3,829,947 research outputs found
Social Network Analysis: Applications: Event Programme
This seminar explores a number of current uses and applications of network analysis, including applications in social movement analysis, criminology, socio-linguistics and the study of literary networks. The aim of this is both to facilitate cross-pollination between domains of application and to offer exemplars of the method in action for those new to this approach. We hope that this seminar will prove to be an interesting introduction to network analysis for those previously unacquainted with it, which will both inspire and equip them to participate in the later seminars
Impact Analysis of Malware Based on Call Network API with Heuristic Detection Method
Malware is a program that has a negative influence on computer systems that don\u27t have user permissions. The purpose of making malware by hackers is to get profits in an illegal way. Therefore, we need a malware analysis. Malware analysis aims to determine the specifics of malware so that security can be built to protect computer devices. One method for analyzing malware is heuristic detection. Heuristic detection is an analytical method that allows finding new types of malware in a file or application. Many malwares are made to attack through the internet because of technological advancements. Based on these conditions, the malware analysis is carried out using the API call network with the heuristic detection method. This aims to identify the behavior of malware that attacks the network. The results of the analysis carried out are that most malware is spyware, which is lurking user activity and retrieving user data without the user\u27s knowledge. In addition, there is also malware that is adware, which displays advertisements through pop-up windows on computer devices that interfaces with user activity. So that with these results, it can also be identified actions that can be taken by the user to protect his computer device, such as by installing antivirus or antimalware, not downloading unauthorized applications and not accessing unsafe websites.
 
Social Network Analysis
{Excerpt} Power no longer resides exclusively (if at all) in states, institutions, or large corporations. It is located in the networks that structure society. Social network analysis seeks to understand networks and their participants and has two main focuses: the actors and the relationships between them in a specific social context.
The information revolution has given birth to new economies structured around flows of data, information, and knowledge. In parallel, social networks have grown stronger as forms of organization of human activity. Social networks are nodes of individuals, groups, organizations, and related systems that tie in one or more types of interdependencies: these include shared values, visions, and ideas; social contacts; kinship; conflict; financial exchanges; trade; joint membership in organizations; and group participation in events, among numerous other aspects of human relationships. Indeed, it sometimes appears as though networked organizations out compete all other forms of organization—certainly, they outpace vertical, rigid, command-and-control bureaucracies. When they succeed, social networks influence larger social processes by accessing human, social, natural, physical, and financial capital, as well as the information and knowledgecontent of these. (In development work, they can impact policies, strategies, programs, and projects—including their design, implementation, and results—and the partnerships that often underpin these.) To date, however, we are still far from being able to construe their public and organizational power in ways that can harness their potential. Understanding when, why, and how they function best is important. Here, social network analysis can help
Compressive Network Analysis
Modern data acquisition routinely produces massive amounts of network data.
Though many methods and models have been proposed to analyze such data, the
research of network data is largely disconnected with the classical theory of
statistical learning and signal processing. In this paper, we present a new
framework for modeling network data, which connects two seemingly different
areas: network data analysis and compressed sensing. From a nonparametric
perspective, we model an observed network using a large dictionary. In
particular, we consider the network clique detection problem and show
connections between our formulation with a new algebraic tool, namely Randon
basis pursuit in homogeneous spaces. Such a connection allows us to identify
rigorous recovery conditions for clique detection problems. Though this paper
is mainly conceptual, we also develop practical approximation algorithms for
solving empirical problems and demonstrate their usefulness on real-world
datasets
Topics in social network analysis and network science
This chapter introduces statistical methods used in the analysis of social
networks and in the rapidly evolving parallel-field of network science.
Although several instances of social network analysis in health services
research have appeared recently, the majority involve only the most basic
methods and thus scratch the surface of what might be accomplished.
Cutting-edge methods using relevant examples and illustrations in health
services research are provided
Analysis of Malware Impact on Network Traffic using Behavior-based Detection Technique
Malware is a software or computer program that is used to carry out malicious activity. Malware is made with the aim of harming user’s device because it can change user’s data, use up bandwidth and other resources without user's permission. Some research has been done before to identify the type of malware and its effects. But previous research only focused on grouping the types of malware that attack via network traffic. This research analyzes the impact of malware on network traffic using behavior-based detection techniques. This technique analyzes malware by running malware samples into an environment and monitoring the activities caused by malware samples. To obtain accurate results, the analysis is carried out by retrieving API call network information and network traffic activities. From the analysis of the malware API call network, information is generated about the order of the API call network used by malware. Using the network traffic, obtained malware activities by analyzing the behavior of network traffic malware, payload, and throughput of infected traffic. Furthermore, the results of the API call network sequence used by malware and the results of network traffic analysis, are analyzed so that the impact of malware on network traffic can be determined
- …