000 03887nam a22005655i 4500
001 978-94-007-6359-3
003 DE-He213
005 20140220082942.0
007 cr nn 008mamaa
008 130601s2013 ne | s |||| 0|eng d
020 _a9789400763593
_9978-94-007-6359-3
024 7 _a10.1007/978-94-007-6359-3
_2doi
050 4 _aTA169.7
050 4 _aT55-55.3
072 7 _aTNKS
_2bicssc
072 7 _aTEC009000
_2bisacsh
082 0 4 _a621.389
_223
100 1 _aÖzyer, Tansel.
_eeditor.
245 1 0 _aMining Social Networks and Security Informatics
_h[electronic resource] /
_cedited by Tansel Özyer, Zeki Erdem, Jon Rokne, Suheil Khoury.
264 1 _aDordrecht :
_bSpringer Netherlands :
_bImprint: Springer,
_c2013.
300 _aVI, 283 p. 92 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Social Networks,
_x2190-5428
505 0 _aA Model for Dynamic Integration of Data Sources -- Overlapping community structure and modular overlaps in complex networks -- Constructing and Analyzing Uncertain Social Networks from Unstructured Textual Data -- Privacy Breach Analysis in Social Networks -- Partitioning Breaks Communities -- SAINT: Supervised Actor Identification for Network Tuning -- Holder and Topic based Analysis of Emotions on Blog Texts: a Case Study for Bengali -- Predicting Number of Zombies in a DDoS Attacks using Isotonic Regression -- Developing a Hybrid Framework for a Web-Page Recommender System -- Evaluation and Development of Data Mining Tools for Social Network Analysis -- Learning To Detect Vandalism in Social Content Systems: A Study On Wikipedia Vandalism Detection in Wikipedia -- Perspective on Measurement Metrics for Community Detection Algorithms -- A Study of Malware Propagation via Online Social Networking -- Estimating the Importance of Terrorists in a Terror Network.
520 _aCrime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.  The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.
650 0 _aPhysics.
650 0 _aData mining.
650 0 _aEngineering.
650 0 _aEconomics, Mathematical.
650 0 _aCriminology.
650 1 4 _aPhysics.
650 2 4 _aSecurity Science and Technology.
650 2 4 _aData Mining and Knowledge Discovery.
650 2 4 _aCriminology & Criminal Justice.
650 2 4 _aGame Theory/Mathematical Methods.
650 2 4 _aComplexity.
700 1 _aErdem, Zeki.
_eeditor.
700 1 _aRokne, Jon.
_eeditor.
700 1 _aKhoury, Suheil.
_eeditor.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer eBooks
776 0 8 _iPrinted edition:
_z9789400763586
830 0 _aLecture Notes in Social Networks,
_x2190-5428
856 4 0 _uhttp://dx.doi.org/10.1007/978-94-007-6359-3
912 _aZDB-2-SCS
999 _c99873
_d99873