89,95 €
89,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
45 °P sammeln
89,95 €
89,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
45 °P sammeln
Als Download kaufen
89,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
45 °P sammeln
Jetzt verschenken
89,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
45 °P sammeln
  • Format: PDF

This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 11.15MB
Produktbeschreibung
This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention of fake news dissemination, and detection of trending topics and influence from social media are investigated.

This book helps the reader in developing their own perspective about how to deal with cyber security and how to benefit from the development in technology to tackle cyber security issues. The reader of this book will realize how to use various machine learning techniques for tackling various applications involving social medial analysis.


Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
Sibel Tar¿yan Özyer is Assistant Professor of Computer Engineering at Ankara Medipol University, Ankara, Turkey. Previously, she was assistant professor at the Computer Engineering Department of Cankaya University, Turkey. She has been the  Program Chair of HIBIBI 2022, which is co-located with ASONAM conference in 2022. Research interests are network analysis, data mining, machine learning, bioinformatics, computer networks, and computer vision. Buket Kaya received her BSc, MSc and PhD degrees in Electrical-Electronics Engineering from Firat University, Turkey, in 2007, 2010 and 2015, respectively. Currently, she is Associate Professor in the Department of Electronics and Automation, Firat University. Her primary work and research interests are in the areas of data mining, social network analysis, machine learning and deep learning.