Social Networks Security Policies

被引:1
|
作者
Dhouioui, Zeineb [1 ]
Alqahtani, Abdullah Ali [2 ]
Akaichi, Jalel [2 ]
机构
[1] Univ Tunis, Bestmod ISG Tunis, Tunis, Tunisia
[2] King Khaled Univ, Abha, Guraiger, Saudi Arabia
关键词
Privacy protection; Security policies; Social networks; Predators; Text mining; Machine learning; Support Vector Machine;
D O I
10.1007/978-3-319-39345-2_34
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social networks present useful tools for communication and information sharing. While these networks have a considerable impact on users daily life, security issues are various such as privacy defects, threats on publishing personal information, spammers and fraudsters. Consequently, motivated by privacy problems in particular the danger of sexual predators, we seek in this work to present a generic model for security policies that must be followed by social networks users based on sexual predators identification. In order to detect those distrustful users, we use text mining techniques to distinguish suspicious conversations using lexical and behavioral features classification. Experiments are conducted comparing between two machine learning algorithms: support vector machines (SVM) and Nave Bayes (NB).
引用
收藏
页码:395 / 403
页数:9
相关论文
共 50 条
  • [1] Contemporary social security policies
    不详
    INTERNATIONAL SOCIAL SECURITY REVIEW, 2006, 59 (02) : 119 - 119
  • [2] EMPLOYMENT PROTECTION POLICIES AND SOCIAL SECURITY
    Marquet Guerrero, Porfirio
    REVISTA LATINOAMERICANA DE DERECHO SOCIAL, 2013, 17 : 283 - 291
  • [3] Social Networks Security
    Nagy, Jan
    Pecho, Peter
    2009 THIRD INTERNATIONAL CONFERENCE ON EMERGING SECURITY INFORMATION, SYSTEMS, AND TECHNOLOGIES, 2009, : 321 - +
  • [4] SOCIAL NETWORKS, PUBLIC POLICIES AND SOCIAL CAPITAL
    Ballester, Lluis
    Pascual, Belen
    Vecina, Carlos
    APOSTA-REVISTA DE CIENCIAS SOCIALES, 2014, 61
  • [5] On Optimizing Compatible Security Policies in Wireless Networks
    Scott C-H Huang
    Kia Makki
    Niki Pissinou
    EURASIP Journal on Wireless Communications and Networking, 2006
  • [6] Enforcing Multilevel Security Policies in Unstable Networks
    Burke, Quinn
    Mehmeti, Fidan
    George, Rahul
    Ostrowski, Kyle
    Jaeger, Trent
    La Porta, Thomas F.
    McDaniel, Patrick
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2022, 19 (03): : 2349 - 2365
  • [7] Dealing with Multi Security Policies in Communication Networks
    Abassi, Ryma
    El Fatmi, Sihem Guemara
    ICNS: 2009 FIFTH INTERNATIONAL CONFERENCE ON NETWORKING AND SERVICES, 2009, : 282 - 287
  • [8] On optimizing compatible security policies in wireless networks
    Huang, Scott C. -H.
    Makki, Kia
    Pissinou, Niki
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2006, 2006 (1)
  • [9] Implications of Development and Status of EU Social Security Policies for China's Social Security
    Sun, Zhixiang
    INTERNATIONAL SYMPOSIUM ON ENGINEERING TECHNOLOGY, EDUCATION AND MANAGEMENT (ISETEM 2014), 2014, : 233 - 237
  • [10] Fertility Policies and Social Security Reforms in China
    Nicolas Coeurdacier
    Stéphane Guibaud
    Keyu Jin
    IMF Economic Review, 2014, 62 : 371 - 408