3,296 research outputs found
Simple models of small world networks with directed links
We investigate the effect of directed short and long range connections in a
simple model of small world network. Our model is such that we can determine
many quantities of interest by an exact analytical method. We calculate the
function , defined as the number of sites affected up to time when a
naive spreading process starts in the network. As opposed to shortcuts, the
presence of un-favorable bonds has a negative effect on this quantity. Hence
the spreading process may not be able to affect all the network. We define and
calculate a quantity named the average size of accessible world in our model.
The interplay of shortcuts, and un-favorable bonds on the small world
properties is studied.Comment: 15 pages, 9 figures, published versio
Small world yields the most effective information spreading
Spreading dynamics of information and diseases are usually analyzed by using
a unified framework and analogous models. In this paper, we propose a model to
emphasize the essential difference between information spreading and epidemic
spreading, where the memory effects, the social reinforcement and the
non-redundancy of contacts are taken into account. Under certain conditions,
the information spreads faster and broader in regular networks than in random
networks, which to some extent supports the recent experimental observation of
spreading in online society [D. Centola, Science {\bf 329}, 1194 (2010)]. At
the same time, simulation result indicates that the random networks tend to be
favorable for effective spreading when the network size increases. This
challenges the validity of the above-mentioned experiment for large-scale
systems. More significantly, we show that the spreading effectiveness can be
sharply enhanced by introducing a little randomness into the regular structure,
namely the small-world networks yield the most effective information spreading.
Our work provides insights to the understanding of the role of local clustering
in information spreading.Comment: 6 pages, 7 figures, accepted by New J. Phy
Machine Learning Aided Static Malware Analysis: A Survey and Tutorial
Malware analysis and detection techniques have been evolving during the last
decade as a reflection to development of different malware techniques to evade
network-based and host-based security protections. The fast growth in variety
and number of malware species made it very difficult for forensics
investigators to provide an on time response. Therefore, Machine Learning (ML)
aided malware analysis became a necessity to automate different aspects of
static and dynamic malware investigation. We believe that machine learning
aided static analysis can be used as a methodological approach in technical
Cyber Threats Intelligence (CTI) rather than resource-consuming dynamic malware
analysis that has been thoroughly studied before. In this paper, we address
this research gap by conducting an in-depth survey of different machine
learning methods for classification of static characteristics of 32-bit
malicious Portable Executable (PE32) Windows files and develop taxonomy for
better understanding of these techniques. Afterwards, we offer a tutorial on
how different machine learning techniques can be utilized in extraction and
analysis of a variety of static characteristic of PE binaries and evaluate
accuracy and practical generalization of these techniques. Finally, the results
of experimental study of all the method using common data was given to
demonstrate the accuracy and complexity. This paper may serve as a stepping
stone for future researchers in cross-disciplinary field of machine learning
aided malware forensics.Comment: 37 Page
Locating the Source of Diffusion in Large-Scale Networks
How can we localize the source of diffusion in a complex network? Due to the
tremendous size of many real networks--such as the Internet or the human social
graph--it is usually infeasible to observe the state of all nodes in a network.
We show that it is fundamentally possible to estimate the location of the
source from measurements collected by sparsely-placed observers. We present a
strategy that is optimal for arbitrary trees, achieving maximum probability of
correct localization. We describe efficient implementations with complexity
O(N^{\alpha}), where \alpha=1 for arbitrary trees, and \alpha=3 for arbitrary
graphs. In the context of several case studies, we determine how localization
accuracy is affected by various system parameters, including the structure of
the network, the density of observers, and the number of observed cascades.Comment: To appear in Physical Review Letters. Includes pre-print of main
paper, and supplementary materia
- …