Learn More
In this paper, we propose a novel method for the prediction of a person's success in an academic course. By extracting log data from the course's website and applying network analysis methods, we were able to model and visualize the social interactions among the students in a course. For our analysis, we extracted a variety of features by using both graph(More)
—Today's social networks are plagued by numerous types of malicious profiles which can range from socialbots to sexual predators. We present a novel method for the detection of these malicious profiles by using the social network's own topological features only. Reliance on these features alone ensures that the proposed method is generic enough to be(More)
—Traffic measurements, road safety studies, and surveys are required for efficient road planning and ensuring the safety of transportation. Unfortunately, these methods can be cumbersome and very expensive. In this paper we point out a source of transportation information that is based on collaborative community-based navigation applications, such as Waze.(More)
—Online social networking sites have become increasingly popular over the last few years. As a result, new interdisci-plinary research directions have emerged in which social network analysis methods are applied to networks containing hundreds millions of users. Unfortunately, links between individuals may be missing either due to imperfect acquirement(More)
—In recent years, Online Social Networks (OSNs) have essentially become an integral part of our daily lives. There are hundreds of OSNs, each with its own focus and offers for particular services and functionalities. To take advantage of the full range of services and functionalities that OSNs offer, users often create several accounts on various OSNs using(More)
—As truly ubiquitous wearable computers, mobile phones are quickly becoming the primary source for social, be-havioral, and environmental sensing and data collection. Today's smartphones are equipped with increasingly more sensors and accessible data types that enable the collection of literally dozens of signals regarding the phone, its user, and their(More)
One dimension on the Internet, which has gained great popularity in recent years are the online social networks (OSNs). Users all over the globe write, share, and publish personal information about themselves, their friends, and their workplace. In this study we present a method for infiltrating specific users in targeted organizations by using(More)
— In the recent years we have seen a significant growth in the usage of online social networks. Common networks like Facebook, Twitter, Pinterest, and LinkedIn have become popular all over the world. In these networks users write, share, and publish personal information about themselves, their friends, and their workplace. In this study we present a method(More)
The amount of personal information involuntarily exposed by users on online social networks is staggering, as shown in recent research. Moreover, recent reports indicate that these networks are inundated with tens of millions of fake user profiles, which may jeopardize the user’s security and privacy. To identify fake users in such networks and to improve(More)