Investigation of the factors of informal communication inside social networks for identification of agents carrying privacy threats
It is suggested the results of an investigation of informal communication in social net-works for identification of agents carrying the privacy threats. The developed computer program as a tool for the research is presented. The example of application of the developed tool for the analysis of the so...
Saved in:
| Date: | 2016 |
|---|---|
| Main Authors: | Nikiforova, L. A., Goroh, N. V., Lebedeva, G. A., Salieva, O. V. |
| Format: | Article |
| Language: | Ukrainian |
| Published: |
Інститут проблем реєстрації інформації НАН України
2016
|
| Subjects: | |
| Online Access: | http://drsp.ipri.kiev.ua/article/view/100346 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Journal Title: | Data Recording, Storage & Processing |
Institution
Data Recording, Storage & ProcessingSimilar Items
A multi-agent model of information dissemination in social networks
by: Lande, D. V., et al.
Published: (2016)
by: Lande, D. V., et al.
Published: (2016)
Multi-agent approach to modeling an information and analytical system
by: Dodonov, O. G., et al.
Published: (2016)
by: Dodonov, O. G., et al.
Published: (2016)
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019)
by: Saliieva, O. V., et al.
Published: (2019)
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014)
by: Nikiforova, L. O., et al.
Published: (2014)
Mathematical methods of planning in systems consisted of rational agents
by: Sinitsyn, I.P., et al.
Published: (2024)
by: Sinitsyn, I.P., et al.
Published: (2024)
Classification of information security threats to computer systems for remote data processing
by: Korpan, Y. V.
Published: (2015)
by: Korpan, Y. V.
Published: (2015)
The architecture and functionality of the multi-agent system Navigation
by: Yalovets, A.L.
Published: (2018)
by: Yalovets, A.L.
Published: (2018)
Effect of cytostatic agents on expression levels of human beta-defensins-1-4 in A431 and MCF-7 cell lines
by: Zubenko, O.S., et al.
Published: (2018)
by: Zubenko, O.S., et al.
Published: (2018)
Comparative study of anticancer efficacy of aсonitinecontaining agent BC1 against ascite and solid forms of Ehrlich’s carcinoma
by: Dasyukevich, O.I., et al.
Published: (2007)
by: Dasyukevich, O.I., et al.
Published: (2007)
Methods on determination of the output data for assessing residual risks with ensuring the confidentiality of information objects
by: Vasilenko, V. S., et al.
Published: (2017)
by: Vasilenko, V. S., et al.
Published: (2017)
Management and Cost Analysis of Insurance-Based Social Benefits in the Republic of Azerbaijan
by: Alirzayev, Emin
Published: (2025)
by: Alirzayev, Emin
Published: (2025)
Hypercomplex Approach to Modeling of Reputation in Social Networks
by: Lande, D. V., et al.
Published: (2013)
by: Lande, D. V., et al.
Published: (2013)
Human-insider threat analysis for the purpose of modeling
by: I. V. Kotsiuba
Published: (2016)
by: I. V. Kotsiuba
Published: (2016)
Human-insider Threat Analysis for the Purpose of Modeling
by: Kotsiuba, I.V.
Published: (2016)
by: Kotsiuba, I.V.
Published: (2016)
Methods of recognition by the agent of the unknown environment
by: Yalovets, A.L.
Published: (2019)
by: Yalovets, A.L.
Published: (2019)
Usage of intellectual analysis of ecological-economic data in the pension insurance system and for forecasting expenditures on social protection and social security
by: Zarudnii, Oleksii B.
Published: (2024)
by: Zarudnii, Oleksii B.
Published: (2024)
Research of the optimization problem of structure hierarchical communication network with changing its parameters
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
by: Vasyanin, Volodymyr O., et al.
Published: (2024)
THE PROBLEM OF FACIAL IDENTIFICATION OF SANDY BODIES AND THE WAYS OF ITS SOLVING
by: LUKIN, A. E., et al.
Published: (2012)
by: LUKIN, A. E., et al.
Published: (2012)
Identification of defects of the piles with reflected waves
by: Lebid, O., et al.
Published: (2018)
by: Lebid, O., et al.
Published: (2018)
Identification of loading graph models for distributed power transmission networks based on measurement data in observed network nodes
by: Kaplin M.I.
Published: (2006)
by: Kaplin M.I.
Published: (2006)
Features for providing of cyber security
by: Prysiazhniuk, M. M., et al.
Published: (2017)
by: Prysiazhniuk, M. M., et al.
Published: (2017)
Cryptographic Protection of Information Objects by Block Transformation of the System of Residual Classes to a Positional Number System
by: Mаtоv, О. Y., et al.
Published: (2012)
by: Mаtоv, О. Y., et al.
Published: (2012)
Cryptographic Security of the Encryption Methods Based on Transformations Using Residual Classes
by: Mаtоv, О. Ya., et al.
Published: (2012)
by: Mаtоv, О. Ya., et al.
Published: (2012)
Cryptographic Protection of Information Objects by Block Transformation from the Positional Namber System into the Residual Classes System
by: Матов, О. Я., et al.
Published: (2012)
by: Матов, О. Я., et al.
Published: (2012)
Interface-oriented approach to modelling tools for multi-agent systems
by: Shevchenko, R.S., et al.
Published: (2025)
by: Shevchenko, R.S., et al.
Published: (2025)
Main principles of post-conflict restoration of the economic status of Donbas
by: Yefremenko, V., et al.
Published: (2018)
by: Yefremenko, V., et al.
Published: (2018)
The role of the Donetsk oblast construction sector in renovation of the territories
by: Tochonov, I., et al.
Published: (2017)
by: Tochonov, I., et al.
Published: (2017)
The problems of recovery and development of thermal power engineering at the controlled territories of Donetsk and Lugansk regions
by: Snihova, O.
Published: (2017)
by: Snihova, O.
Published: (2017)
EROI of the Ukrainian coal
by: Cherevatskyi, D., et al.
Published: (2017)
by: Cherevatskyi, D., et al.
Published: (2017)
«Marshall Plan» for Donbass: prerequisites for investment development
by: Kolosov, A., et al.
Published: (2018)
by: Kolosov, A., et al.
Published: (2018)
The influence of financial decentralization on the restoration of the economy of Donbas
by: Fomichenko, I., et al.
Published: (2018)
by: Fomichenko, I., et al.
Published: (2018)
Socio-economic consequences of military conflicts in the Donetsk region and priority areas of the regional renewal
by: Yefremenko, V., et al.
Published: (2017)
by: Yefremenko, V., et al.
Published: (2017)
Marketing research of the agro-food market of Luhansk region: the basis for encouraging foreign investments in overcoming the consequences of a military conflict
by: Chebotarov, Ie.
Published: (2018)
by: Chebotarov, Ie.
Published: (2018)
For information privacy of an individual
by: M. M. Mikulina
Published: (2013)
by: M. M. Mikulina
Published: (2013)
Use of ontological knowledge by intelligent agents
by: Rogushina, J.V.
Published: (2018)
by: Rogushina, J.V.
Published: (2018)
Тechnology of security confidential information from inside threats
by: Antoniuk, A.A., et al.
Published: (2025)
by: Antoniuk, A.A., et al.
Published: (2025)
Development of a device for protection against unauthorized access based on three-factor identification and user authentication
by: Азарова, А. О., et al.
Published: (2021)
by: Азарова, А. О., et al.
Published: (2021)
Determination of permissible reduction intensity of the level of security for an object of critical infrastructure by ranking of threats
by: Saliieva, O. V., et al.
Published: (2020)
by: Saliieva, O. V., et al.
Published: (2020)
Possibility of the use of data of infrasonic monitoring for identification of the nature of seismic events
by: Lyashchuk, A., et al.
Published: (2015)
by: Lyashchuk, A., et al.
Published: (2015)
The professional personnel development provision as a component of the decent work concept
by: Petyuh, V.M., et al.
Published: (2017)
by: Petyuh, V.M., et al.
Published: (2017)
Similar Items
-
A multi-agent model of information dissemination in social networks
by: Lande, D. V., et al.
Published: (2016) -
Multi-agent approach to modeling an information and analytical system
by: Dodonov, O. G., et al.
Published: (2016) -
Development of a cognitive model for analysis of the impact of threats on the security level of a computer network
by: Saliieva, O. V., et al.
Published: (2019) -
Modelling of choice on the optimal method for counteract of information security threats
by: Nikiforova, L. O., et al.
Published: (2014) -
Mathematical methods of planning in systems consisted of rational agents
by: Sinitsyn, I.P., et al.
Published: (2024)