𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Social Networking: Mining, Visualization, and Security

✍ Scribed by Mrutyunjaya Panda, Satchidananda Dehuri, Gi-Nam Wang (eds.)


Publisher
Springer International Publishing
Year
2014
Tongue
English
Leaves
313
Series
Intelligent Systems Reference Library 65
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.

✦ Table of Contents


Front Matter....Pages 1-20
Diffusion of Information in Social Networks....Pages 1-22
Structure and Evolution of Online Social Networks....Pages 23-44
Machine Learning for Auspicious Social Network Mining....Pages 45-83
Testing Community Detection Algorithms: A Closer Look at Datasets....Pages 85-99
Societal Networks: The Networks of Dynamics of Interpersonal Associations....Pages 101-127
Methods of Tracking Online Community in Social Network....Pages 129-146
Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand and West Bengal: An Empirical Attempt....Pages 147-200
Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members....Pages 201-213
Social Network Analysis: A Methodology for Studying Terrorism....Pages 215-242
Privacy and Anonymization in Social Networks....Pages 243-270
On the Use of Brokerage Approach to Discover Influencing Nodes in Terrorist Networks....Pages 271-295
Back Matter....Pages 297-297

✦ Subjects


Computational Intelligence; Artificial Intelligence (incl. Robotics); Information Systems Applications (incl. Internet)


πŸ“œ SIMILAR VOLUMES


Social networking: mining, visualization
✍ Dehuri, Satchidananda;Panda, Mrutyunjaya;Wang, Gi-nam πŸ“‚ Library πŸ“… 2014 πŸ› Springer 🌐 English

Diffusion of Information in Social Networks-- Structure and Evolution of Online Social Networks-- Machine Learning for Auspicious Social Network Mining-- Testing Community Detection Algorithms: A Closer Look at Datasets-- Societal Networks: The networks of Dynamics of Interpersonal Associations-- Me

Computational Social Networks: Mining an
✍ Neveen Ghali, Mrutyunjaya Panda, Aboul Ella Hassanien, Ajith Abraham, Vaclav Sna πŸ“‚ Library πŸ“… 2012 πŸ› Springer-Verlag London 🌐 English

<p>This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the

Mining Social Networks and Security Info
✍ Murat Obali, Bunyamin Dursun (auth.), Tansel Γ–zyer, Zeki Erdem, Jon Rokne, Suhei πŸ“‚ Library πŸ“… 2013 πŸ› Springer Netherlands 🌐 English

<p>Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mini

Mining social networks and security info
✍ Murat Obali, Bunyamin Dursun (auth.), Tansel Γ–zyer, Zeki Erdem, Jon Rokne, Suhei πŸ“‚ Library πŸ“… 2013 πŸ› Springer Netherlands 🌐 English

<p>Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mini

Mining Massive Data Sets for Security: A
✍ F. Fogelman-Soulie πŸ“‚ Library πŸ“… 2008 πŸ› IOS Press 🌐 English

The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Special constraints apply to this domain, which are not always taken into consideration by academic research, but are critical for successful security a

Mining and Analyzing Social Networks
✍ Qin Wu, Eddie Fuller, Cun-Quan Zhang (auth.), I-Hsien Ting, Hui-Ju Wu, Tien-Hwa πŸ“‚ Library πŸ“… 2010 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p>This book will focus upon Mining and Analyzing social network. Some chapters in this book are extended from the papers that pre-sented in MSNDS2009 (the First International Workshop on Mining Social Networks for Decision Support) and SNMABA2009 ((The International Workshop on Social Networks Mini