Content Filtering on Social Networking Sites with Fuzzy Logic
Abstract
Full Text:
PDFReferences
Adikari,S; Dutta,K[2014].Identifying Fake Profiles in Linkedin,18th Pacific Asia Conference on Information Systems ,Chengdu, China, Vol. 18, Issue No. 11,pp. 1516-1528.
Aldhafferi,N; Watson ,C[2013].Personal Information Privacy settings of online social networks and their suitability for Mobile Internet devices, International Journal of Security, Privacy and Trust Management ( IJSPTM) ,Vol. 2,Issue No. 3,pp. 2277 – 5498.
Casillas,J;Herrera, [2003].Interpretability issues in fuzzy modelling, Studies in Fuzziness and Soft Computing. Springer, Vol. 128,pp. 3-22.
Dahiya,V; Sajja,P[2012]. Designing of Fuzzy rule base for Vision Defects, ,Int.J.Computer Technology & Applications ,Vol 3,Issue No.2, pp. 734-737.
Denning, D.E.[1987].An Intrusion Detection Model, IEEE Trans. Software Eng., Vol.13,Issue No. 2, pp. 222–232.
Dhami, A; Agarwal, N. [2013].Impact o trust, security and privacy concerns in social networking, Advance Computing Conference (IACC ) IEEE 3rd International, pp. 465 – 469.
Fusco,S.J.; Abbas,R,[2012]. Location-based social networking: impact on trust in relationships. IEEE Technology and Society Magazine, Vol. 31, Issue No 2, pp. 39-50.
Heberlein; Dias,L .T. [1990]. A network security monitor. In proceedings of the IEEE Synopsium on research in security and privacy, Vol. 8, Issue No.3,pp. 296-304.
Ko, M.N. ;Cheek,G.P [2010].Social Network Connect Services, IEEE Computer Society, Vol. 43, Issue No.8, pp. 37-43.
Li,N ; Chen,G [2010].Analysis of a Location-based Social Network, IEEE Network, Vol. 24 , Issue No. 5 , pp. 20-25.
Sajja ,P.S[2008]. Fuzzy artificial neural network decision support system for course selection, Journal of Engineering and Technology, Vol.2, Issue No.2, pp.96-102.
DOI: https://doi.org/10.23956/ijarcsse/V7I6/0264
Refbacks
- There are currently no refbacks.