|
|
|
|
LEADER |
03975nam a22005775i 4500 |
001 |
978-94-007-6359-3 |
003 |
DE-He213 |
005 |
20151204141139.0 |
007 |
cr nn 008mamaa |
008 |
130601s2013 ne | s |||| 0|eng d |
020 |
|
|
|a 9789400763593
|9 978-94-007-6359-3
|
024 |
7 |
|
|a 10.1007/978-94-007-6359-3
|2 doi
|
040 |
|
|
|d GrThAP
|
050 |
|
4 |
|a TA169.7
|
050 |
|
4 |
|a T55-55.3
|
072 |
|
7 |
|a TNKS
|2 bicssc
|
072 |
|
7 |
|a TEC009000
|2 bisacsh
|
082 |
0 |
4 |
|a 621.389
|2 23
|
245 |
1 |
0 |
|a Mining Social Networks and Security Informatics
|h [electronic resource] /
|c edited by Tansel Özyer, Zeki Erdem, Jon Rokne, Suheil Khoury.
|
264 |
|
1 |
|a Dordrecht :
|b Springer Netherlands :
|b Imprint: Springer,
|c 2013.
|
300 |
|
|
|a VI, 283 p. 92 illus.
|b online resource.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|b PDF
|2 rda
|
490 |
1 |
|
|a Lecture Notes in Social Networks,
|x 2190-5428
|
505 |
0 |
|
|a A Model for Dynamic Integration of Data Sources -- Overlapping community structure and modular overlaps in complex networks -- Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data -- Privacy Breach Analysis in Social Networks -- Partitioning Breaks Communities -- SAINT: Supervised Actor Identification for Network Tuning -- Holder and Topic based Analysis of Emotions on Blog Texts: a Case Study for Bengali -- Predicting Number of Zombies in a DDoS Attacks using Isotonic Regression -- Developing a Hybrid Framework for a Web-Page Recommender System -- Evaluation and Development of Data Mining Tools for Social Network Analysis -- Learning To Detect Vandalism in Social Content Systems: A Study On Wikipedia Vandalism Detection in Wikipedia -- Perspective on Measurement Metrics for Community Detection Algorithms -- A Study of Malware Propagation via Online Social Networking -- Estimating the Importance of Terrorists in a Terror Network.
|
520 |
|
|
|a Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics. The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.
|
650 |
|
0 |
|a Physics.
|
650 |
|
0 |
|a Data mining.
|
650 |
|
0 |
|a System safety.
|
650 |
|
0 |
|a Complexity, Computational.
|
650 |
|
0 |
|a Economic theory.
|
650 |
|
0 |
|a Criminology.
|
650 |
1 |
4 |
|a Physics.
|
650 |
2 |
4 |
|a Security Science and Technology.
|
650 |
2 |
4 |
|a Data Mining and Knowledge Discovery.
|
650 |
2 |
4 |
|a Criminology & Criminal Justice.
|
650 |
2 |
4 |
|a Economic Theory/Quantitative Economics/Mathematical Methods.
|
650 |
2 |
4 |
|a Complexity.
|
700 |
1 |
|
|a Özyer, Tansel.
|e editor.
|
700 |
1 |
|
|a Erdem, Zeki.
|e editor.
|
700 |
1 |
|
|a Rokne, Jon.
|e editor.
|
700 |
1 |
|
|a Khoury, Suheil.
|e editor.
|
710 |
2 |
|
|a SpringerLink (Online service)
|
773 |
0 |
|
|t Springer eBooks
|
776 |
0 |
8 |
|i Printed edition:
|z 9789400763586
|
830 |
|
0 |
|a Lecture Notes in Social Networks,
|x 2190-5428
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-94-007-6359-3
|z Full Text via HEAL-Link
|
912 |
|
|
|a ZDB-2-PHA
|
950 |
|
|
|a Physics and Astronomy (Springer-11651)
|