Sciweavers

687 search results - page 10 / 138
» Introduction to social network analysis
Sort
View
CEAS
2008
Springer
14 years 11 months ago
Social Honeypots: Making Friends With A Spammer Near You
Social networking communities have become an important communications platform, but the popularity of these communities has also made them targets for a new breed of social spamme...
Steve Webb, James Caverlee, Calton Pu
KES
2009
Springer
15 years 2 months ago
Virtual Communities of Practice's Purpose Evolution Analysis Using a Concept-Based Mining Approach
Today, social networks systems have become more and more important. People have change their way to relate and communicate. Therefore, how to enhance contents and organization of a...
Sebastián A. Ríos, Felipe Aguilera, ...
CIKM
2008
Springer
14 years 11 months ago
Mining social networks using heat diffusion processes for marketing candidates selection
Social Network Marketing techniques employ pre-existing social networks to increase brands or products awareness through word-of-mouth promotion. Full understanding of social netw...
Hao Ma, Haixuan Yang, Michael R. Lyu, Irwin King
ISI
2007
Springer
15 years 3 months ago
Terrorism and Crime Related Weblog Social Network: Link, Content Analysis and Information Visualization
—A Weblog is a Web site where entries are made in diary style, maintained by its sole author – a blogger, and displayed in a reverse chronological order. Due to the freedom and...
Christopher C. Yang, Tobun D. Ng
CEAS
2006
Springer
15 years 1 months ago
Using E-Mail Social Network Analysis for Detecting Unauthorized Accounts
In this paper we detail the use of e-mail social network analysis for the detection of security policy violations on computer systems. We begin by formalizing basic policies that ...
Adam J. O'Donnell, Walter C. Mankowski, Jeff Abrah...