Search Results - "Johnson, Henric"

Refine Results
  1. 1

    Finding Influential Users in Social Media Using Association Rule Learning by Erlandsson, Fredrik, Bródka, Piotr, Borg, Anton, Johnson, Henric

    Published in Entropy (Basel, Switzerland) (01-05-2016)
    “…Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users…”
    Get full text
    Journal Article
  2. 2

    Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method by Erlandsson, Fredrik, Bródka, Piotr, Boldt, Martin, Johnson, Henric

    Published in Entropy (Basel, Switzerland) (01-12-2017)
    “…[-15]With the growing use of popular social media services like Facebook and Twitter it is challenging to collect all content from the networks without access…”
    Get full text
    Journal Article
  3. 3

    A Cloud Theory-Based Trust Computing Model in Social Networks by Liu, Fengming, Zhu, Xiaoqian, Hu, Yuxi, Ren, Lehua, Johnson, Henric

    Published in Entropy (Basel, Switzerland) (01-01-2017)
    “…How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this…”
    Get full text
    Journal Article
  4. 4
  5. 5

    Open data for anomaly detection in maritime surveillance by Kazemi, Samira, Abghari, Shahrooz, Lavesson, Niklas, Johnson, Henric, Ryman, Peter

    Published in Expert systems with applications (15-10-2013)
    “…•Maritime surveillance has received increased civilian attention in recent years.•Anomaly detection may be used to improve maritime safety and security.•The…”
    Get full text
    Journal Article
  6. 6

    SmartWiki: A reliable and conflict-refrained Wiki model based on reader differentiation and social context analysis by Zhao, Haifeng, Kallander, William, Johnson, Henric, Wu, Shyhtsun Felix

    Published in Knowledge-based systems (01-07-2013)
    “…Wiki systems, such as Wikipedia, provide a multitude of opportunities for large-scale online knowledge collaboration. Despite Wikipedia’s successes with the…”
    Get full text
    Journal Article
  7. 7

    Leveraging Social Interactions to Suggest Friends by Nia, Roozbeh, Erlandsson, Fredrik, Johnson, Henric, Wu, S. Felix

    “…Over the past decade Online Social Networks (OSNs) have made it possible for people to stay in touch with people they already know in real life; although, they…”
    Get full text
    Conference Proceeding
  8. 8

    Crawling Online Social Networks by Erlandsson, Fredrik, Nia, Roozbeh, Boldt, Martin, Johnson, Henric, Wu, S. Felix

    “…Researchers put in tremendous amount of time and effort in order to crawl the information from online social networks. With the variety and the vast amount of…”
    Get full text
    Conference Proceeding
  9. 9

    Do we really need to catch them all? A new User-guided Social Media Crawling method by Erlandsson, Fredrik, Bródka, Piotr, Boldt, Martin, Johnson, Henric

    Published 13-12-2017
    “…Erlandsson, F.; Br\'odka, P.; Boldt, M.; Johnson, H. Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method. Entropy 2017, 19, 686…”
    Get full text
    Journal Article
  10. 10

    Finding Influential Users in Social Media Using Association Rule Learning by Erlandsson, Fredrik, Bródka, Piotr, Borg, Anton, Johnson, Henric

    Published 10-05-2016
    “…Entropy 2016, 18, 164 Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the…”
    Get full text
    Journal Article
  11. 11

    Profile Cloning Detection in Social Networks by Brodka, Piotr, Sobas, Mateusz, Johnson, Henric

    “…Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates…”
    Get full text
    Conference Proceeding
  12. 12

    SOLA: lightweight security for access control in IEEE 802.11 by Wu, F., Johnson, H., Nilsson, A.

    Published in IT professional (01-05-2004)
    “…The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires…”
    Get full text
    Journal Article
  13. 13

    ENIC 2015 Preface

    “…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
    Get full text
    Conference Proceeding
  14. 14

    Privacy Threats Related to User Profiling in Online Social Networks by Erlandsson, F., Boldt, M., Johnson, H.

    “…The popularity of Online Social Networks (OSNs) has increased the visibility of users profiles and interactions performed between users. In this paper we…”
    Get full text
    Conference Proceeding
  15. 15

    Accurate Adware Detection Using Opcode Sequence Extraction by Shahzad, R. K., Lavesson, N., Johnson, H.

    “…Adware represents a possible threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods have not been proven…”
    Get full text
    Conference Proceeding
  16. 16

    Read What You Trust: An Open Wiki Model Enhanced by Social Context by Haifeng Zhao, Kallander, W., Gbedema, T., Johnson, H., Wu, F.

    “…Wiki systems, such as Wikipedia, provide a multitude of opportunities for large-scale online knowledge collaboration. Despite Wikipedia's successes with the…”
    Get full text
    Conference Proceeding
  17. 17

    On user perception of web login - A study on QoE in the context of security by Lorentzen, C, Fiedler, M, Johnson, H, Shaikh, J, Jorstad, I

    “…As there is a lack of such studies, this paper investigates user perception (Quality of Experience, QoE) of the response times (Quality of Service, QoS) of a…”
    Get full text
    Conference Proceeding
  18. 18

    SIN: A Platform to Make Interactions in Social Networks Accessible by Nia, Roozbeh, Erlandsson, F., Bhattacharyya, P., Rahman, M. R., Johnson, H., Wu, S. F.

    “…Online Social Networks (OSNs) are popular platforms for interaction, communication and collaboration between friends. In this paper we develop and present a…”
    Get full text
    Conference Proceeding
  19. 19

    A Socially-Aware Operating System for Trustworthy Computing by Oliveira, D., Murthy, D., Johnson, H., Wu, S. F., Nia, R., Rowe, J.

    “…Traditional security models based on distinguishing trusted from untrusted pieces of data and program behavior continue to face difficulties keeping up with…”
    Get full text
    Conference Proceeding
  20. 20

    Trustworthy opportunistic sensing: A Social Computing Paradigm by Johnson, H., Lavesson, N., Oliveira, D., Wu, S. F.

    “…In recent years, technological advances have lead to a society with communication platforms like iPhone and Kinect Xbox that are able to inject sensing…”
    Get full text
    Conference Proceeding