3,921 research outputs found
Applications of Temporal Graph Metrics to Real-World Networks
Real world networks exhibit rich temporal information: friends are added and
removed over time in online social networks; the seasons dictate the
predator-prey relationship in food webs; and the propagation of a virus depends
on the network of human contacts throughout the day. Recent studies have
demonstrated that static network analysis is perhaps unsuitable in the study of
real world network since static paths ignore time order, which, in turn,
results in static shortest paths overestimating available links and
underestimating their true corresponding lengths. Temporal extensions to
centrality and efficiency metrics based on temporal shortest paths have also
been proposed. Firstly, we analyse the roles of key individuals of a corporate
network ranked according to temporal centrality within the context of a
bankruptcy scandal; secondly, we present how such temporal metrics can be used
to study the robustness of temporal networks in presence of random errors and
intelligent attacks; thirdly, we study containment schemes for mobile phone
malware which can spread via short range radio, similar to biological viruses;
finally, we study how the temporal network structure of human interactions can
be exploited to effectively immunise human populations. Through these
applications we demonstrate that temporal metrics provide a more accurate and
effective analysis of real-world networks compared to their static
counterparts.Comment: 25 page
On the Dynamics of Human Proximity for Data Diffusion in Ad-Hoc Networks
We report on a data-driven investigation aimed at understanding the dynamics
of message spreading in a real-world dynamical network of human proximity. We
use data collected by means of a proximity-sensing network of wearable sensors
that we deployed at three different social gatherings, simultaneously involving
several hundred individuals. We simulate a message spreading process over the
recorded proximity network, focusing on both the topological and the temporal
properties. We show that by using an appropriate technique to deal with the
temporal heterogeneity of proximity events, a universal statistical pattern
emerges for the delivery times of messages, robust across all the data sets.
Our results are useful to set constraints for generic processes of data
dissemination, as well as to validate established models of human mobility and
proximity that are frequently used to simulate realistic behaviors.Comment: A. Panisson et al., On the dynamics of human proximity for data
diffusion in ad-hoc networks, Ad Hoc Netw. (2011
Information reuse in dynamic spectrum access
Dynamic spectrum access (DSA), where the permission to use slices of radio spectrum is dynamically shifted (in time an in different geographical areas) across various communications services and applications, has been an area of interest from technical and public policy perspectives over the last decade. The underlying belief is that this will increase spectrum utilization, especially since many spectrum bands are relatively unused, ultimately leading to the creation of new and innovative services that exploit the increase in spectrum availability. Determining whether a slice of spectrum, allocated or licensed to a primary user, is available for use by a secondary user at a certain time and in a certain geographic area is a challenging task. This requires 'context information' which is critical to the operation of DSA. Such context information can be obtained in several ways, with different costs, and different quality/usefulness of the information. In this paper, we describe the challenges in obtaining this context information, the potential for the integration of various sources of context information, and the potential for reuse of such information for related and unrelated purposes such as localization and enforcement of spectrum sharing. Since some of the infrastructure for obtaining finegrained context information is likely to be expensive, the reuse of this infrastructure/information and integration of information from less expensive sources are likely to be essential for the economical and technological viability of DSA. © 2013 IEEE
Communities, Knowledge Creation, and Information Diffusion
In this paper, we examine how patterns of scientific collaboration contribute
to knowledge creation. Recent studies have shown that scientists can benefit
from their position within collaborative networks by being able to receive more
information of better quality in a timely fashion, and by presiding over
communication between collaborators. Here we focus on the tendency of
scientists to cluster into tightly-knit communities, and discuss the
implications of this tendency for scientific performance. We begin by reviewing
a new method for finding communities, and we then assess its benefits in terms
of computation time and accuracy. While communities often serve as a taxonomic
scheme to map knowledge domains, they also affect how successfully scientists
engage in the creation of new knowledge. By drawing on the longstanding debate
on the relative benefits of social cohesion and brokerage, we discuss the
conditions that facilitate collaborations among scientists within or across
communities. We show that successful scientific production occurs within
communities when scientists have cohesive collaborations with others from the
same knowledge domain, and across communities when scientists intermediate
among otherwise disconnected collaborators from different knowledge domains. We
also discuss the implications of communities for information diffusion, and
show how traditional epidemiological approaches need to be refined to take
knowledge heterogeneity into account and preserve the system's ability to
promote creative processes of novel recombinations of idea
Quantify resilience enhancement of UTS through exploiting connect community and internet of everything emerging technologies
This work aims at investigating and quantifying the Urban Transport System
(UTS) resilience enhancement enabled by the adoption of emerging technology
such as Internet of Everything (IoE) and the new trend of the Connected
Community (CC). A conceptual extension of Functional Resonance Analysis Method
(FRAM) and its formalization have been proposed and used to model UTS
complexity. The scope is to identify the system functions and their
interdependencies with a particular focus on those that have a relation and
impact on people and communities. Network analysis techniques have been applied
to the FRAM model to identify and estimate the most critical community-related
functions. The notion of Variability Rate (VR) has been defined as the amount
of output variability generated by an upstream function that can be
tolerated/absorbed by a downstream function, without significantly increasing
of its subsequent output variability. A fuzzy based quantification of the VR on
expert judgment has been developed when quantitative data are not available.
Our approach has been applied to a critical scenario (water bomb/flash
flooding) considering two cases: when UTS has CC and IoE implemented or not.
The results show a remarkable VR enhancement if CC and IoE are deploye
Quality of Information in Mobile Crowdsensing: Survey and Research Challenges
Smartphones have become the most pervasive devices in people's lives, and are
clearly transforming the way we live and perceive technology. Today's
smartphones benefit from almost ubiquitous Internet connectivity and come
equipped with a plethora of inexpensive yet powerful embedded sensors, such as
accelerometer, gyroscope, microphone, and camera. This unique combination has
enabled revolutionary applications based on the mobile crowdsensing paradigm,
such as real-time road traffic monitoring, air and noise pollution, crime
control, and wildlife monitoring, just to name a few. Differently from prior
sensing paradigms, humans are now the primary actors of the sensing process,
since they become fundamental in retrieving reliable and up-to-date information
about the event being monitored. As humans may behave unreliably or
maliciously, assessing and guaranteeing Quality of Information (QoI) becomes
more important than ever. In this paper, we provide a new framework for
defining and enforcing the QoI in mobile crowdsensing, and analyze in depth the
current state-of-the-art on the topic. We also outline novel research
challenges, along with possible directions of future work.Comment: To appear in ACM Transactions on Sensor Networks (TOSN
Command & Control: Understanding, Denying and Detecting - A review of malware C2 techniques, detection and defences
In this survey, we first briefly review the current state of cyber attacks,
highlighting significant recent changes in how and why such attacks are
performed. We then investigate the mechanics of malware command and control
(C2) establishment: we provide a comprehensive review of the techniques used by
attackers to set up such a channel and to hide its presence from the attacked
parties and the security tools they use. We then switch to the defensive side
of the problem, and review approaches that have been proposed for the detection
and disruption of C2 channels. We also map such techniques to widely-adopted
security controls, emphasizing gaps or limitations (and success stories) in
current best practices.Comment: Work commissioned by CPNI, available at c2report.org. 38 pages.
Listing abstract compressed from version appearing in repor
- …