Intelligent Data Analytics for Terror Threat Prediction. Группа авторов
Чтение книги онлайн.

Читать онлайн книгу Intelligent Data Analytics for Terror Threat Prediction - Группа авторов страница 18

Название: Intelligent Data Analytics for Terror Threat Prediction

Автор: Группа авторов

Издательство: John Wiley & Sons Limited

Жанр: Программы

Серия:

isbn: 9781119711513

isbn:

СКАЧАТЬ and Practice in Journalism, Oxford Research Encyclopedia of Communication, Oxford University Press, 2019.

      34. Fuchs, M. and Yu, P.D., Rumor source detection for rumor spreading on random increasing trees. Electron. Commun. Probab., 20, 2015.

      35. Shah, D. and Zaman, T., Finding rumor sources on random trees. Oper. Res., 64, 3, 736–755, 2016.

      36. Jiang, J., Wen, S., Yu, S., Xiang, Y., Zhou, W., Identifying propagation sources in networks: State-of-the-art and comparative studies. IEEE Commun. Surv. Tutorials, 19, 1, 465–481, 2016.

      37. Wang, Z., Dong, W., Zhang, W., Tan, C.W., Rumor source detection with multiple observations: Fundamental limits and algorithms. ACM SIGMETRICS Perform. Eval. Rev., 42, 1, 1–13, 2014.

      38. Gross, T., D’Lima, C.J., Blasius, B., Epidemic dynamics on an adaptive network. Phys. Rev. Lett., 96, 208701, 2006.

      39. Watts, D.J. and Strogatz, S.H., Collective dynamics of ‘small-world’ networks. Nature, 393, 6684, 440, 1998.

      40. Albert, R., Jeong, H., Barabási, A.L., Error and attack tolerance of complex networks. Nature, 406, 6794, 378–382, 2000.

      41. Li, M., Wang, X., Gao, K., Zhang, S., A survey on information diffusion in online social networks: Models and methods. Information, 8, 4, 118, 2017.

      42. Nguyen, D.T., Nguyen, N.P., Thai, M.T., Sources of misinformation in Online Social Networks: Who to suspect? MILCOM 2012-2012 IEEE Military Communications Conference, IEEE, pp. 1–6, October., 2012.

      43. Klein, D.J., Centrality measure in graphs. J. Math. Chem., 47, 4, 1209–1223, 2010.

      44. Hage, P. and Harary, F., Eccentricity and centrality in networks. Soc. Netw., 17, 1, 57–63, 1995.

      45. Shah, D. and Zaman, T., Rumor centrality: a universal source detector. Proceedings of the 12th ACM SIGMETRICS/PERFORMANCE joint international conference on Measurement and Modeling of Computer Systems, pp. 199–210, 2012, June.

      46. Freeman, L.C., Centrality in social networks conceptual clarification. Soc. Netw., 1, 3, 215–239, 1978.

      47. Louni, A. and Subbalakshmi, K.P., A two-stage algorithm to estimate the source of information diffusion in social media networks. 2014 IEEE Conference on Computer Communications Workshops(INFOCOM WKSHPS), IEEE, pp. 329–333, 2014, April.

      48. Wang, Z., Dong, W., Zhang, W., Tan, C.W., Rooting our rumor sources in online social networks: The value of diversity from multiple observations. IEEE J. Sel. Top. Signal Process., 9, 4, 663–677, 2015.

      49. Xu, W. and Chen, H., Scalable rumor source detection under independent cascade model in online social networks. 2015 11th International Conference on Mobile Ad-hoc and Sensor Networks (MSN), IEEE, pp. 236–242, December, 2015.

      1 *Corresponding author: [email protected]

      2 †Corresponding author: [email protected]

      Конец ознакомительного фрагмента.

      Текст предоставлен ООО «ЛитРес».

      Прочитайте эту книгу целиком, купив полную легальную версию на ЛитРес.

      Безопасно оплатить книгу можно банковской картой Visa, MasterCard, Maestro, со счета мобильного телефона, с платежного терминала, в салоне МТС или Связной, через PayPal, WebMoney, Яндекс.Деньги, QIWI Кошелек, бонусными картами или другим удобным Вам способом.

/9j/4AAQSkZJRgABAQEBLAEsAAD/7SosUGhvdG9zaG9wIDMuMAA4QklNBAQAAAAAAA8cAVoAAxsl RxwCAAACAAAAOEJJTQQlAAAAAAAQzc/6fajHvgkFcHaurwXDTjhCSU0EOgAAAAABIQAAABAAAAAB AAAAAAALcHJpbnRPdXRwdXQAAAAFAAAAAFBzdFNib29sAQAAAABJbnRlZW51bQAAAABJbnRlAAAA AENscm0AAAAPcHJpbnRTaXh0ZWVuQml0Ym9vbAAAAAALcHJpbnRlck5hbWVURVhUAAAAHwBIAFAA IABMAGEAcwBlAHIASgBlAHQAIABQAHIAbwBmAGUAcwBzAGkAbwBuAGEAbAAgAFAAMQAxADAAOAAA AAAAD3ByaW50UHJvb2ZTZXR1cE9iamMAAAAMAFAAcgBvAG8AZgAgAFMAZQB0AHUAcAAAAAAACnBy b29mU2V0dXAAAAABAAAAAEJsdG5lbnVtAAAADGJ1aWx0aW5Qcm9vZgAAAAlwcm9vZkNNWUsAOEJJ TQQ7AAAAAAItAAAAEAAAAAEAAAAAABJwcmludE91dHB1dE9wdGlvbnMAAAAXAAAAAENwdG5ib29s AAAAAABDbGJyYm9vbAAAAAAAUmdzTWJvb2wAAAAAAENybkNib29sAAAAAABDbnRDYm9vbAAAAAAA TGJsc2Jvb2wAAAAAAE5ndHZib29sAAAAAABFbWxEYm9vbAAAAAAASW50cmJvb2wAAAAAAEJja2dP YmpjAAAAAQAAAAAAAFJHQkMAAAADAAAAAFJkICBkb3ViQG/gAAAAAAAAAAAAR3JuIGRvdWJAb+AA AAAAAAAAAABCbCAgZG9
СКАЧАТЬ