2018
DOI: 10.11591/ijeecs.v10.i2.pp807-816
|View full text |Cite
|
Sign up to set email alerts
|

An Efficient & Secure Content Contribution and Retrieval content in Online Social Networks using Level-level Security Optimization & Content Visualization Algorithm

Abstract: <span lang="EN-US">Online Social Networks (OSNs) is currently popular interactive media to establish the communication, share and disseminate a considerable amount of human life data. Daily and continuous communications imply the exchange of several types of content, including free text, image, audio, and video data. Security is one of the friction points that emerge when communications get mediated in Online Social Networks (OSNs). However, there are no content-based preferences supported, and therefore… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…It is important to improve security since the Internet nowadays that indication the security issues [29]. There are many studies aimed to reduce attack and to protect user privacy but yet lacking in applying the techniques for social media [30]. This paper also wants to contribute by examining the suitable features based on the real comment from social media site for developing spam comment detection framework.…”
Section: Resultsmentioning
confidence: 99%
“…It is important to improve security since the Internet nowadays that indication the security issues [29]. There are many studies aimed to reduce attack and to protect user privacy but yet lacking in applying the techniques for social media [30]. This paper also wants to contribute by examining the suitable features based on the real comment from social media site for developing spam comment detection framework.…”
Section: Resultsmentioning
confidence: 99%
“…In upward-spirals, whales dive at deep 12 m and instigate to produce bubbles in order to surround prey, and then they swim toward the surface. Whereas double-loops include three steps coral loop, lobtail, and capture loop[25][26][27][28][29].…”
mentioning
confidence: 99%