Intelligent Data Analytics for Terror Threat Prediction

Здесь есть возможность читать онлайн «Intelligent Data Analytics for Terror Threat Prediction» — ознакомительный отрывок электронной книги совершенно бесплатно, а после прочтения отрывка купить полную версию. В некоторых случаях можно слушать аудио, скачать через торрент в формате fb2 и присутствует краткое содержание. Жанр: unrecognised, на английском языке. Описание произведения, (предисловие) а так же отзывы посетителей доступны на портале библиотеки ЛибКат.

Intelligent Data Analytics for Terror Threat Prediction: краткое содержание, описание и аннотация

Предлагаем к чтению аннотацию, описание, краткое содержание или предисловие (зависит от того, что написал сам автор книги «Intelligent Data Analytics for Terror Threat Prediction»). Если вы не нашли необходимую информацию о книге — напишите в комментариях, мы постараемся отыскать её.

Intelligent data analytics for terror threat prediction is an emerging field of research at the intersection of information science and computer science, bringing with it a new era of tremendous opportunities and challenges due to plenty of easily available criminal data for further analysis.
This book provides innovative insights that will help obtain interventions to undertake emerging dynamic scenarios of criminal activities. Furthermore, it presents emerging issues, challenges and management strategies in public safety and crime control development across various domains. The book will play a vital role in improvising human life to a great extent. Researchers and practitioners working in the fields of data mining, machine learning and artificial intelligence will greatly benefit from this book, which will be a good addition to the state-of-the-art approaches collected for intelligent data analytics. It will also be very beneficial for those who are new to the field and need to quickly become acquainted with the best performing methods. With this book they will be able to compare different approaches and carry forward their research in the most important areas of this field, which has a direct impact on the betterment of human life by maintaining the security of our society. No other book is currently on the market which provides such a good collection of state-of-the-art methods for intelligent data analytics-based models for terror threat prediction, as intelligent data analytics is a newly emerging field and research in data mining and machine learning is still in the early stage of development.

Intelligent Data Analytics for Terror Threat Prediction — читать онлайн ознакомительный отрывок

Ниже представлен текст книги, разбитый по страницам. Система сохранения места последней прочитанной страницы, позволяет с удобством читать онлайн бесплатно книгу «Intelligent Data Analytics for Terror Threat Prediction», без необходимости каждый раз заново искать на чём Вы остановились. Поставьте закладку, и сможете в любой момент перейти на страницу, на которой закончили чтение.

Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Rumor source detection approaches are broadly divided into two main categories: 1) single source detection approach and 2) multiple sources detection approach [10]. Single source detection approaches are query-based, anti-rumor-based, network observation, etc. Multiple source detection approaches are network partitioning, ranking-based, community-based, approximation-based, etc. Single source detection using network observation again has three types of observations such as snapshot, complete and monitor observations, etc. Query-based observation allows to find source of rumor by asking queries to neighbors about rumors [18], anti-rumor-based is by diffusing anti-rumors into the network can get information about network using monitor-based observation and use this information to find rumor source [19]. Multiple sources of rumor is also a challenging task, and can be done by network partitioning using rumor centrality metric [20], community-based which follows SIR model and reverse diffusion [21]. All these models are useful to find rumor source in online social networks. Rumor source identification and punishing the culprit reduces further diffusion of rumors and cyber-crimes in social networks. This survey explains in the rest of the chapter social networks and their features in Section 1.2. What is cyber-crime, various cyber-crimes and their impacts, cyber-crimes in social networks are discussed in Section 1.3. Rumor detection using classification models in Section 1.4. Factors consider in rumor source identification and its classifications are discussed in Section 1.5. Rumor source detection categories such as single source and multiple sources of rumor in network are discussed in Section 1.6. Summary of this survey is discussed in Section 1.7.

1.2 Social Networks

A social network is a website that allows people to make social interactions and personal relationship through sharing information like photos, videos, messages and comments, etc. [22].

1.2.1 Types of Social Networks

There are many social networking sites, among these some sites like Facebook, WhatsApp, Twitter and Instagram that have become popular platforms over a short period for social interaction across the world [3]. But the options available in these networking sites are limited even though they are popular. There are other social networks, which are having more number of options but not popular. All these social networks are classified based on the options like sharing photos, videos, thoughts of personal or professional which are available for people to interact and collaborate each other. The following categories explain about how each one classified based on available options. Figure 1.1depicts various social networks available online.

Figure 11 Social networks 23 The major benefit of social networks is - фото 2

Figure 1.1 Social networks [23].

The major benefit of social networks is keeping in touch with family members and friends. The following list shows the most widely used social networks for building social connections online. Table 1.1shows users for each network in millions.

Table 1.1 Social network users [24].

Service Active users (in millions)
Facebook 2,320
YouTube 1,900
WhatsApp 1,600
Facebook Messenger 1,300
WeChat 1,098
Instagram 1,000
QQ 807
Qzone 532
TikTok 500
Sina Wiebo 462
Twitter 330
Reddit 330
Douban 320
LinkedIn 303
Biadu Tieba 300
Skype 300
Snapchat 287
Viber 260
Pinterest 250
Discord 250
LINE 203
Telegram 200

Facebook: Facebook is arguably the most popular social media service, providing users with a way to build relationships and share information with people and organizations that they choose to communicate with online [3].

WhatsApp: It is a real-time social network that arrived later than Facebook but has evolved in a short time by offering user-friendly features such as quick messaging, sharing photos, videos, documents, voice and video calling, group chatting and protection for all these, etc. [3].

Twitter: Share your thoughts and keep ahead of others through this platform of real-time information [3].

YouTube: YouTube is the world’s largest social networking site for video sharing which allows users to upload and share videos, view them, comment on them, and like them. This social network is available throughout the world and even enables users to create a YouTube channel where they can share all of their personal videos to show their friends and followers [3].

Google +: The relatively new entrant to the social interaction marketplace is designed to allow users to establish communication circles with which they can communicate and which are integrated with other Google products [3].

MySpace: Though it initially began as a general social media site, MySpace has evolved to focus on social entertainment, providing a venue for social connections related to movies, music games and more [3].

Snapchat: This is social image messaging platform which allows you to chat with friends using pictures [3].

Interface through social network sites between online users is one of the major common computer-based activities. Facebook is most a dominant platform over a short span of time for social interaction across the world. Even though it stays the largest social networking site, sites like YouTube, Twitter, Google+ and Sina Wiebo all have lively and busy user populations that maintain social interactions in their own ways, with new features springing up all the time. With the help of inventive research methods and theoretical case studies, inventors can better realize how these networks work and measures their influence on various kinds of social interactions as well as the associated risks and benefits. Like sharing information which can be useful to public without hurtling other communities, religions, or political parties, etc. and the other is where people may share abusive photos, videos or sensitive information about country. For more advantages and disadvantages see Ref. [4].

1.3 What Is Cyber-Crime?

1.3.1 Definition

Cyber-crime is also called as computer-oriented crime, as this crime involves computer and network. It can be defined as “Offences that are committed against individuals or groups of individuals with a criminal motive to intentionally harm the reputation of the victim or cause physical or mental harm, or loss, to the victim directly or indirectly, using modern telecommunication networks such as Internet (networks including chat rooms, emails, notice boards and groups) and mobile phones (Bluetooth/SMS/MMS)” [25].

1.3.2 Types of Cyber-Crimes

Nowadays, there are many ways that cyber-crimes may occur using computers and network [5]. Some of the cyber-crimes such as hacking, cyber bullying, buying illegal things and posting videos of criminal activity are explained in following subsections.

1.3.2.1 Hacking

Hacking is nothing but attacking/accessing devices like computers and mobiles without the permission of owner. It can be done by people called as hackers, who attack/access our systems without permission. Hackers are basically computer programmers who hack by intruding programmes called as virus into our systems. These viruses may steal our data like username, password, documents, files, etc. stored in computer [6]. Hacking is not limited to individual computers but can even damage computers which are in network, as well as username, password, information of emails, bank accounts, social networking sites, etc. So there is a need to concentrate on these attacks to prevent them and punish the culprit.

Читать дальше
Тёмная тема
Сбросить

Интервал:

Закладка:

Сделать

Похожие книги на «Intelligent Data Analytics for Terror Threat Prediction»

Представляем Вашему вниманию похожие книги на «Intelligent Data Analytics for Terror Threat Prediction» списком для выбора. Мы отобрали схожую по названию и смыслу литературу в надежде предоставить читателям больше вариантов отыскать новые, интересные, ещё непрочитанные произведения.


Отзывы о книге «Intelligent Data Analytics for Terror Threat Prediction»

Обсуждение, отзывы о книге «Intelligent Data Analytics for Terror Threat Prediction» и просто собственные мнения читателей. Оставьте ваши комментарии, напишите, что Вы думаете о произведении, его смысле или главных героях. Укажите что конкретно понравилось, а что нет, и почему Вы так считаете.

x