems
    8. 8. Basic scheme
    9. 9. Conclusion
  13. Chapter 8. Evolving cloud security technologies for social networks
    1. 1. Introduction
    2. 2. Evolution of computing platforms in social networks
    3. 3. Access control and security policies in social networks
    4. 4. Cloud security technologies
    5. 5. Manifesting mechanism
    6. 6. Conclusion
  14. Chapter 9. Fake news in social media recognition using Modified Long Short-Term Memory network
    1. 1. Introduction
    2. 2. Literature review
    3. 3. Existing fake news detection techniques
    4. 4. Performance analysis
    5. 5. Experimentation and results
    6. 6. Conclusion and future work
    7. Appendix:
  15. Chapter 10. Security aspects and UAVs in Socialized Regions
    1. 1. Introduction
    2. 2. UAVs: a brief introduction
    3. 3. UAV using IOT in smart cities
    4. 4. UAV transportation system
    5. 5. UAV issues in cyber security and public safety
    6. 6. UAV in smart cities: Dubai
  16. Index

Product information

  • Title: Security in IoT Social Networks
  • Author(s): Fadi Al-Turjman, B.D. Deebak
  • Release date: November 2020
  • Publisher(s): Academic Press
  • ISBN: 9780128216033