Sciweavers

108 search results - page 16 / 22
» Homeland Security Data Mining Using Social Network Analysis
Sort
View
SDM
2007
SIAM
143views Data Mining» more  SDM 2007»
13 years 9 months ago
Patterns of Cascading Behavior in Large Blog Graphs
How do blogs cite and influence each other? How do such links evolve? Does the popularity of old blog posts drop exponentially with time? These are some of the questions that we ...
Jure Leskovec, Mary McGlohon, Christos Faloutsos, ...
AUSDM
2008
Springer
225views Data Mining» more  AUSDM 2008»
13 years 9 months ago
Service-independent payload analysis to improve intrusion detection in network traffic
The popularity of computer networks broadens the scope for network attackers and increases the damage these attacks can cause. In this context, Intrusion Detection Systems (IDS) a...
Iñigo Perona, Ibai Gurrutxaga, Olatz Arbela...
CDVE
2007
Springer
165views Visualization» more  CDVE 2007»
14 years 1 months ago
Private Data Management in Collaborative Environments
Organizations are under increasing pressures to manage all of the personal data concerning their customers and employees in a responsible manner. With the advancement of informatio...
Larry Korba, Ronggong Song, George Yee, Andrew S. ...
SOCIALCOM
2010
13 years 5 months ago
A Methodology for Integrating Network Theory and Topic Modeling and its Application to Innovation Diffusion
Text data pertaining to socio-technical networks often are analyzed separately from relational data, or are reduced to the fact and strength of the flow of information between node...
Jana Diesner, Kathleen M. Carley
KDD
2012
ACM
200views Data Mining» more  KDD 2012»
11 years 10 months ago
Vertex neighborhoods, low conductance cuts, and good seeds for local community methods
The communities of a social network are sets of vertices with more connections inside the set than outside. We theoretically demonstrate that two commonly observed properties of s...
David F. Gleich, C. Seshadhri