Search Results - "Johnson, Henric"
-
1
Finding Influential Users in Social Media Using Association Rule Learning
Published in Entropy (Basel, Switzerland) (01-05-2016)“…Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the proposed work analyzes users…”
Get full text
Journal Article -
2
Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method
Published in Entropy (Basel, Switzerland) (01-12-2017)“…[-15]With the growing use of popular social media services like Facebook and Twitter it is challenging to collect all content from the networks without access…”
Get full text
Journal Article -
3
A Cloud Theory-Based Trust Computing Model in Social Networks
Published in Entropy (Basel, Switzerland) (01-01-2017)“…How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this…”
Get full text
Journal Article -
4
Governing AI safety through independent audits
Published in Nature machine intelligence (01-07-2021)“…Highly automated systems are becoming omnipresent. They range in function from self-driving vehicles to advanced medical diagnostics and afford many benefits…”
Get full text
Journal Article -
5
Open data for anomaly detection in maritime surveillance
Published in Expert systems with applications (15-10-2013)“…•Maritime surveillance has received increased civilian attention in recent years.•Anomaly detection may be used to improve maritime safety and security.•The…”
Get full text
Journal Article -
6
SmartWiki: A reliable and conflict-refrained Wiki model based on reader differentiation and social context analysis
Published in Knowledge-based systems (01-07-2013)“…Wiki systems, such as Wikipedia, provide a multitude of opportunities for large-scale online knowledge collaboration. Despite Wikipedia’s successes with the…”
Get full text
Journal Article -
7
Leveraging Social Interactions to Suggest Friends
Published in 2013 IEEE 33rd International Conference on Distributed Computing Systems Workshops (01-07-2013)“…Over the past decade Online Social Networks (OSNs) have made it possible for people to stay in touch with people they already know in real life; although, they…”
Get full text
Conference Proceeding -
8
Crawling Online Social Networks
Published in 2015 Second European Network Intelligence Conference (01-09-2015)“…Researchers put in tremendous amount of time and effort in order to crawl the information from online social networks. With the variety and the vast amount of…”
Get full text
Conference Proceeding -
9
Do we really need to catch them all? A new User-guided Social Media Crawling method
Published 13-12-2017“…Erlandsson, F.; Br\'odka, P.; Boldt, M.; Johnson, H. Do We Really Need to Catch Them All? A New User-Guided Social Media Crawling Method. Entropy 2017, 19, 686…”
Get full text
Journal Article -
10
Finding Influential Users in Social Media Using Association Rule Learning
Published 10-05-2016“…Entropy 2016, 18, 164 Influential users play an important role in online social networks since users tend to have an impact on one other. Therefore, the…”
Get full text
Journal Article -
11
Profile Cloning Detection in Social Networks
Published in 2014 European Network Intelligence Conference (01-09-2014)“…Profile cloning is a severe security issue in social networks since it is used to make a profile identical to existing ones. Profile cloning detection creates…”
Get full text
Conference Proceeding -
12
SOLA: lightweight security for access control in IEEE 802.11
Published in IT professional (01-05-2004)“…The IEEE 802.11 wireless standard provides little support for secure access control. As a result, access control in IEEE 802.11 on a per packet basis requires…”
Get full text
Journal Article -
13
ENIC 2015 Preface
Published in 2015 Second European Network Intelligence Conference (01-09-2015)“…Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the…”
Get full text
Conference Proceeding -
14
Privacy Threats Related to User Profiling in Online Social Networks
Published in 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing (01-09-2012)“…The popularity of Online Social Networks (OSNs) has increased the visibility of users profiles and interactions performed between users. In this paper we…”
Get full text
Conference Proceeding -
15
Accurate Adware Detection Using Opcode Sequence Extraction
Published in 2011 Sixth International Conference on Availability, Reliability and Security (01-08-2011)“…Adware represents a possible threat to the security and privacy of computer users. Traditional signature-based and heuristic-based methods have not been proven…”
Get full text
Conference Proceeding -
16
Read What You Trust: An Open Wiki Model Enhanced by Social Context
Published in 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust and 2011 IEEE Third International Conference on Social Computing (01-10-2011)“…Wiki systems, such as Wikipedia, provide a multitude of opportunities for large-scale online knowledge collaboration. Despite Wikipedia's successes with the…”
Get full text
Conference Proceeding -
17
On user perception of web login - A study on QoE in the context of security
Published in 2010 Australasian Telecommunication Networks and Applications Conference (01-10-2010)“…As there is a lack of such studies, this paper investigates user perception (Quality of Experience, QoE) of the response times (Quality of Service, QoS) of a…”
Get full text
Conference Proceeding -
18
SIN: A Platform to Make Interactions in Social Networks Accessible
Published in 2012 International Conference on Social Informatics (01-12-2012)“…Online Social Networks (OSNs) are popular platforms for interaction, communication and collaboration between friends. In this paper we develop and present a…”
Get full text
Conference Proceeding -
19
A Socially-Aware Operating System for Trustworthy Computing
Published in 2011 IEEE Fifth International Conference on Semantic Computing (01-09-2011)“…Traditional security models based on distinguishing trusted from untrusted pieces of data and program behavior continue to face difficulties keeping up with…”
Get full text
Conference Proceeding -
20
Trustworthy opportunistic sensing: A Social Computing Paradigm
Published in 2011 IEEE International Conference on Information Reuse & Integration (01-08-2011)“…In recent years, technological advances have lead to a society with communication platforms like iPhone and Kinect Xbox that are able to inject sensing…”
Get full text
Conference Proceeding