全部版块 我的主页
论坛 提问 悬赏 求职 新闻 读书 功能一区 藏经阁
1202 5
2013-09-17
Mining Social Networks and Security Informatics.pdf
大小:(7.23 MB)

只需: 3 个论坛币  马上下载


Contents
A Model for Dynamic Integration of Data Sources . . . . . . . . . . . . . 1
Murat Obali and Bunyamin Dursun
Overlapping Community Structure and Modular Overlaps in Complex
Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
Qinna Wang and Eric Fleury
Constructing and Analyzing Uncertain Social Networks
from Unstructured Textual Data . . . . . . . . . . . . . . . . . . . . 41
Fredrik Johansson and Pontus Svenson
Privacy Breach Analysis in Social Networks . . . . . . . . . . . . . . . . . 63
Frank Nagle
Partitioning Breaks Communities . . . . . . . . . . . . . . . . . . . . . . 79
Fergal Reid, Aaron McDaid, and Neil Hurley
SAINT: Supervised Actor Identification for Network Tuning . . . . . . . 107
Michael Farrugia, Neil Hurley, and Aaron Quigley
Holder and Topic Based Analysis of Emotions on Blog Texts: A Case
Study for Bengali . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 127
Dipankar Das and Sivaji Bandyopadhyay
Predicting Number of Zombies in a DDoS Attacks Using Isotonic
Regression . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145
B.B. Gupta and Nadeem Jamali
Developing a Hybrid Framework for aWeb-Page Recommender System . 161
Vasileios Anastopoulos, Panagiotis Karampelas, and Reda Alhajj
Evaluation and Development of Data Mining Tools for Social Network
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
Dhiraj Murthy, Alexander Gross, Alexander Takata, and Stephanie Bond
v
vi Contents
Learning to Detect Vandalism in Social Content Systems: A Study
onWikipedia . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Sara Javanmardi, David W. McDonald, Rich Caruana, Sholeh Forouzan,
and Cristina V. Lopes
Perspective on Measurement Metrics for Community Detection
Algorithms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Yang Yang, Yizhou Sun, Saurav Pandit, Nitesh V. Chawla, and Jiawei Han
A Study of Malware Propagation via Online Social Networking . . . . . . 243
Mohammad Reza Faghani and Uyen Trang Nguyen
Estimating the Importance of Terrorists in a Terror Network . . . . . . . 267
Ahmed Elhajj, Abdallah Elsheikh, Omar Addam, Mohamad Alzohbi,
Omar Zarour, Alper Aksaç, Orkun Öztürk, Tansel Özyer, Mick Ridley,
and Reda Alhajj

二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

全部回复
2013-9-18 06:41:36
谢谢楼主分享
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-10-8 22:40:38
哈哈,难道是斯诺登教材?谢谢楼主,下来看看
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-10-15 11:02:19
支持好书
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-10-25 07:04:10
窥人隐私
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

2013-10-28 11:38:58
二维码

扫码加我 拉你入群

请注明:姓名-公司-职位

以便审核进群资格,未注明则拒绝

相关推荐
栏目导航
热门文章
推荐文章

说点什么

分享

扫码加好友,拉您进群
各岗位、行业、专业交流群