[PDF][PDF] A survey of results on mobile phone datasets analysis

VD Blondel, A Decuyper, G Krings - EPJ data science, 2015 - Springer
In this paper, we review some advances made recently in the study of mobile phone
datasets. This area of research has emerged a decade ago, with the increasing availability …

NDlib: a python library to model and analyze diffusion processes over complex networks

G Rossetti, L Milli, S Rinzivillo - Companion Proceedings of the The Web …, 2018 - dl.acm.org
Nowadays the analysis of dynamics of and on networks represents a hot topic in the Social
Network Analysis playground. To support students, teachers, developers and researchers …

Behavior analysis for electronic commerce trading systems: A survey

P Zhao, Z Ding, M Wang, R Cao - IEEE Access, 2019 - ieeexplore.ieee.org
With the rapid development of the Internet and the continuous progress of computer science
and technology, Internet-based online trading has developed rapidly and improved the …

Network diffusion model reveals recovery multipliers and heterogeneous spatial effects in post-disaster community recovery

CF Liu, A Mostafavi - Scientific Reports, 2023 - nature.com
Community recovery from hazards occurs through various diffusion processes within social
and spatial networks of communities. Existing knowledge regarding the diffusion of recovery …

Influence maximization with visual analytics

A Arleo, W Didimo, G Liotta, S Miksch… - … on Visualization and …, 2022 - ieeexplore.ieee.org
In social networks, individuals' decisions are strongly influenced by recommendations from
their friends, acquaintances, and favorite renowned personalities. The popularity of online …

Ndlib: Studying network diffusion dynamics

G Rossetti, L Milli, S Rinzivillo, A Sirbu… - … Conference on Data …, 2017 - ieeexplore.ieee.org
Nowadays the analysis of diffusive phenomena occurring on top of complex networks
represents a hot topic in the Social Network Analysis playground. In order to support …

Traffic classification for the detection of anonymous web proxy routing

S Miller, K Curran, T Lunney - International Journal for Information …, 2015 - pure.ulster.ac.uk
There is an increasing need to be able to classify whether an incoming packet is from a
legitimate originating IP address or has been modified through an intermediate proxy or …

Mobile device users' susceptibility to phishing attacks

FL Sylvester - arXiv preprint arXiv:2203.01823, 2022 - arxiv.org
The mobile device is one of the fasted growing technologies that is widely used in a
diversifying sector. Mobile devices are used for everyday life, such as personal information …

Active and passive diffusion processes in complex networks

L Milli, G Rossetti, D Pedreschi, F Giannotti - Applied network science, 2018 - Springer
Abstract Ideas, information, viruses: all of them, with their mechanisms, spread over the
complex social information, viruses: all tissues described by our interpersonal relations …

[HTML][HTML] Toward Accelerated Training of Parallel Support Vector Machines Based on Voronoi Diagrams

C Alfaro, J Gomez, JM Moguerza, J Castillo, JI Martinez - Entropy, 2021 - mdpi.com
Typical applications of wireless sensor networks (WSN), such as in Industry 4.0 and smart
cities, involves acquiring and processing large amounts of data in federated systems …