Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
It is suggested the results of an investigation of informal communication in social net-works for identification of agents carrying the privacy threats. The developed computer program as a tool for the research is presented. The example of application of the developed tool for the analysis of the so...
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | Nikiforova, L. A., Goroh, N. V., Lebedeva, G. A., Salieva, O. V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100346 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A multi-agent model of information dissemination in social networks
by: Lande, D. V., et al.
Published: (2016)
by: Lande, D. V., et al.
Published: (2016)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Multi-agent approach to modeling an information and analytical system
by: Dodonov, O. G., et al.
Published: (2016)
by: Dodonov, O. G., et al.
Published: (2016)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
AI (not) against AI
by: Nesterenko, Oleksandr, et al.
Published: (2025)
by: Nesterenko, Oleksandr, et al.
Published: (2025)
Mathematical methods of planning in systems consisted of rational agents
by: Sinitsyn, I.P., et al.
Published: (2024)
by: Sinitsyn, I.P., et al.
Published: (2024)
The architecture and functionality of the multi-agent system Navigation
by: Yalovets, A.L.
Published: (2018)
by: Yalovets, A.L.
Published: (2018)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Effect of cytostatic agents on expression levels of human beta-defensins-1-4 in A431 and MCF-7 cell lines
by: Zubenko, O.S., et al.
Published: (2018)
by: Zubenko, O.S., et al.
Published: (2018)
Hypercomplex Approach to Modeling of Reputation in Social Networks
by: Lande, D. V., et al.
Published: (2013)
by: Lande, D. V., et al.
Published: (2013)
Management and Cost Analysis of Insurance-Based Social Benefits in the Republic of Azerbaijan
by: Alirzayev, Emin
Published: (2025)
by: Alirzayev, Emin
Published: (2025)
Mathematical Modeling and Parametrical Identification of Heat Processes Considering Antecedent Information About Heat Generation Sources
by: Kostikov A.
Published: (2014)
by: Kostikov A.
Published: (2014)
Methods of recognition by the agent of the unknown environment
by: Yalovets, A.L.
Published: (2019)
by: Yalovets, A.L.
Published: (2019)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Interface-oriented approach to modelling tools for multi-agent systems
by: Shevchenko, R.S., et al.
Published: (2025)
by: Shevchenko, R.S., et al.
Published: (2025)
Identification of loading graph models for distributed power transmission networks based on measurement data in observed network nodes
by: Kaplin M.I.
Published: (2006)
by: Kaplin M.I.
Published: (2006)
Human-insider threat analysis for the purpose of modeling
by: I. V. Kotsiuba
Published: (2016)
by: I. V. Kotsiuba
Published: (2016)
Human-insider Threat Analysis for the Purpose of Modeling
by: Kotsiuba, I.V.
Published: (2016)
by: Kotsiuba, I.V.
Published: (2016)
Territorially distributed information computer systems in a unified information space: basic concepts and definitions
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
THE PROBLEM OF FACIAL IDENTIFICATION OF SANDY BODIES AND THE WAYS OF ITS SOLVING
by: LUKIN, A. E., et al.
Published: (2012)
by: LUKIN, A. E., et al.
Published: (2012)
Identification of defects of the piles with reflected waves
by: Lebid, O., et al.
Published: (2018)
by: Lebid, O., et al.
Published: (2018)
Technology for ensuring the survivability of territorially distributed information computer systems in a unified information space
by: Додонов, О. Г., et al.
Published: (2024)
by: Додонов, О. Г., et al.
Published: (2024)
Detection of information sources distributing fake information inside global internet network
by: Soboliev, A. М.
Published: (2019)
by: Soboliev, A. М.
Published: (2019)
Use of ontological knowledge by intelligent agents
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Main principles of post-conflict restoration of the economic status of Donbas
by: Yefremenko, V., et al.
Published: (2018)
by: Yefremenko, V., et al.
Published: (2018)
The influence of financial decentralization on the restoration of the economy of Donbas
by: Fomichenko, I., et al.
Published: (2018)
by: Fomichenko, I., et al.
Published: (2018)
The problems of recovery and development of thermal power engineering at the controlled territories of Donetsk and Lugansk regions
by: Snihova, O.
Published: (2017)
by: Snihova, O.
Published: (2017)
«Marshall Plan» for Donbass: prerequisites for investment development
by: Kolosov, A., et al.
Published: (2018)
by: Kolosov, A., et al.
Published: (2018)
EROI of the Ukrainian coal
by: Cherevatskyi, D., et al.
Published: (2017)
by: Cherevatskyi, D., et al.
Published: (2017)
The role of the Donetsk oblast construction sector in renovation of the territories
by: Tochonov, I., et al.
Published: (2017)
by: Tochonov, I., et al.
Published: (2017)
Neural network based method of a user identification by keyboard handwriting
by: Danyliuk, I. I., et al.
Published: (2018)
by: Danyliuk, I. I., et al.
Published: (2018)
For information privacy of an individual
by: M. M. Mikulina
Published: (2013)
by: M. M. Mikulina
Published: (2013)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
Research of the optimization problem of structure hierarchical communication network with changing its parameters
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
Similar Items
-
A multi-agent model of information dissemination in social networks
by: Lande, D. V., et al.
Published: (2016) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019) -
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015) -
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014) -
Multi-agent approach to modeling an information and analytical system
by: Dodonov, O. G., et al.
Published: (2016)