[PDF][PDF] A survey of results on mobile phone datasets analysis
In this paper, we review some advances made recently in the study of mobile phone
datasets. This area of research has emerged a decade ago, with the increasing availability …
datasets. This area of research has emerged a decade ago, with the increasing availability …
NDlib: a python library to model and analyze diffusion processes over complex networks
Nowadays the analysis of dynamics of and on networks represents a hot topic in the Social
Network Analysis playground. To support students, teachers, developers and researchers …
Network Analysis playground. To support students, teachers, developers and researchers …
Behavior analysis for electronic commerce trading systems: A survey
With the rapid development of the Internet and the continuous progress of computer science
and technology, Internet-based online trading has developed rapidly and improved the …
and technology, Internet-based online trading has developed rapidly and improved the …
Network diffusion model reveals recovery multipliers and heterogeneous spatial effects in post-disaster community recovery
CF Liu, A Mostafavi - Scientific Reports, 2023 - nature.com
Community recovery from hazards occurs through various diffusion processes within social
and spatial networks of communities. Existing knowledge regarding the diffusion of recovery …
and spatial networks of communities. Existing knowledge regarding the diffusion of recovery …
Influence maximization with visual analytics
In social networks, individuals' decisions are strongly influenced by recommendations from
their friends, acquaintances, and favorite renowned personalities. The popularity of online …
their friends, acquaintances, and favorite renowned personalities. The popularity of online …
Ndlib: Studying network diffusion dynamics
Nowadays the analysis of diffusive phenomena occurring on top of complex networks
represents a hot topic in the Social Network Analysis playground. In order to support …
represents a hot topic in the Social Network Analysis playground. In order to support …
Traffic classification for the detection of anonymous web proxy routing
There is an increasing need to be able to classify whether an incoming packet is from a
legitimate originating IP address or has been modified through an intermediate proxy or …
legitimate originating IP address or has been modified through an intermediate proxy or …
Mobile device users' susceptibility to phishing attacks
FL Sylvester - arXiv preprint arXiv:2203.01823, 2022 - arxiv.org
The mobile device is one of the fasted growing technologies that is widely used in a
diversifying sector. Mobile devices are used for everyday life, such as personal information …
diversifying sector. Mobile devices are used for everyday life, such as personal information …
Active and passive diffusion processes in complex networks
Abstract Ideas, information, viruses: all of them, with their mechanisms, spread over the
complex social information, viruses: all tissues described by our interpersonal relations …
complex social information, viruses: all tissues described by our interpersonal relations …
[HTML][HTML] Toward Accelerated Training of Parallel Support Vector Machines Based on Voronoi Diagrams
Typical applications of wireless sensor networks (WSN), such as in Industry 4.0 and smart
cities, involves acquiring and processing large amounts of data in federated systems …
cities, involves acquiring and processing large amounts of data in federated systems …