Intelligent Data Analytics for Terror Threat Prediction

Здесь есть возможность читать онлайн «Intelligent Data Analytics for Terror Threat Prediction» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Data Analytics for Terror Threat Prediction: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Data Analytics for Terror Threat Prediction»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis.
This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.

Intelligent Data Analytics for Terror Threat Prediction — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Data Analytics for Terror Threat Prediction», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

2 B. Rumor Source Estimator: Maximum Likelihood (ML)Suppose that the rumor has widen in G (V, E) refer to diffusion model i.e. SI model and all N nodes with the rumor. Infected nodes are symbolized by rumor graph GN (V, E) which is a sub graph of G (V, E). It has been observed that actual rumor source (ν*) may differ than rumor estimator (). By using all these variables ν*, and GN, rumor source estimator is given as follows,(1.3) Where = rumor estimatorν* = rumor source.

In general trees, evaluation of P ( G N| ν * = ν ) is difficult. However in case of regular trees this evaluation is simple because every node has same degree. As the network is tree structure it is possible to spread rumor through unique sequence only. So that finding rumor source is also become simple. Evaluate P ( G N| ν ) for all νG Nand then select one with maximal value.

The authors consider general network, random tree, and d-regular tree to find rumor source. For d-regular and random trees it is easy to get information how rumors are diffusing in network as explained earlier but in general network it is difficult. So, they uses Breadth-First-Search (BFS) technique in general networks to convert them into BFS trees. Initially assume every node as a source node which means starting point for BFS. To find origin they used BFS tree with infection probability p . After finding, node which has higher probability considered as source node. For more details see Ref. [9].

1.6.1.1.2 Snapshot Observation

This observation gives limited information as discussed earlier in Section 1.5.1.2.2. It is useful for single rumor source detection on social networks, if multiple snapshots are taken in various time intervals. Single snapshot gives limited information about network and states of nodes whereas multiple snapshots give more information about these. Single source detection by applying rumor centrality metric and multiple observations is discussed [37]. They consider tree-like network and used SI model for rumor diffusion, they proves that multiple observations always improve detectable performance. Even two independent snapshot observations increases probability of source detection compare to single snapshot observation. The authors shown that source detection performance increases for multiple observations and decreases with number of infected nodes. After multiple observations use maximum likelihood estimator to find rumor centrality and from it to find rumor source in tree-like network and graph network. Graph network uses BFS technique to transform graph into BFS tree as discussed in above section. The problem in snapshot observation is if SIR model is used for information diffusion, it cannot distinguish between susceptible and recovered nodes.

1.6.1.1.3 Monitor Observation

Monitor observation is possible by inserting sensor nodes in network, and monitor these nodes behavior. Sensor nodes placed in network gather information about states of nodes as discussed in Section 1.5.1.2.3. Monitor observation is one of the factors and is useful in identifying source in network. There is chance of missing information about some nodes where sensor nodes are not placed and if number of sensor nodes increases then system performance decreases. But if this observation is considered for source identification, then on collected information use rumor centrality measures to find source of rumor either in tree-like network or general network. In Ref. [49] proposed sensor nodes do not contain any textual information in the network to detect rumor source.

The above three observations are used to detect RS in social networks.

1.6.1.2 Query-Based Approach

This approach is proposed in Ref. [18] for source detection. It is purely based on queries and answers to find source. In general, asking queries gives information about rumor source. These queries like “Who shares you the rumor?” or “Are you the source of rumor?” and answers to these queries increases chance of rumor source identification. The authors considers two types of queries: 1) simple batch queries are simple queries as mentioned earlier, and 2) interactive queries are queries which may contain untruth queries and answers with some probability. To quantify the untruthfulness, they propose estimate algorithms for those queries. Author’s uses centrality measures and SI diffusion model and they guarantee that quantifying untruth or truth from these queries and asking these kinds of queries significantly improve performance of source identification in tree-like structure and on Facebook network.

1.6.1.3 Anti-Rumor-Based Approach

It is based on anti-rumor diffusion over the network. To broaden antirumor knowledge in the network, monitor based observation is proposed in Ref. [19] for rumor source detection. They injected monitor or sensor nodes to diffuse “anti-rumor” messages inside the network, nodes are called as protectors. Initially, authors prove that injecting anti-rumors decreases performance for Maximum-Likelihood (ML) estimator in largescale networks. If rumors receive anti-rumor find distance between rumor source and protector. To find this distance they propose two algorithms 1) learn distance distributor parameter under ML estimator and 2) Rumor source detector under Maximum-A-Posterior-Estimator (MAPE) based on the learnt parameters. These two learning algorithms give distance between rumor source and protector, based on the difference analyze the actual rumor source.

1.6.2 Multiple Source Detection

Many researchers believe that rumor diffusion occurs from only a single source in network, but in general people use several sources to boost the rumor diffusion quickly. Single source identification is comparatively easier and several approaches have already been developed, which are discussed in Section 1.6.1. In this section multiple source of rumor in network is discussed. Detection of multiple sources is proposed in Ref. [48]. They use BFS technique and give final tree after several observations. Following section explains some techniques to find multiple source of rumor. There are four methods: ranking-based, network partitioning, approximation-based and community-based.

In network partitioning rumor centrality is evaluated in two phases [20]. First phase, identify infected nodes and classify into groups, source in each group identified using rumor center method. Second phase, these recognized sources classified into two and in each again uses source estimator to identify source in that group.

Community-based is proposed in Ref. [21], by partitioning the community to identify several sources in every community. To recognize unseen and improved nodes use reverse diffusion approach through SIR model. Community detection method group all infected nodes into groups. Then apply single source detection approaches to find rumor source in each community. There are two more multiple source detection approaches such as ranking-based and approximation-based. For details see Ref. [10].

1.7 Conclusion

Social networks like Facebook, Twitter, and WhatsApp are generating huge amount of data from their user profiles. But generation of huge data creates real world problems like rumor diffusion in network. It is difficult to find that whether information spreading in network is rumor or not and as each network has many users, it is not possible to find who spread that rumor. So classification of rumors and facts and finding rumor source in network is an emerging challenge in society. This chapter surveys various social networks, their features, cyber-crime and its classifications, and how these cyber-crimes occur in social networks. This chapter is specifically purposeful on cyber-crime in social network i.e. rumor diffusion. There are some popular classification algorithms such as Naïve Bayes and support vector machine classifiers to distinguish between rumors and facts. Next, to find source of a rumor consider three factors such as network structure, diffusion models, and centrality measures. There are two kinds of sources: 1) single source and 2) multiple source. To find single source use three approaches such as anti-rumor-based, query-based, and network observation. For multiple sources of rumor use several approaches like approximation-based, ranking-based, network partitioning, and community-based. These approaches improve probability of rumor detection and its source identification in social networks. However, there are many classification techniques and still some are not easy to use in finding based on existing features. So there is a need to consider more features and much better classification techniques. In rumor source detection, current research mostly focused on single source identification. But nowadays, multiple users are spreading rumors for fast dissemination over the social networks. Thus, there is need of developing new techniques to detect multiple sources of rumor.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Data Analytics for Terror Threat Prediction»

Представляем Вашему вниманию похожие книги на «Intelligent Data Analytics for Terror Threat Prediction» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Data Analytics for Terror Threat Prediction»

Обсуждение, отзывы о книге «Intelligent Data Analytics for Terror Threat Prediction» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x