CN104408659B - Appraisal procedure and system based on social networking application information disclosure model - Google Patents

Appraisal procedure and system based on social networking application information disclosure model Download PDF

Info

Publication number
CN104408659B
CN104408659B CN201410592639.3A CN201410592639A CN104408659B CN 104408659 B CN104408659 B CN 104408659B CN 201410592639 A CN201410592639 A CN 201410592639A CN 104408659 B CN104408659 B CN 104408659B
Authority
CN
China
Prior art keywords
information
index
social networking
networking application
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410592639.3A
Other languages
Chinese (zh)
Other versions
CN104408659A (en
Inventor
翟羽佳
孙旷怡
任彦
佟玲玲
钮艳
付戈
万欣欣
余翠玲
刘洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201410592639.3A priority Critical patent/CN104408659B/en
Publication of CN104408659A publication Critical patent/CN104408659A/en
Application granted granted Critical
Publication of CN104408659B publication Critical patent/CN104408659B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • General Physics & Mathematics (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Primary Health Care (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Educational Administration (AREA)
  • Computing Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of appraisal procedure and system based on social networking application information disclosure model.This method includes:The information communication process of social networking application is analyzed and is abstracted, establishes social networking application information disclosure model;Based on social networking application information disclosure model, social networking application information propagation risk is decomposed into every factor according to hierarchical relationship, and every factor is carried out by aggregation combination according to hierarchical relationship according to the correlation between every factor, generation deceptive information propagates risk evaluation model;Wherein, the hierarchical relationship of deceptive information propagation risk evaluation model specifically includes:System layer, physical layer and risk point layer;Initial data based on risk point in the risk point layer for propagating risk evaluation model by deceptive information, the deceptive information faced to the social networking application are propagated threat and assessed.

Description

Appraisal procedure and system based on social networking application information disclosure model
Technical field
The present invention relates to computer network field, more particularly to a kind of assessment based on social networking application information disclosure model Method and system.
Background technology
In recent years, the continuous expansion emerged in multitude with network user's scale of social networking application is created to Internet Construction and development New opportunity has been made, also to specification Internet communication order, has suppressed deceptive information propagation and proposes new challenge.Therefore, how section Learn and evaluate the security threat that the deceptive information that each social networking application is faced is propagated, it has also become the safety to be received much concern in internet Problem.
From traditional different to network and structure element threat using network vulnerability, the propagation of deceptive information is disobeyed Rely the fragility in network and information system, but content, property by information etc. is to network and the user of information system Apply harmful effect.The threat laid particular emphasis on compared to traditional network security risk evaluation to runs software system is assessed (its data source is more using attack logs storehouse and weakness storehouse), the propagation risk for assessing deceptive information lay particular emphasis on and consider that software systems are held The propagation of information carrying breath threatens.Traditional network safety evaluation method is neither general also infeasible in this regard.
Meanwhile by the corresponding relation between analysis and more different threats and demand for security, the wind that deceptive information is propagated Targeted demand for security is assessed in danger certain particularity, as shown in table 1, for example, it is to confidentiality, integrality and availability Deng demand for security and unobvious, and reliability, controllability and non-repudiation are had higher requirements.
Table 1
Therefore, it is badly in need of a kind of appraisal procedure and system based on social networking application information disclosure model at present.
The content of the invention
In view of the above problems, it is proposed that the present invention so as to provide one kind overcome above mentioned problem or at least in part solve on State the appraisal procedure and system based on social networking application information disclosure model of problem.
The present invention provides a kind of appraisal procedure based on social networking application information disclosure model, including:
The information communication process of social networking application is analyzed and is abstracted, establishes social networking application information disclosure model;
Based on social networking application information disclosure model, social networking application information propagation risk is decomposed into items according to hierarchical relationship Factor, and every factor is carried out by aggregation combination according to hierarchical relationship according to the correlation between every factor, generate false letter Breath propagates risk evaluation model;Wherein, the hierarchical relationship of deceptive information propagation risk evaluation model specifically includes:System layer, reality Body layer and risk point layer;
Initial data based on risk point in the risk point layer for propagating risk evaluation model by deceptive information, to the social activity Threat is propagated using the deceptive information faced to be assessed.
Preferably, the parameter in the information disclosure model of social networking application specifically includes:Social network sites W:Propagated for information Beginning and end;User A-N:The publisher and recipient propagated for information;C1-Cn represents user C follower:Passed for information The disseminator and recipient broadcast;Information I:For the information of information publisher's proactive dissemination;Information propagates D:Passed for message sender Broadcast the process of information;Network environment E:The environment for occurring and completing is propagated for information.
Preferably, system layer includes:Whole social networks, physical layer are included involved by the whole social networks of social networking application Entity, wherein, entity includes:Social network sites user profile and information communication process;Risk point layer includes:Entity is in falseness The perceived risk sources with quantization means of involved energy in information communication process.
Preferably, initial data based on the risk point in the risk point layer for propagating risk evaluation model by deceptive information, The deceptive information propagation threat faced to the social networking application carries out assessment and specifically included:
Determine indices at different levels, the definition of each index and the determining for each index of the risk point in risk point layer Measure computational methods;
By constructing multilevel iudge matrix two-by-two, consistency check method is taken, determines indices under a certain level Relative weighting;
Indices are calculated according to quantitative calculation method, according to result of calculation and corresponding relative weighting to each The deceptive information of item index is propagated threat and assessed, and the deceptive information faced according to assessment result to the social networking application is propagated Threat is assessed.
Preferably, the rank of risk point layer indices includes:First order index, second level index and the third level refer to Mark, wherein, first order index includes following index:Social network sites, user, information and information communication process, wherein, with society Second level index corresponding to website is handed over to include following index:Using publisher and access terminal;The second level corresponding with user Index includes following index:User identity non-repudiation and End-user relevance;The second level corresponding with information index include with Lower index:Information correlativity and information identifiability;The second level corresponding with information communication process index includes following finger Mark:Transfer mode and communication effect;Wherein, third level index corresponding with application publisher includes following index:Using hair Cloth person's type;Third level index corresponding with access terminal includes following index:Using support platform;With user identity resisting denying Third level index corresponding to property includes following index:Authenticating user identification and IP address concealing technology use;It is related to user Third level index corresponding to property includes following index:User contacts tightness degree;Third level index corresponding with information correlativity Including following index:Information association degree;Third level index corresponding with information identifiability includes following index:Release news Identify granularity, forwarding information identification granularity and comment information identification granularity;Third level index corresponding with transfer mode includes Following index:Information acquiring pattern, information flow direction and communication mode;Third level index bag corresponding with communication effect Include following index:Total number of users and daily active users.
Present invention also offers a kind of assessment system based on social networking application information disclosure model, including:
First establishes module, for the information communication process of social networking application to be analyzed and is abstracted, establishes social networking application Information disclosure model;
Second establishes module, for based on social networking application information disclosure model, according to hierarchical relationship by social networking application information Propagate risk and be decomposed into every factor, and gathered every factor according to hierarchical relationship according to the correlation between every factor Collection combination, generation deceptive information propagate risk evaluation model;Wherein, deceptive information propagates the hierarchical relationship tool of risk evaluation model Body includes:System layer, physical layer and risk point layer;
Evaluation module, for original based on the risk point in the risk point layer of deceptive information propagation risk evaluation model Data, the deceptive information faced to the social networking application are propagated threat and assessed.
Preferably, the parameter in the information disclosure model of social networking application specifically includes:Social network sites W:Propagated for information Beginning and end;User A-N:The publisher and recipient propagated for information;C1-Cn represents user C follower:Passed for information The disseminator and recipient broadcast;Information I:For the information of information publisher's proactive dissemination;Information propagates D:Passed for message sender Broadcast the process of information;Network environment E:The environment for occurring and completing is propagated for information.
Preferably, system layer includes:Whole social networks, physical layer are included involved by the whole social networks of social networking application Entity, wherein, entity includes:Social network sites user profile and information communication process;Risk point layer includes:Entity is in falseness The perceived risk sources with quantization means of involved energy in information communication process.
Preferably, evaluation module is specifically used for:
Determine indices at different levels, the definition of each index and the determining for each index of the risk point in risk point layer Measure computational methods;
By constructing multilevel iudge matrix two-by-two, consistency check method is taken, determines indices under a certain level Relative weighting;
Indices are calculated according to quantitative calculation method, according to result of calculation and corresponding relative weighting to each The deceptive information of item index is propagated threat and assessed, and the deceptive information faced according to assessment result to the social networking application is propagated Threat is assessed.
Preferably, the rank of risk point layer indices includes:First order index, second level index and the third level refer to Mark, wherein, first order index includes following index:Social network sites, user, information and information communication process, wherein, with society Second level index corresponding to website is handed over to include following index:Using publisher and access terminal;The second level corresponding with user Index includes following index:User identity non-repudiation and End-user relevance;The second level corresponding with information index include with Lower index:Information correlativity and information identifiability;The second level corresponding with information communication process index includes following finger Mark:Transfer mode and communication effect;Wherein, third level index corresponding with application publisher includes following index:Using hair Cloth person's type;Third level index corresponding with access terminal includes following index:Using support platform;With user identity resisting denying Third level index corresponding to property includes following index:Authenticating user identification and IP address concealing technology use;It is related to user Third level index corresponding to property includes following index:User contacts tightness degree;Third level index corresponding with information correlativity Including following index:Information association degree;Third level index corresponding with information identifiability includes following index:Release news Identify granularity, forwarding information identification granularity and comment information identification granularity;Third level index corresponding with transfer mode includes Following index:Information acquiring pattern, information flow direction and communication mode;Third level index bag corresponding with communication effect Include following index:Total number of users and daily active users.
The present invention has the beneficial effect that:
, can be more quickly and accurately to social networking application information disclosure model by means of the technical scheme of the embodiment of the present invention Risk assessment is carried out, finds risk point, so as to enter accommodating preferably to be prevented.
Described above is only the general introduction of technical solution of the present invention, in order to better understand the technological means of the present invention, And can be practiced according to the content of specification, and in order to allow above and other objects of the present invention, feature and advantage can Become apparent, below especially exemplified by the embodiment of the present invention.
Brief description of the drawings
By reading the detailed description of hereafter preferred embodiment, it is various other the advantages of and benefit it is common for this area Technical staff will be clear understanding.Accompanying drawing is only used for showing the purpose of preferred embodiment, and is not considered as to the present invention Limitation.And in whole accompanying drawing, identical part is denoted by the same reference numerals.In the accompanying drawings:
Fig. 1 is the flow chart of the appraisal procedure based on social networking application information disclosure model of the embodiment of the present invention;
Fig. 2 is the schematic diagram of the social networking application information disclosure model of the embodiment of the present invention;
Fig. 3 is that the stratification deceptive information of the embodiment of the present invention propagates risk evaluation model;
Fig. 4 is the risk status column schematic diagram of the typical case of the embodiment of the present invention;
Fig. 5 is the structural representation of the assessment system based on social networking application information disclosure model of the embodiment of the present invention.
Embodiment
The exemplary embodiment of the disclosure is more fully described below with reference to accompanying drawings.Although the disclosure is shown in accompanying drawing Exemplary embodiment, it being understood, however, that may be realized in various forms the disclosure without should be by embodiments set forth here Limited.On the contrary, these embodiments are provided to facilitate a more thoroughly understanding of the present invention, and can be by the scope of the present disclosure Completely it is communicated to those skilled in the art.
Based on this, in order to realize the risk assessment propagated deceptive information in social networks, the invention provides one kind Appraisal procedure and system based on social networking application information disclosure model, system abbreviation IDRAM (Information Dissemination Risk Assessment Method).The embodiment of the present invention is mainly comprising two aspects:(1) base first It is proposed that stratification deceptive information propagates assessment models in the information disclosure model of social networking application.(2) propagate and comment according to deceptive information Estimate model, it is proposed that the indexs at different levels of risk assessment and the computational methods and weight for giving indexs at different levels.This method is right first The information disclosure model of social networking application is analyzed, and is then layered the definition to indexs at different levels and computational methods are combed and table Show, finally by construction multilevel iudge matrix two-by-two, take the method for consistency check to determine a number of factors under a certain level Relative weighting.The security threat that the currently risk assessment to network security lays particular emphasis on during to operation is assessed, most to attack It is data source to hit daily record storehouse and weakness storehouse.Although this method has the advantages that automaticity and repeatable, its data Source is not reflected that deceptive information is propagated and threatened.In recent years, with the sustainable growth of social networks business scale, it is gradually formed It is different from the information disclosure model of tradition application.A kind of possible thinking is started with from the information disclosure model of social networking application, is entered And the institutional framework that information propagates risk is analyzed, using system decomposition technology, propose that the information of a stratification is propagated risk and commented Estimate model.But lack the basic definition and computational methods to assessment models indexs at different levels at present, therefore, it is impossible to directly apply Into social networking application security risk assessment.Based on this, information disclosure model of the embodiment of the present invention based on social networking application, it is proposed that The risk evaluation model and corresponding index definitions at different levels and computational methods propagated for social networking application deceptive information illustrate.
Below in conjunction with accompanying drawing and embodiment, the present invention will be described in further detail.It is it should be appreciated that described herein Specific embodiment only to explain the present invention, not limit the present invention.
Embodiment of the method
According to an embodiment of the invention, there is provided a kind of appraisal procedure based on social networking application information disclosure model, Fig. 1 are The flow chart of the appraisal procedure based on social networking application information disclosure model of the embodiment of the present invention, as shown in figure 1, according to the present invention The appraisal procedure based on social networking application information disclosure model of embodiment includes following processing:
Step 101, the information communication process of social networking application is analyzed and is abstracted, establish social networking application information propagating mode Formula;Preferably, the parameter in the information disclosure model of social networking application specifically includes:Social network sites W:For information propagate starting point and Terminal;User A-N:The publisher and recipient propagated for information;C1-Cn represents user C follower:The biography propagated for information The person of broadcasting and recipient;Information I:For the information of information publisher's proactive dissemination;Information propagates D:Information is propagated for message sender Process;Network environment E:The environment for occurring and completing is propagated for information.
Step 102, based on social networking application information disclosure model, social networking application information is propagated into risk point according to hierarchical relationship Solve as every factor, and every factor is carried out by aggregation combination according to hierarchical relationship according to the correlation between every factor, it is raw Risk evaluation model is propagated into deceptive information;Wherein, the hierarchical relationship of deceptive information propagation risk evaluation model specifically includes:System System layer, physical layer and risk point layer;Wherein, system layer includes:Whole social networks, physical layer include the whole of social networking application Entity involved by individual social networks, wherein, entity includes:Social network sites user profile and information communication process;Risk point Layer includes:The perceived risk sources with quantization means of entity energy involved in deceptive information communication process.Preferably, wind The rank of danger point layer indices includes:First order index, second level index and third level index, wherein, first order index Including following index:Social network sites, user, information and information communication process, wherein, the second level corresponding with social network sites Index includes following index:Using publisher and access terminal;The second level corresponding with user index includes following index: User identity non-repudiation and End-user relevance;The second level corresponding with information index includes following index:Information is related Property and information identifiability;The second level corresponding with information communication process index includes following index:Transfer mode and Communication effect;Wherein, third level index corresponding with application publisher includes following index:Using publisher's type;With access Third level index corresponding to terminal includes following index:Using support platform;The third level corresponding with user identity non-repudiation Index includes following index:Authenticating user identification and IP address concealing technology use;The third level corresponding with End-user relevance Index includes following index:User contacts tightness degree;Third level index corresponding with information correlativity includes following index:Letter Cease correlation degree;Third level index corresponding with information identifiability includes following index:Release news identification granularity, forwarding letter Breath identification granularity and comment information identification granularity;Third level index corresponding with transfer mode includes following index:Information obtains Take mode, information flow direction and communication mode;Third level index corresponding with communication effect includes following index:User Sum and daily active users.
Step 103, initial data based on the risk point in the risk point layer for propagating risk evaluation model by deceptive information, The deceptive information faced to the social networking application is propagated threat and assessed.
Step 103 specifically includes:
Step 1, the indices at different levels of the risk point in risk point layer, the definition of each index and each finger are determined Target quantitative calculation method;
Step 2, by constructing multilevel iudge matrix two-by-two, consistency check method is taken, is determined every under a certain level The relative weighting of index;
Step 3, indices are calculated according to quantitative calculation method, according to result of calculation and corresponding relative power The deceptive information propagation threat to indices is assessed again, and the false letter faced according to assessment result to the social networking application Breath is propagated threat and assessed.
Below in conjunction with accompanying drawing, the above-mentioned technical proposal of the embodiment of the present invention is described in detail.
Method according to embodiments of the present invention specifically includes following processing:
Step 1, in order to from the propagation risk of information dissemination analyzing deceptive information, herein to the letter of social networking application Breath communication mode is abstracted, and proposes that deceptive information propagates risk network, risk assessment problem is converted into hierarchical model The computational problem of indexs at different levels, taste evaluation information propagation risk evaluation model and the information propagation risk of application is analyzed.
Step 2, risk evaluation model is propagated based on information, in order to allow different application that there is comparativity, it is proposed that Ge Jiping Estimate definition and the quantitative approach of index, complete grade classification.
Step 3, by constructing multilevel iudge matrix two-by-two, determined using the method for consistency check under a certain level The relative weighting of a number of factors, and then determine the weight of all indexs.
Step 4, risk evaluation model checking is carried out to risk assessment application example, it was demonstrated that the risk assessment side proposed The correctness and practicality of method.
In an example, two typical social networking applications are have chosen, one is Sina weibo:Sina weibo possesses at present More than 500,000,000 users, daily active users reach 46,200,000;Another is Tengxun's wechat.The two applications all there is information to pass Pass the features such as convenient, interactive mode is novel, and turn into most popular application in social networks.The two applications are divided Analysis, has huge realistic meaning and certain representativeness.By analyzing them, and with it is typical tradition application (with Exemplified by science net blog) it is compared and draws experimental result.Experimental result is shown, from user and information content angle, is risen It is bigger than the risk that Sina weibo generation deceptive information is propagated to interrogate wechat, risk mostlys come from authenticating user identification and information In terms of the identification of content;And from the perspective of information communication process, Sina weibo, may because daily active users are more Deceptive information is propagated farther.From the angle of social network sites, both risks are suitable.In addition, in aforementioned four dimension Two kinds of typical cases have more risk than science net blog.
Below in conjunction with example, the IDRAM methods of the embodiment of the present invention are illustrated, specifically include following five steps Suddenly:
Step 1, the information communication process of social networking application is analyzed and is abstracted, draw the information propagating mode of social networking application Formula.
Step 2, the information disclosure model based on social networking application, risk is propagated to social networking application information according to hierarchical relationship and entered Row decomposes, and is combined each factor by different levels aggregation according to the interrelated influence between factor and degree of membership relation, takes The assessment strategy of " from bottom to top, overall after first part ", using the risk point in deceptive information communication process as basic original number According to, and then assess the deceptive information that the application faces and propagate threat.
Step 3, with reference to the definition and quantitative calculation method for actually providing every evaluation indexes at different levels.
Step 4, a number of factors under each level is determined using multilevel iudge matrix two-by-two and consistency check method Relative weighting.
Step 5, using assessment models caused by this method and relative weighting, risk assessment is carried out to practical application.,
Fig. 2 is the schematic diagram of the social networking application information disclosure model of the embodiment of the present invention, and Fig. 3 is the layer of the embodiment of the present invention Secondaryization deceptive information propagates risk evaluation model, wherein, it is the society according to Fig. 1 that deceptive information, which propagates risk evaluation model (Fig. 3), Hand over what the analysis of application message communication mode was drawn.From the angle analysis of dissemination, the W in center is social network sites in fig. 2, It is the beginning and end that information is propagated;A-N represents different users, is publisher and recipient that information is propagated;C1-CnRepresent User C follower, it is disseminator and recipient that information is propagated;Information I is the information of information publisher's proactive dissemination;Information Propagate D and represent this process of message sender's propagation information;E represents network environment, is that information propagates generation, the environment of completion.
In figure 3, system layer, physical layer and risk point layer are followed successively by from top to bottom.Wherein, physical layer includes social networking application Involved entity, mainly social network sites user profile and information communication process.Risk point layer is propagated comprising deceptive information During involved energy is perceived and the risk sources of quantization means.
Risk size and convenient quantitative calculating for more different risk points, we enter the risk item of each risk point One step illustrates that the structure of the assessment models after refinement is as shown in table 2.Wherein, second and third grade of index user, is believed from social network sites Breath and information communication process four dimensions portray the influence that each key element is propagated deceptive information.
Table 2
The definition of evaluation index at different levels and quantitative scoring in step 3 are described in detail below.
According to the assessment models structure in table 1, definition and explanation are made respectively to evaluation index listed in table.In order to than Compared with and convenience of calculation, the values of all indexs is all using 5 points of systems.
1st, social network sites
Social network sites be information propagate beginning and end, it be social networking application information propagate important factor in order it One.The different parts of social network sites are investigated herein, the most of security study personnel for participating in investigation generally recognize Together:It is to influence the principal element of information propagation using publisher and access terminal.Therefore, we using this two two-level index and This two three-level indexs of platform are supported using publisher's type and application.
Using publisher's type.Include company and personal two classes using publisher's type, respectively by the use of 1 and 5 as they Value.
Using support platform.Refer to using platform is supported using all terminal devices supported.Wind is propagated in deceptive information During danger is assessed, we mainly consider the terminal device of two kinds of main flows:Personal computer, mobile phone.Respectively by the use of 1 and 4 as they Value.Here it is easy to carry to be mainly in view of mobile phone, it is easier to information propagation occurs.When the terminal that application is supported both includes mobile phone When also including personal computer, value can add up.
2nd, user
User is the publisher and recipient of information, is the Primary Actor of information communication process.In social networks, one As in the case of user only and pay close attention to its users to share information.Therefore, issuing the mode of deceptive information has two kinds:One kind is to pass through The user of forged identity is issued, and another kind is the target trust network for building certain scale to issue deceptive information.Herein The risk that both published methods are brought is assessed using the non-repudiation and End-user relevance of user identity.User identity is anti-to be supported Bad property refers to by technological means, analyzes the information content, network behavior and traces behavior promoter's identity using behavior Ability.And End-user relevance describes the close relation degree of user.It is assumed that the close relation degree between two users is got over Height, it is easier that information is transmitted between the two users.As shown in table 3, the dimension includes following three three-level indexs.
Table 3
Authenticating user identification.Used identity information when it describes the user's registration application.It is divided into four grades: Official certification user, real name user, domestic consumer and anonymous, its weight are respectively 1,2,3,5.Computational methods:According to every The number of kind user calculates its ratio, then weighted sum.
IP address concealing technology uses.It is illustrated within a period of time Δ t, and all users use IP to access application The frequent degree of address hiding technology.Its calculation formula:
Because the result is that it is continuous, be not suitable for assessing calculating.We take the method for segmentation:The value is divided into [0, 1week/time],[1week/time,1month/time],[1month/time,0.5year/time],[0.5year/ Time, 1year/time], [1year/time, 99year/time] 5 ranks, difference value 5,4,3,2,1.
User contacts tightness degree.It describes the tightness degree of the contact between all users of the application.User joins The grade classification for being tightness degree is Pyatyi.Level value is bigger, and contact is closer.Table 3 provides user and contacts tightness degree A kind of rank division method.
3rd, information
Information is users to share and the content propagated.Deceptive information is recognized the subjectivity of information user because of its content and property Know and apply harmful effect.The identifiability of correlation and information between information determines what it exerted one's influence to information user Degree.We portray this degree with information association degree and information identification granularity (including issue, forwarding and comment).
Information association degree.It describes the correlation degree between the information of application propagation.Information degree of correlation grade Three-level is divided into, represents the height of content degree of correlation respectively.Level value is bigger, and the degree of correlation is higher.Table 4 provides information phase A kind of obtaining value method of pass degree.
Table 4
Information identifies granularity.It refers to the size of the recognition capability to certain application carrying content.Information identifies grain size category Three-level is divided into, respectively the thickness of representative information identification granularity.Table 5 provides a kind of grade classification side of information identification granularity Method.According to the difference of user action, information identification granularity can be divided into issue forwarding comment information identification granularity.
Table 5
4th, information communication process
Information communication process refers to information via users to share and transmits the transfer process occurred.In information communication process In, the mode of intelligence transmission and communication effect are to influence information to propagate the principal element threatened.We choose information acquiring pattern, letter Circulating direction is ceased, communication mode, total number of users, this 5 principal elements of daily active users, which are used as, portrays information communication process The index that middle deceptive information threatens.
Information acquiring pattern.It refers to the acquisition modes of all information of certain application (or service).This Index Influence The speed that information is propagated.In terms of value, active push:5;It is passive to obtain:1.
The circulating direction of information.It refers to the circulating direction of all information of certain application (or service).Here it is divided into unidirectional Circulate and two-way circulate two kinds, respectively value 1,5.
Communication mode.It refers to certain friendship taken using the receiving-transmitting sides of (or service) all information in interaction Mutual mode.Communication mode is divided into point-to-point mode, hybrid mode and broadcast mode, respectively value 1,3,5.
Total number of users.It refers to the user number using the application, is represented with the actual registered sum of application.Weight is taken The method of value is segmented, number of users carries out value using 500w as step-length, according to the method for segmentation, is respectively divided into 0~500w, 500w ~1000w, 1000w~2000w, in 5 stages of 2000w~10000w and more than 10000w, assignment is respectively 1,2,3,4,5.
Daily active users.It refers to this using the average daily active users in a period of time.Its calculation formula:
Wherein, Numberk′sActiveUsersThe active users of kth day are represented,Represent average daily Active users.The method of segmentation value is taken, number of users carries out assignment using 100w as step-length, according to the method for segmentation, respectively It is divided into 5 stages of 0~100w, 100w~200w, 200w~1000w, 1000w~5000w and more than 5000w, assignment is respectively 1,2,3,4,5.
Determine evaluation index weight:Here following two step is broadly divided into, using multilevel iudge matrix two-by-two is constructed, using one The method that cause property is examined determines the relative weighting of a number of factors under a certain level.The weight determined is as shown in table 6.
Table 6
The embodiment of the present invention goes out the risk status of each dimension according to the definition of risk point, value and weight calculation, it Compareed with tradition application (by taking science net blog as an example), its result is inserted into table 7.Wherein authenticating user identification risk item Score take 100 users to be estimated to obtain at random.
Table 7
Calculated according to the weight that the data of table 7 and table 6 provide, result of calculation is inserted into Fig. 4.Can by table 7 and Fig. 4 Know, applied compared to tradition, social networking application has bigger potential risk in terms of deceptive information propagation.The origin cause of formation of these risks Mainly have:The mobile terminal of social networking application is fast-developing;Anonymous rolls up;Forwarding capability causes information spread speed to add It hurry up;Information acquiring pattern is more convenient etc..
System embodiment
According to an embodiment of the invention, there is provided a kind of assessment system based on social networking application information disclosure model, Fig. 5 are The structural representation of the assessment system based on social networking application information disclosure model of the embodiment of the present invention, as shown in figure 5, according to this The assessment system based on social networking application information disclosure model of inventive embodiments includes:First establishes module 50, second establishes mould The modules of the embodiment of the present invention are described in detail by block 52 and evaluation module 54 below.
First establishes module 50, for the information communication process of social networking application to be analyzed and is abstracted, establishes social answer Use information disclosure model;Preferably, the parameter in the information disclosure model of social networking application specifically includes:Social network sites W:For information The beginning and end of propagation;User A-N:The publisher and recipient propagated for information;C1-Cn represents user C follower:For The disseminator and recipient that information is propagated;Information I:For the information of information publisher's proactive dissemination;Information propagates D:Passed for information The person of broadcasting propagates the process of information;Network environment E:The environment for occurring and completing is propagated for information.
Second establishes module 52, for based on social networking application information disclosure model, believing social networking application according to hierarchical relationship Breath propagates risk and is decomposed into every factor, and is carried out every factor according to hierarchical relationship according to the correlation between every factor Aggregation combination, generation deceptive information propagate risk evaluation model;Wherein, deceptive information propagates the hierarchical relationship of risk evaluation model Specifically include:System layer, physical layer and risk point layer;Preferably, system layer includes:Whole social networks, physical layer include Entity involved by the whole social networks of social networking application, wherein, entity includes:Social network sites user profile and information are propagated Process;Risk point layer includes:Entity energy involved in deceptive information communication process is perceived and the risk of quantization means is come Source.Preferably, the rank of risk point layer indices includes:First order index, second level index and third level index, its In, first order index includes following index:Social network sites, user, information and information communication process, wherein, with social network sites Corresponding second level index includes following index:Using publisher and access terminal;Second level index bag corresponding with user Include following index:User identity non-repudiation and End-user relevance;The second level corresponding with information index includes following finger Mark:Information correlativity and information identifiability;The second level corresponding with information communication process index includes following index:Pass Pass mode and communication effect;Wherein, third level index corresponding with application publisher includes following index:Using publisher Type;Third level index corresponding with access terminal includes following index:Using support platform;With user identity non-repudiation pair The third level index answered includes following index:Authenticating user identification and IP address concealing technology use;With End-user relevance pair The third level index answered includes following index:User contacts tightness degree;Third level index corresponding with information correlativity includes Following index:Information association degree;Third level index corresponding with information identifiability includes following index:Release news identification Granularity, forwarding information identification granularity and comment information identification granularity;Third level index corresponding with transfer mode includes following Index:Information acquiring pattern, information flow direction and communication mode;Third level index corresponding with communication effect include with Lower index:Total number of users and daily active users.
Evaluation module 54, for former based on the risk point in the risk point layer of deceptive information propagation risk evaluation model Beginning data, the deceptive information faced to the social networking application are propagated threat and assessed.
Evaluation module 54 is specifically used for:
Determine indices at different levels, the definition of each index and the determining for each index of the risk point in risk point layer Measure computational methods;By constructing multilevel iudge matrix two-by-two, consistency check method is taken, determines indices under a certain level Relative weighting;Indices are calculated according to quantitative calculation method, according to result of calculation and corresponding relative weighting Deceptive information propagation threat to indices is assessed, and the deceptive information faced according to assessment result to the social networking application Threat is propagated to be assessed.
In summary, the embodiment of the present invention is based on existing hierarchical parsing approach, to the information propagating mode of social networking application Formula is analyzed, and then builds Risk Assessment Index System, and the determination based on the judgment matrix in statistics to evaluation index Studied, so as to design the methods of risk assessment of complete set.Compared with traditional network security risk evaluation method, it has Advantages below.First, in evaluation process, conventional method typically only considers the threat that system operation secure context faces, by orphan Itself risk of vertical weakness carries out simple superposition.Compared to conventional method, the method for the embodiment of the present invention is in social networking application The threat that existing deceptive information is propagated carries out selective analysis, has taken into full account the influence of Risk of Communication, thus compares conventional method It is more accurate.Secondly, conventional method depends on expert opinion unduly in the security risk of relatively risk point so that concrete application Risk does not have comparativity.And in the model of the embodiment of the present invention, some objective risk items are added, facilitate evaluator to lead to More different applications is crossed, finds out the risk point of most security risk, and and then analyzes the risk item of most risk.Finally, The embodiment of the present invention carries out visual representation to assessment result, avoids the information caused by the computational methods of simple superposition risk Loss.
Obviously, those skilled in the art can carry out the essence of various changes and modification without departing from the present invention to the present invention God and scope.So, if these modifications and variations of the present invention belong to the scope of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to comprising including these changes and modification.
Algorithm and display be not inherently related to any certain computer, virtual system or miscellaneous equipment provided herein. Various general-purpose systems can also be used together with teaching based on this.As described above, required by constructing this kind of system Structure be obvious.In addition, the present invention is not also directed to any certain programmed language.It should be understood that it can utilize various Programming language realizes the content of invention described herein, and the description done above to language-specific is to disclose this hair Bright preferred forms.
In the specification that this place provides, numerous specific details are set forth.It is to be appreciated, however, that the implementation of the present invention Example can be put into practice in the case of these no details.In some instances, known method, structure is not been shown in detail And technology, so as not to obscure the understanding of this description.
Similarly, it will be appreciated that in order to simplify the disclosure and help to understand one or more of each inventive aspect, Above in the description to the exemplary embodiment of the present invention, each feature of the invention is grouped together into single implementation sometimes In example, figure or descriptions thereof.However, the method for the disclosure should be construed to reflect following intention:I.e. required guarantor The application claims of shield features more more than the feature being expressly recited in each claim.It is more precisely, such as following Claims reflect as, inventive aspect is all features less than single embodiment disclosed above.Therefore, Thus the claims for following embodiment are expressly incorporated in the embodiment, wherein each claim is in itself Separate embodiments all as the present invention.
Those skilled in the art, which are appreciated that, to carry out adaptivity to the module in the client in embodiment Ground changes and they is arranged in one or more clients different from the embodiment.Can be the module in embodiment A module is combined into, and multiple submodule or subelement or sub-component can be divided into addition.Except such spy Outside at least some in sign and/or process or unit exclude each other, can use any combinations to this specification (including Adjoint claim, summary and accompanying drawing) disclosed in all features and so disclosed any method or client All processes or unit are combined.Unless expressly stated otherwise, this specification (including adjoint claim, summary and attached Figure) disclosed in each feature can be replaced by the alternative features for providing identical, equivalent or similar purpose.
In addition, it will be appreciated by those of skill in the art that although some embodiments described herein include other embodiments In included some features rather than further feature, but the combination of the feature of different embodiments means in of the invention Within the scope of and form different embodiments.For example, in the following claims, embodiment claimed is appointed One of meaning mode can use in any combination.
The all parts embodiment of the present invention can be realized with hardware, or to be run on one or more processor Software module realize, or realized with combinations thereof.It will be understood by those of skill in the art that it can use in practice Microprocessor or digital signal processor (DSP) realize the client for being loaded with sequence network address according to embodiments of the present invention In some or all parts some or all functions.The present invention is also implemented as described herein for performing The some or all equipment or program of device (for example, computer program and computer program product) of method.So Realization the present invention program can store on a computer-readable medium, or can have one or more signal shape Formula.Such signal can be downloaded from internet website and obtained, and either be provided or with any other shape on carrier signal Formula provides.
It should be noted that the present invention will be described rather than limits the invention for above-described embodiment, and ability Field technique personnel can design alternative embodiment without departing from the scope of the appended claims.In the claims, Any reference symbol between bracket should not be configured to limitations on claims.Word "comprising" does not exclude the presence of not Element or step listed in the claims.Word "a" or "an" before element does not exclude the presence of multiple such Element.The present invention can be by means of including the hardware of some different elements and being come by means of properly programmed computer real It is existing.In if the unit claim of equipment for drying is listed, several in these devices can be by same hardware branch To embody.The use of word first, second, and third does not indicate that any order.These words can be explained and run after fame Claim.

Claims (8)

  1. A kind of 1. appraisal procedure based on social networking application information disclosure model, it is characterised in that including:
    The information communication process of social networking application is analyzed and is abstracted, establishes social networking application information disclosure model;
    Based on social networking application information disclosure model, according to hierarchical relationship by social networking application information propagation risk be decomposed into it is every because Element, and every factor is carried out by aggregation combination according to the hierarchical relationship according to the correlation between every factor, generation is false Information propagates risk evaluation model;Wherein, the hierarchical relationship of deceptive information propagation risk evaluation model specifically includes:System layer, Physical layer and risk point layer;
    Initial data based on risk point in the risk point layer for propagating risk evaluation model by the deceptive information, to the social activity Threat is propagated using the deceptive information faced to be assessed;
    The rank of the risk point layer indices includes:First order index, second level index and third level index, wherein, First order index includes following index:Social network sites, user, information and information communication process, wherein, with the social network Second level index corresponding to standing includes following index:Using publisher and access terminal;The second level corresponding with the user Index includes following index:User identity non-repudiation and End-user relevance;Second level index bag corresponding with described information Include following index:Information correlativity and information identifiability;The second level corresponding with described information communication process index includes Following index:Transfer mode and communication effect;Wherein, third level index corresponding with the application publisher includes following Index:Using publisher's type;Third level index corresponding with the access terminal includes following index:Using support platform; Third level index corresponding with the user identity non-repudiation includes following index:Authenticating user identification and IP address are hidden Tibetan technology uses;Third level index corresponding with the End-user relevance includes following index:User contacts tightness degree;With institute Stating third level index corresponding to information correlativity includes following index:Information association degree;It is corresponding with described information identifiability Third level index include following index:Release news identification granularity, forwarding information identification granularity and comment information identification grain Degree;Third level index corresponding with the transfer mode includes following index:Information acquiring pattern, information flow direction and Communication mode;Third level index corresponding with the communication effect includes following index:Total number of users and daily any active ues Number.
  2. 2. the method as described in claim 1, it is characterised in that the parameter in the information disclosure model of social networking application is specifically wrapped Include:Social network sites W:The beginning and end propagated for information;User A-N:The publisher and recipient propagated for information;C1-CnGeneration Table user C follower:The disseminator and recipient propagated for information;Information I:For the information of information publisher's proactive dissemination; Information propagates D:The process of information is propagated for message sender;Network environment E:The environment for occurring and completing is propagated for information.
  3. 3. the method as described in claim 1, it is characterised in that the system layer includes:Whole social networks, the physical layer Entity involved by whole social networks including social networking application, wherein, the entity includes:Social network sites user profile and Information communication process;The risk point layer includes:Entity energy involved in deceptive information communication process it is perceived and The risk sources of quantization means.
  4. 4. the method as described in claim 1, it is characterised in that the risk point of risk evaluation model is propagated with the deceptive information Initial data based on risk point in layer, the deceptive information faced to the social networking application propagate threat and carry out assessing specific bag Include:
    Determine indices at different levels, the definition of each index and the determining for each index of the risk point in the risk point layer Measure computational methods;
    By constructing multilevel iudge matrix two-by-two, consistency check method is taken, determines the relative of indices under a certain level Weight;
    The indices are calculated according to the quantitative calculation method, according to result of calculation and corresponding relative weighting Deceptive information propagation threat to the indices is assessed, and the social networking application is faced according to the assessment result Deceptive information is propagated threat and assessed.
  5. A kind of 5. assessment system based on social networking application information disclosure model, it is characterised in that
    First establishes module, for the information communication process of social networking application to be analyzed and is abstracted, establishes social networking application information Communication mode;
    Second establishes module, for based on social networking application information disclosure model, propagating social networking application information according to hierarchical relationship Risk is decomposed into every factor, and is gathered every factor according to the hierarchical relationship according to the correlation between every factor Collection combination, generation deceptive information propagate risk evaluation model;Wherein, deceptive information propagates the hierarchical relationship tool of risk evaluation model Body includes:System layer, physical layer and risk point layer;
    Evaluation module, for original based on the risk point in the risk point layer of deceptive information propagation risk evaluation model Data, the deceptive information faced to the social networking application are propagated threat and assessed;
    The rank of the risk point layer indices includes:First order index, second level index and third level index, wherein, First order index includes following index:Social network sites, user, information and information communication process, wherein, with the social network Second level index corresponding to standing includes following index:Using publisher and access terminal;The second level corresponding with the user Index includes following index:User identity non-repudiation and End-user relevance;Second level index bag corresponding with described information Include following index:Information correlativity and information identifiability;The second level corresponding with described information communication process index includes Following index:Transfer mode and communication effect;Wherein, third level index corresponding with the application publisher includes following Index:Using publisher's type;Third level index corresponding with the access terminal includes following index:Using support platform; Third level index corresponding with the user identity non-repudiation includes following index:Authenticating user identification and IP address are hidden Tibetan technology uses;Third level index corresponding with the End-user relevance includes following index:User contacts tightness degree;With institute Stating third level index corresponding to information correlativity includes following index:Information association degree;It is corresponding with described information identifiability Third level index include following index:Release news identification granularity, forwarding information identification granularity and comment information identification grain Degree;Third level index corresponding with the transfer mode includes following index:Information acquiring pattern, information flow direction and Communication mode;Third level index corresponding with the communication effect includes following index:Total number of users and daily any active ues Number.
  6. 6. system as claimed in claim 5, it is characterised in that the parameter in the information disclosure model of social networking application is specifically wrapped Include:Social network sites W:The beginning and end propagated for information;User A-N:The publisher and recipient propagated for information;C1-CnGeneration Table user C follower:The disseminator and recipient propagated for information;Information I:For the information of information publisher's proactive dissemination; Information propagates D:The process of information is propagated for message sender;Network environment E:The environment for occurring and completing is propagated for information.
  7. 7. system as claimed in claim 5, it is characterised in that the system layer includes:Whole social networks, the physical layer Entity involved by whole social networks including social networking application, wherein, the entity includes:Social network sites user profile and Information communication process;The risk point layer includes:Entity energy involved in deceptive information communication process it is perceived and The risk sources of quantization means.
  8. 8. system as claimed in claim 5, it is characterised in that the evaluation module is specifically used for:
    Determine indices at different levels, the definition of each index and the determining for each index of the risk point in the risk point layer Measure computational methods;
    By constructing multilevel iudge matrix two-by-two, consistency check method is taken, determines the relative of indices under a certain level Weight;
    The indices are calculated according to the quantitative calculation method, according to result of calculation and corresponding relative weighting Deceptive information propagation threat to the indices is assessed, and the social networking application is faced according to the assessment result Deceptive information is propagated threat and assessed.
CN201410592639.3A 2014-10-29 2014-10-29 Appraisal procedure and system based on social networking application information disclosure model Active CN104408659B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410592639.3A CN104408659B (en) 2014-10-29 2014-10-29 Appraisal procedure and system based on social networking application information disclosure model

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410592639.3A CN104408659B (en) 2014-10-29 2014-10-29 Appraisal procedure and system based on social networking application information disclosure model

Publications (2)

Publication Number Publication Date
CN104408659A CN104408659A (en) 2015-03-11
CN104408659B true CN104408659B (en) 2017-12-19

Family

ID=52646288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410592639.3A Active CN104408659B (en) 2014-10-29 2014-10-29 Appraisal procedure and system based on social networking application information disclosure model

Country Status (1)

Country Link
CN (1) CN104408659B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101802864A (en) * 2007-07-20 2010-08-11 惠普开发有限公司 Information propagation analyzing system, information propagation analyzing apparatus, method of information propagation analysis and program therefor
CN103220288A (en) * 2013-04-12 2013-07-24 苏州通付盾信息技术有限公司 Safe-operation method of social platform
TW201413488A (en) * 2012-09-18 2014-04-01 Univ Kun Shan A malware signature-based analysis of information security risk assessment system
CN103843007A (en) * 2011-10-03 2014-06-04 国际商业机器公司 Assessing social risk due to exposure from linked contacts

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2010026666A (en) * 2008-07-16 2010-02-04 Sony Computer Entertainment Inc Related information presentation system, related information presentation method, program and information storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101802864A (en) * 2007-07-20 2010-08-11 惠普开发有限公司 Information propagation analyzing system, information propagation analyzing apparatus, method of information propagation analysis and program therefor
CN103843007A (en) * 2011-10-03 2014-06-04 国际商业机器公司 Assessing social risk due to exposure from linked contacts
TW201413488A (en) * 2012-09-18 2014-04-01 Univ Kun Shan A malware signature-based analysis of information security risk assessment system
CN103220288A (en) * 2013-04-12 2013-07-24 苏州通付盾信息技术有限公司 Safe-operation method of social platform

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
A note on maximizing the spread of influence in social networks;Even-Dar E,ShaPira A;《LNCS 4858:Proc of WINE.Berline:Springer》;20071231;第281-286页 *
基于完全级联传播模型的社区影响最大化;冀进朝,韩笑,王喆;《吉林大学学报(理学版)》;20090926(第05期);第1032-1034页 *
基于社交网络的安全关系研究;李阳,王晓岩,王昆;《计算机研究与发展》;20121215(第S2期);第124-130页 *
社会网络分析和社团信息挖掘的三项探索——挖掘虚拟社团的结构、核心和通信行为;唐常杰,刘威;《计算机应用》;20060901(第09期);第2020-2023页 *

Also Published As

Publication number Publication date
CN104408659A (en) 2015-03-11

Similar Documents

Publication Publication Date Title
Zhang et al. Online astroturfing: A theoretical perspective
Miltgen et al. Introducing new products that affect consumer privacy: A mediation model
Rotman et al. From slacktivism to activism: participatory culture in the age of social media
Williams et al. Network analysis reveals open forums and echo chambers in social media discussions of climate change
Jiang et al. Graphical evolutionary game for information diffusion over social networks
CN102754094B (en) For the system and method for the content classification to user or user's generation
Shen et al. Discovering social spammers from multiple views
CN103136330B (en) Based on the User reliability appraisal procedure of microblog
CN103218412B (en) Public feelings information processing method and device
Khayyambashi et al. An approach for detecting profile cloning in online social networks
Ranganath et al. Facilitating time critical information seeking in social media
Tudkuea et al. Development of indicators of cyberbullying among youths in Songkhla Province
Andalib et al. A study on measuring the quality of university website
Seo et al. Three Korean perspectives on US internet public diplomacy
CN102779126B (en) Internet virtual space user credibility evaluation method based on game theory
Li et al. Multi-layer network for influence propagation over microblog
Al-Khateeb et al. Developing a conceptual framework for modeling deviant cyber flash mob: a socio-computational approach leveraging hypergraph constructs
CN104408659B (en) Appraisal procedure and system based on social networking application information disclosure model
Wells et al. Assessing the credibility of cyber adversaries
Botha et al. Reflecting on 20 SEC conferences
De Meo et al. Improving the compactness in social network thematic groups by exploiting a multi-dimensional user-to-group matching algorithm
Niazi Torshiz et al. Collusion-resistant worker selection in social crowdsensing systems
Srivastava et al. Case Study: An Efficient Survey on Security Analysis of Social Networking
Wu et al. The spatial difference of multi-layer climate change information flow and network construction: A comparison of “dual carbon” scenarios
Kabbaj A Call for Responsibility: Social Media and the Need to Monitor Hate Speech and Fake News for Global Peace

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant