scholarly journals Identification of Sybil attacks on social networks using a framework based on user interactions

2018 ◽  
Vol 1 (2) ◽  
pp. e19 ◽  
Author(s):  
Hooman Asadian ◽  
Hamid Haj Seyed Javadi
2011 ◽  
Author(s):  
Seokchan Yun ◽  
Heungseok Do ◽  
Jinuk Jung ◽  
Song Mina ◽  
Namgoong Hyun ◽  
...  

Author(s):  
Christina Roseline ◽  
Blessy Antony ◽  
Bijitha Balakrishnan ◽  
C. V. Chaithra ◽  
P. V. Bhavyasree

2020 ◽  
Author(s):  
Krzysztof Rudek ◽  
Jarosław Koźlak

Abstract The aim of the paper is to identify and categorize frequent patterns describing interactions between users in social networks. We analyze a social network with relationships between users that evolve in time already identified. In our research, we discover patterns based on frequent interactions between groups of users. The patterns are described by the characteristics of these interactions, such as their reciprocity, or the relative difference between estimations of global influences of the users participating in the discussions. The modification of the apriori algorithms is applied as one of the methods for pattern identification. The analyzed social network is built using the data set containing data from the Polish blog website salon24, which concerns mostly socio-political issues.


2016 ◽  
Vol 18 (5) ◽  
pp. 459-477
Author(s):  
Sarah Whitcomb Laiola

This article addresses issues of user precarity and vulnerability in online social networks. As social media criticism by Jose van Dijck, Felix Stalder, and Geert Lovink describes, the social web is a predatory system that exploits users’ desires for connection. Although accurate, this critical description casts the social web as a zone where users are always already disempowered, so fails to imagine possibilities for users beyond this paradigm. This article examines Natalie Bookchin’s composite video series, Testament, as it mobilizes an alt-(ernative) social network of vernacular video on YouTube. In the first place, the alt-social network works as an iteration of “tactical media” to critically reimagine empowered user-to-user interactions on the social web. In the second place, it obfuscates YouTube’s data-mining functionality, so allows users to socialize online in a way that evades their direct translation into data and the exploitation of their social labor.


2021 ◽  
Vol 45 (1) ◽  
Author(s):  
V. A. Savchenko ◽  
◽  
V. M. Akhramovych ◽  
T. M. Dzyuba ◽  
S. O. Laptіev ◽  
...  

The elements of user interaction in social networks are considered: it is shown that the method of analysis of user interactions is based on assumptions when the magnitude of the influence depends on the centrality of users in the social network; the greater the consonance, the higher the nature of the influence, the interaction is a nonlinear function; it is indicated that interaction is a process that has a time interval, the linear model of protection of the information protection system from user interaction is considered; the obtained equations of protection are the equation of a harmonic oscillator with damping amplitude, the iteration of oscillations of the protection system in the pre-resonant, resonant and post-resonant zones is shown.


Sign in / Sign up

Export Citation Format

Share Document