Social network analysis has recently gained a lot of interest because of the advent and the increasing popularity of social media, such as blogs, social networks, microblogging, o...
Iraklis Varlamis, Magdalini Eirinaki, Malamati D. ...
Conventional information fusion architectures are challenged by developments in sensor networks that allow individually-owned (and thereby selfish) sensors to interact and share d...
Alex Rogers, Rajdeep K. Dash, Nicholas R. Jennings...
Honeypot has been an invaluable tool for the detection and analysis of network-based attacks by either human intruders or automated malware in the wild. The insights obtained by de...
The evolution of dependencies in information hierarchies can be modeled by sequences of compound digraphs with edge weights. In this paper we present a novel approach to visualize...
: If we consider the regulatory networks used in systems biology (especially in neural and genetic networks), we observe certain regularities in their architecture, namely the occu...
Adrien Elena, Hedi Ben Amor, N. Glade, Jacques Dem...