{"id":"https://openalex.org/W4214845822","doi":"https://doi.org/10.1109/iscisc53448.2021.9720314","title":"A Trust-Based Vulnerability Analysis in Signed Social Networks","display_name":"A Trust-Based Vulnerability Analysis in Signed Social Networks","publication_year":2021,"publication_date":"2021-09-01","ids":{"openalex":"https://openalex.org/W4214845822","doi":"https://doi.org/10.1109/iscisc53448.2021.9720314"},"language":"en","primary_location":{"id":"doi:10.1109/iscisc53448.2021.9720314","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc53448.2021.9720314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101074523","display_name":"Mansooreh Mirzaie","orcid":null},"institutions":[{"id":"https://openalex.org/I3132257708","display_name":"Golpayegan University of Engineering","ror":"https://ror.org/03r7vnf29","country_code":"IR","type":"education","lineage":["https://openalex.org/I3132257708"]},{"id":"https://openalex.org/I170013655","display_name":"Isfahan University of Technology","ror":"https://ror.org/00af3sa43","country_code":"IR","type":"education","lineage":["https://openalex.org/I170013655"]}],"countries":["IR"],"is_corresponding":true,"raw_author_name":"Mansooreh Mirzaie","raw_affiliation_strings":["Golpayegan College of Engineering, Isfahan University of Technology,Department of Electrical and Computer Engineering,Golpayegan,Iran"],"affiliations":[{"raw_affiliation_string":"Golpayegan College of Engineering, Isfahan University of Technology,Department of Electrical and Computer Engineering,Golpayegan,Iran","institution_ids":["https://openalex.org/I3132257708","https://openalex.org/I170013655"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5033984005","display_name":"Maryam Nooraei Abadeh","orcid":"https://orcid.org/0000-0002-6221-7008"},"institutions":[{"id":"https://openalex.org/I110525433","display_name":"Islamic Azad University, Tehran","ror":"https://ror.org/01kzn7k21","country_code":"IR","type":"education","lineage":["https://openalex.org/I110525433"]}],"countries":["IR"],"is_corresponding":false,"raw_author_name":"Maryam Nooraei Abadeh","raw_affiliation_strings":["Abadan Branch Islamic Azad University,Department of Computer Engineering,Abadan,Iran"],"affiliations":[{"raw_affiliation_string":"Abadan Branch Islamic Azad University,Department of Computer Engineering,Abadan,Iran","institution_ids":["https://openalex.org/I110525433"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101074523"],"corresponding_institution_ids":["https://openalex.org/I170013655","https://openalex.org/I3132257708"],"apc_list":null,"apc_paid":null,"fwci":0.363,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.75262531,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":"650","issue":null,"first_page":"23","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10557","display_name":"Social Media and Politics","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/3315","display_name":"Communication"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.722412109375},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.711961567401886},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6013103127479553},{"id":"https://openalex.org/keywords/robustness","display_name":"Robustness (evolution)","score":0.5663356781005859},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.5662326216697693},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.46347320079803467},{"id":"https://openalex.org/keywords/function","display_name":"Function (biology)","score":0.4252352714538574},{"id":"https://openalex.org/keywords/bridging","display_name":"Bridging (networking)","score":0.41654354333877563},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.13881516456604004},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.09450608491897583}],"concepts":[{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.722412109375},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.711961567401886},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6013103127479553},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.5663356781005859},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.5662326216697693},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.46347320079803467},{"id":"https://openalex.org/C14036430","wikidata":"https://www.wikidata.org/wiki/Q3736076","display_name":"Function (biology)","level":2,"score":0.4252352714538574},{"id":"https://openalex.org/C174348530","wikidata":"https://www.wikidata.org/wiki/Q188635","display_name":"Bridging (networking)","level":2,"score":0.41654354333877563},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.13881516456604004},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.09450608491897583},{"id":"https://openalex.org/C78458016","wikidata":"https://www.wikidata.org/wiki/Q840400","display_name":"Evolutionary biology","level":1,"score":0.0},{"id":"https://openalex.org/C55493867","wikidata":"https://www.wikidata.org/wiki/Q7094","display_name":"Biochemistry","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C104317684","wikidata":"https://www.wikidata.org/wiki/Q7187","display_name":"Gene","level":2,"score":0.0},{"id":"https://openalex.org/C185592680","wikidata":"https://www.wikidata.org/wiki/Q2329","display_name":"Chemistry","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/iscisc53448.2021.9720314","is_oa":false,"landing_page_url":"https://doi.org/10.1109/iscisc53448.2021.9720314","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2021 18th International ISC Conference on Information Security and Cryptology (ISCISC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":38,"referenced_works":["https://openalex.org/W120301130","https://openalex.org/W1583207693","https://openalex.org/W1749770886","https://openalex.org/W1967385589","https://openalex.org/W1975492545","https://openalex.org/W1984975458","https://openalex.org/W1987468019","https://openalex.org/W1999290017","https://openalex.org/W2023743599","https://openalex.org/W2045623532","https://openalex.org/W2051650632","https://openalex.org/W2054539343","https://openalex.org/W2056510402","https://openalex.org/W2065769502","https://openalex.org/W2070207525","https://openalex.org/W2073415627","https://openalex.org/W2105951053","https://openalex.org/W2114051435","https://openalex.org/W2114633054","https://openalex.org/W2134746982","https://openalex.org/W2135363691","https://openalex.org/W2144780381","https://openalex.org/W2169495811","https://openalex.org/W2341769372","https://openalex.org/W2470757901","https://openalex.org/W2510001819","https://openalex.org/W2540169294","https://openalex.org/W2556609853","https://openalex.org/W2581491322","https://openalex.org/W2744878627","https://openalex.org/W2811092953","https://openalex.org/W2890102673","https://openalex.org/W2902252979","https://openalex.org/W2964140784","https://openalex.org/W3014448911","https://openalex.org/W3021429802","https://openalex.org/W3103657871","https://openalex.org/W6752978003"],"related_works":["https://openalex.org/W3040662175","https://openalex.org/W2053103169","https://openalex.org/W1807477017","https://openalex.org/W2916567375","https://openalex.org/W2584455473","https://openalex.org/W1555088513","https://openalex.org/W1159231614","https://openalex.org/W2998028709","https://openalex.org/W1530688075","https://openalex.org/W2083180731"],"abstract_inverted_index":{"There":[0],"has":[1],"been":[2],"a":[3,54,65,80,141,152,168,178,189],"considerable":[4],"growth":[5],"in":[6,8,56,64,105,128],"interest":[7],"the":[9,19,36,51,73,86,89,100,103,112,123,130,137,162,182,185,191],"modeling":[10],"and":[11,22,33,42,60,110],"analyzing":[12],"of":[13,25,38,53,88,102,107,114,116,125,140,154,164,184,188],"signed":[14],"social":[15,66],"networks":[16],"(SSNs).":[17],"However,":[18],"anonymity,":[20],"dispersed,":[21],"open":[23],"character":[24],"these":[26],"frameworks,":[27],"which":[28],"stimulate":[29],"users'":[30,62],"communication":[31],"capacities,":[32],"contribute":[34],"to":[35,49,58,71,98,197],"spread":[37],"low-quality":[39],"information,":[40],"assaults,":[41],"manipulations":[43],"from":[44],"malicious":[45],"users.":[46],"In":[47,91],"order":[48],"improve":[50],"robustness":[52],"network":[55,142,190,192],"response":[57],"anonymity":[59],"increasing":[61],"confidence":[63],"network,":[67],"it":[68],"is":[69,133,194],"critical":[70],"analyze":[72,111,122,161],"vulnerability":[74,101,124],"for":[75,171],"external":[76],"disturbances":[77],"such":[78],"as":[79],"random":[81],"defense":[82],"attack":[83],"that":[84,135],"targets":[85],"trust-ability":[87],"network.":[90],"this":[92],"paper,":[93],"we":[94],"propose":[95],"an":[96],"approach":[97],"capture":[99],"SSNs":[104,117],"terms":[106],"pairwise":[108],"trusts":[109],"change":[113,156],"balance":[115,127],"under":[118],"various":[119],"changes.":[120],"To":[121],"structural":[126],"SSNs,":[129],"most":[131],"challenge":[132],"finding":[134],"how":[136],"energy":[138,165,186],"function":[139,166,187],"will":[143],"be":[144,198],"changed":[145],"when":[146],"popular":[147],"nodes,":[148],"especially":[149],"nodes":[150,172],"with":[151],"high-value":[153],"trust,":[155],"their":[157],"signs.":[158],"We":[159],"also":[160],"changes":[163],"using":[167],"ranking":[169],"method":[170],"based":[173],"on":[174],"trust":[175],"values.":[176],"As":[177],"result,":[179],"by":[180],"changing":[181],"value":[183],"structure":[193],"likely":[195],"intended":[196],"unbalanced.":[199]},"counts_by_year":[{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
