Normal View MARC View ISBD View

Mining Social Networks and Security Informatics

by Özyer, Tansel.
Authors: Erdem, Zeki.%editor. | Rokne, Jon.%editor. | Khoury, Suheil.%editor. | SpringerLink (Online service) Series: Lecture Notes in Social Networks, 2190-5428 Physical details: VI, 283 p. 92 illus. online resource. ISBN: 940076359X Subject(s): Physics. | Data mining. | Engineering. | Economics, Mathematical. | Criminology. | Physics. | Security Science and Technology. | Data Mining and Knowledge Discovery. | Criminology & Criminal Justice. | Game Theory/Mathematical Methods. | Complexity.
Tags from this library:
No tags from this library for this title.
Item type Location Call Number Status Date Due
E-Book E-Book AUM Main Library 621.389 (Browse Shelf) Not for loan

A Model for Dynamic Integration of Data Sources -- Overlapping community structure and modular overlaps in complex networks -- Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data -- Privacy Breach Analysis in Social Networks -- Partitioning Breaks Communities -- SAINT: Supervised Actor Identification for Network Tuning -- Holder and Topic based Analysis of Emotions on Blog Texts: a Case Study for Bengali -- Predicting Number of Zombies in a DDoS Attacks using Isotonic Regression -- Developing a Hybrid Framework for a Web-Page Recommender System -- Evaluation and Development of Data Mining Tools for Social Network Analysis -- Learning To Detect Vandalism in Social Content Systems: A Study On Wikipedia Vandalism Detection in Wikipedia -- Perspective on Measurement Metrics for Community Detection Algorithms -- A Study of Malware Propagation via Online Social Networking -- Estimating the Importance of Terrorists in a Terror Network.

Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.  The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.

There are no comments for this item.

Log in to your account to post a comment.