Mining Social Networks and Security Informatics (eBook)

eBook Download: PDF
2013 | 2013
VI, 283 Seiten
Springer Netherland (Verlag)
978-94-007-6359-3 (ISBN)

Lese- und Medienproben

Mining Social Networks and Security Informatics -
Systemvoraussetzungen
96,29 inkl. MwSt
  • Download sofort lieferbar
  • Zahlungsarten anzeigen
Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.  The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.
Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics. The volume will also serve as a general reference for readers that would want to become familiar with current research in the fastgrowing field of cybersecurity.

A Model for Dynamic Integration of Data Sources; M. Obali,  B. Dursun.- Overlapping community structure and modular overlaps in complex networks; Q. Wang and E. Fleury.- Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data; F. Johansson and P.  Svenson.-Privacy Breach Analysis in Social Networks; F.  Nagle.- Partitioning Breaks Communities; F. Reid et al.-SAINT: Supervised Actor Identification for Network Tuning; M. Farrugia et al.- Holder and Topic based Analysis of Emotions on Blog Texts: a Case Study for Bengali; D. Das, S. Bandyopadhyay.- Predicting Number of Zombies in a DDoS Attacks using Isotonic Regression; B. B. Gupta, N. Jamali.- Developing a Hybrid Framework for a Web-Page Recommender System; V. Anastopoulos et al.- Evaluation and Development of Data Mining Tools for Social Network Analysis; D. Murthy et al.- Learning To Detect Vandalism in Social Content Systems: A Study On Wikipedia Vandalism Detection in Wikipedia; S. Javanmardi et al.- Perspective on Measurement Metrics for Community Detection Algorithms; Y. Yang et al.- A Study of Malware Propagation via Online Social Networking; M.R. Faghani, U.T. Nguyen.- Estimating the Importance of Terrorists in a Terror Network; A.  Elhajj et al.-

Erscheint lt. Verlag 1.6.2013
Reihe/Serie Lecture Notes in Social Networks
Lecture Notes in Social Networks
Zusatzinfo VI, 283 p. 92 illus.
Verlagsort Dordrecht
Sprache englisch
Themenwelt Informatik Datenbanken Data Warehouse / Data Mining
Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Web / Internet
Naturwissenschaften Physik / Astronomie
Sozialwissenschaften Politik / Verwaltung
Technik Bauwesen
Wirtschaft
Schlagworte Complexity • Dynamic Integration Data Sources • Fuzzy Community Structures • Malware Propagation Social Networks • Measuremen Metrics Community Detection Algorithms • Privacy and Social Networks • Saint • Similarity Measures Terrorist Networks • Terrorist Network Anal • Terrorist Network Analysis
ISBN-10 94-007-6359-X / 940076359X
ISBN-13 978-94-007-6359-3 / 9789400763593
Haben Sie eine Frage zum Produkt?
PDFPDF (Wasserzeichen)
Größe: 7,5 MB

DRM: Digitales Wasserzeichen
Dieses eBook enthält ein digitales Wasser­zeichen und ist damit für Sie persona­lisiert. Bei einer missbräuch­lichen Weiter­gabe des eBooks an Dritte ist eine Rück­ver­folgung an die Quelle möglich.

Dateiformat: PDF (Portable Document Format)
Mit einem festen Seiten­layout eignet sich die PDF besonders für Fach­bücher mit Spalten, Tabellen und Abbild­ungen. Eine PDF kann auf fast allen Geräten ange­zeigt werden, ist aber für kleine Displays (Smart­phone, eReader) nur einge­schränkt geeignet.

Systemvoraussetzungen:
PC/Mac: Mit einem PC oder Mac können Sie dieses eBook lesen. Sie benötigen dafür einen PDF-Viewer - z.B. den Adobe Reader oder Adobe Digital Editions.
eReader: Dieses eBook kann mit (fast) allen eBook-Readern gelesen werden. Mit dem amazon-Kindle ist es aber nicht kompatibel.
Smartphone/Tablet: Egal ob Apple oder Android, dieses eBook können Sie lesen. Sie benötigen dafür einen PDF-Viewer - z.B. die kostenlose Adobe Digital Editions-App.

Zusätzliches Feature: Online Lesen
Dieses eBook können Sie zusätzlich zum Download auch online im Webbrowser lesen.

Buying eBooks from abroad
For tax law reasons we can sell eBooks just within Germany and Switzerland. Regrettably we cannot fulfill eBook-orders from other countries.

Mehr entdecken
aus dem Bereich
Datenschutz und Sicherheit in Daten- und KI-Projekten

von Katharine Jarmul

eBook Download (2024)
O'Reilly Verlag
24,99