<p><p>With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This boo
Social networking: mining, visualization, and security
β Scribed by Dehuri, Satchidananda;Panda, Mrutyunjaya;Wang, Gi-nam
- Publisher
- Springer
- Year
- 2014
- Tongue
- English
- Leaves
- 313
- Series
- Intelligent systems reference library volume 65
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Diffusion of Information in Social Networks-- Structure and Evolution of Online Social Networks-- Machine Learning for Auspicious Social Network Mining-- Testing Community Detection Algorithms: A Closer Look at Datasets-- Societal Networks: The networks of Dynamics of Interpersonal Associations-- Methods of tracking online community in social network-- Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand and West Bengal: An Empirical Attempt-- Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members-- Social Network Analysis: A methodology for studying Terrorism-- Privacy and Anonymization in Social Networks-- On the use of Brokerage Approach to discover Influencing Nodes in Terrorist Networks.;With the proliferation of social media and on-line communities in networked world a large gamut of data has been collected and stored in databases. The rate at which such data is stored is growing at a phenomenal rate and pushing the classical methods of data analysis to their limits. This book presents an integrated framework of recent empirical and theoretical research on social network analysis based on a wide range of techniques from various disciplines like data mining, social sciences, mathematics, statistics, physics, network science, machine learning with visualization techniques, and security. The book illustrates the potential of multi-disciplinary techniques in various real life problems and intends to motivate researchers in social network analysis to design more effective tools by integrating swarm intelligence and data mining.
β¦ Table of Contents
Diffusion of Information in Social Networks--
Structure and Evolution of Online Social Networks--
Machine Learning for Auspicious Social Network Mining--
Testing Community Detection Algorithms: A Closer Look at Datasets--
Societal Networks: The networks of Dynamics of Interpersonal Associations--
Methods of tracking online community in social network--
Social Network Analysis Approach for Studying Caste, Class and Social Support in Rural Jharkhand and West Bengal: An Empirical Attempt--
Evaluating the Propagation Strength of Malicious Metaphor in Social Network: Flow Through Inspiring Influence of Members--
Social Network Analysis: A methodology for studying Terrorism--
Privacy and Anonymization in Social Networks--
On the use of Brokerage Approach to discover Influencing Nodes in Terrorist Networks.
β¦ Subjects
Computational intelligence;Data mining;Local area networks (Computer networks);Online social networks;Social networks--Computer network resources;Social networks -- Computer network resources
π SIMILAR VOLUMES
<p>This book is the third of three volumes that illustrate the concept of social networks from a computational point of view. The book contains contributions from a international selection of world-class experts, with a specific focus on knowledge discovery and visualization of complex networks (the
<p>Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mini
<p>Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mini
The real power for security applications will come from the synergy of academic and commercial research focusing on the specific issue of security. Special constraints apply to this domain, which are not always taken into consideration by academic research, but are critical for successful security a
<p>This book will focus upon Mining and Analyzing social network. Some chapters in this book are extended from the papers that pre-sented in MSNDS2009 (the First International Workshop on Mining Social Networks for Decision Support) and SNMABA2009 ((The International Workshop on Social Networks Mini