TY - BOOK AU - Özyer,Sibel Tarıyan AU - Kaya,Buket TI - Cyber Security and Social Media Applications T2 - Lecture Notes in Social Networks, SN - 9783031330650 U1 - 302,231 23 PY - 2023/// CY - Cham PB - Springer Nature Switzerland, Imprint: Springer KW - Social media KW - Machine learning KW - Data mining KW - Image processing KW - Digital techniques KW - Computer vision KW - Social Media KW - Machine Learning KW - Data Mining and Knowledge Discovery KW - Computer Imaging, Vision, Pattern Recognition and Graphics N1 - Chapter 1. Powering Blogosphere Analytics with BlogTracker: COVID-19 Case Study (Akinnubi) -- Chapter 2. Parallelized Cyber Reconnaissance Automation: A Real-Time and Scheduled Security Scanner (Malkawi) -- Chapter 3. Using Smart Glasses for Monitoring Cyber Threat Intelligence Feeds in a Multitasking Environment (Korkiakoski) -- Chapter 4. Effects of Global and Local Network Structure on Number of Driver Nodes in Complex Networks (Sadaf) -- Chapter 5. A Lightweight Global Taxonomy Induction System for E-Commerce Concept Labels (Shen) -- Chapter 6. Exploring Online Video Narratives and Networks using VTracker (Marcoux) -- Chapter 7. Twitter Credibility Score for Preventing Fake News Dissemination on Twitter (Alhajj) -- Chapter 8. Detecting Trending Topics and Influence on Social Media (Alhajj) N2 - This book offers an excellent source of knowledge for readers who are interested in keeping up with the developments in the field of cyber security and social media analysis. It covers the possibility of using augmented reality to monitor cyber security feeds in a multitasking environment. It describes a real-time scheduled security scanner. E-commerce concept labeling is tackled by introducing a lightweight global taxonomy induction system. Blogsphere analytics and online video narratives and networks are explored. The effect of global and local network structure, credibility based prevention of fake news dissemination, and detection of trending topics and influence from social media are investigated. This book helps the reader in developing their own perspective about how to deal with cyber security and how to benefit from the development in technology to tackle cyber security issues. The reader of this book will realize how to use various machine learning techniques for tackling various applications involving social medial analysis UR - https://doi.org/10.1007/978-3-031-33065-0 ER -