-
1
-
-
56349094785
-
Fast unfolding of communities in large networks
-
V. D. Blondel, J.-L. Guillaume, R. Lambiotte, and E. Lefebvre. Fast unfolding of communities in large networks. Journal of Statistical Mechanics: Theory and Experiment, 2008(10):P10008, 2008
-
(2008)
Journal of Statistical Mechanics: Theory and Experiment
, Issue.10
, pp. P10008
-
-
Blondel, V.D.1
Guillaume, J.-L.2
Lambiotte, R.3
Lefebvre, E.4
-
2
-
-
70450193106
-
Eight friends are enough: Social graph approximation via public listings
-
ACM
-
J. Bonneau, J. Anderson, R. Anderson, and F. Stajano. Eight friends are enough: Social graph approximation via public listings. In Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09, pages 13-18. ACM, 2009
-
(2009)
Proceedings of the Second ACM EuroSys Workshop on Social Network Systems, SNS '09
, pp. 13-18
-
-
Bonneau, J.1
Anderson, J.2
Anderson, R.3
Stajano, F.4
-
5
-
-
33750177351
-
Centrality in social networks conceptual clarification
-
L. C. Freeman. Centrality in social networks conceptual clarification. Social networks, 1(3):215-239, 1979
-
(1979)
Social Networks
, vol.1
, Issue.3
, pp. 215-239
-
-
Freeman, L.C.1
-
7
-
-
84862298450
-
-
Paris
-
M. Jacomy, S. Heymann, T. Venturini, and M. Bastian. Forceatlas2, a graph layout algorithm for handy network visualization. Paris http://www. medialab. sciences-po. fr/fr/publications-fr, 2011
-
(2011)
Forceatlas2, a Graph Layout Algorithm for Handy Network Visualization
-
-
Jacomy, M.1
Heymann, S.2
Venturini, T.3
Bastian, M.4
-
8
-
-
0038401985
-
Mapping networks of terrorist cells
-
V. E. Krebs. Mapping networks of terrorist cells. Connections, 24(3):43-52, 2002
-
(2002)
Connections
, vol.24
, Issue.3
, pp. 43-52
-
-
Krebs, V.E.1
-
9
-
-
79960530721
-
Structure and evolution of online social networks
-
Springer
-
R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In Link Mining: Models, Algorithms, and Applications, pages 337-357. Springer, 2010
-
(2010)
Link Mining: Models, Algorithms, and Applications
, pp. 337-357
-
-
Kumar, R.1
Novak, J.2
Tomkins, A.3
-
10
-
-
77954619566
-
What is twitter, a social network or a news media
-
ACM
-
H. Kwak, C. Lee, H. Park, and S. Moon. What is twitter, a social network or a news media? In Proceedings of the 19th international conference on World wide web, pages 591-600. ACM, 2010
-
(2010)
Proceedings of the 19th International Conference on World Wide Web
, pp. 591-600
-
-
Kwak, H.1
Lee, C.2
Park, H.3
Moon, S.4
-
11
-
-
53449095174
-
Main-memory triangle computations for very large (sparse (power-law)) graphs
-
M. Latapy. Main-memory triangle computations for very large (sparse (power-law)) graphs. Theoretical Computer Science, 407(1):458-473, 2008
-
(2008)
Theoretical Computer Science
, vol.407
, Issue.1
, pp. 458-473
-
-
Latapy, M.1
-
12
-
-
80051960199
-
Click trajectories: End-to-end analysis of the spam value chain
-
Oakland, CA, May
-
K. Levchenko, A. Pitsillidis, N. Chachra, B. Enright, M. Félegyházi, C. Grier, T. Halvorson, C. Kanich, C. Kreibich, H. Liu, D. McCoy, N. Weaver, V. Paxson, G. M. Voelker, and S. Savage. Click Trajectories: End-to-End Analysis of the Spam Value Chain. In Proceedings of the IEEE Symposium and Security and Privacy, pages 431-446, Oakland, CA, May 2011
-
(2011)
Proceedings of the IEEE Symposium and Security and Privacy
, pp. 431-446
-
-
Levchenko, K.1
Pitsillidis, A.2
Chachra, N.3
Enright, B.4
Félegyházi, M.5
Grier, C.6
Halvorson, T.7
Kanich, C.8
Kreibich, C.9
Liu, H.10
McCoy, D.11
Weaver, N.12
Paxson, V.13
Voelker, G.M.14
Savage, S.15
-
13
-
-
79951846085
-
Social network analysis of a criminal hacker community
-
Y. Lu, M. Polgar, X. Luo, and Y. Cao. Social network analysis of a criminal hacker community. Journal of Computer Information Systems, 51(2):31-41, 2010
-
(2010)
Journal of Computer Information Systems
, vol.51
, Issue.2
, pp. 31-41
-
-
Lu, Y.1
Polgar, M.2
Luo, X.3
Cao, Y.4
-
14
-
-
84869463505
-
Priceless: The role of payments in abuse-advertised goods
-
Raleigh, NC, Oct
-
D. McCoy, H. Dharmdasani, C. Kreibich, G. M. Voelker, and S. Savage. Priceless: The Role of Payments in Abuse-advertised Goods. In Proceedings of the ACM Conference on Computer and Communications Security, Raleigh, NC, Oct. 2012
-
(2012)
Proceedings of the ACM Conference on Computer and Communications Security
-
-
McCoy, D.1
Dharmdasani, H.2
Kreibich, C.3
Voelker, G.M.4
Savage, S.5
-
15
-
-
84900789776
-
Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs
-
USENIX Association
-
D. McCoy, A. Pitsillidis, G. Jordan, N. Weaver, C. Kreibich, B. Krebs, G. M. Voelker, S. Savage, and K. Levchenko. Pharmaleaks: Understanding the business of online pharmaceutical affiliate programs. In Proceedings of the 21st USENIX conference on Security symposium, pages 1-1. USENIX Association, 2012
-
(2012)
Proceedings of the 21st USENIX Conference on Security Symposium
, pp. 1-1
-
-
McCoy, D.1
Pitsillidis, A.2
Jordan, G.3
Weaver, N.4
Kreibich, C.5
Krebs, B.6
Voelker, G.M.7
Savage, S.8
Levchenko, K.9
-
16
-
-
42149117427
-
Measurement and analysis of online social networks
-
ACM
-
A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee. Measurement and analysis of online social networks. In Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pages 29-42. ACM, 2007
-
(2007)
Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement
, pp. 29-42
-
-
Mislove, A.1
Marcon, M.2
Gummadi, K.P.3
Druschel, P.4
Bhattacharjee, B.5
-
17
-
-
82955190605
-
An analysis of underground forums
-
Berlin, CA, Nov
-
M. Motoyama, D. McCoy, K. Levchenko, S. Savage, and G. M. Voelker. An Analysis of Underground Forums. In Proceedings of the ACM Internet Measurement Conference, Berlin, CA, Nov. 2011
-
(2011)
Proceedings of the ACM Internet Measurement Conference
-
-
Motoyama, M.1
McCoy, D.2
Levchenko, K.3
Savage, S.4
Voelker, G.M.5
-
18
-
-
0038752085
-
Mixing patterns in networks
-
M. E. Newman. Mixing patterns in networks. Physical Review E, 67(2):026126, 2003
-
(2003)
Physical Review e
, vol.67
, Issue.2
, pp. 026126
-
-
Newman, M.E.1
-
19
-
-
37649028224
-
Finding and evaluating community structure in networks
-
M. E. Newman and M. Girvan. Finding and evaluating community structure in networks. Physical review E, 69(2):026113, 2004
-
(2004)
Physical Review e
, vol.69
, Issue.2
, pp. 026113
-
-
Newman, M.E.1
Girvan, M.2
-
21
-
-
20444504323
-
Uncovering the overlapping community structure of complex networks in nature and society
-
G. Palla, I. Derényi, I. Farkas, and T. Vicsek. Uncovering the overlapping community structure of complex networks in nature and society. Nature, 435(7043):814-818, 2005
-
(2005)
Nature
, vol.435
, Issue.7043
, pp. 814-818
-
-
Palla, G.1
Derényi, I.2
Farkas, I.3
Vicsek, T.4
-
22
-
-
24944475288
-
Analyzing terrorist networks: A case study of the global salafi jihad network
-
Springer
-
J. Qin, J. J. Xu, D. Hu, M. Sageman, and H. Chen. Analyzing terrorist networks: A case study of the global salafi jihad network. In Intelligence and security informatics, pages 287-304. Springer, 2005
-
(2005)
Intelligence and Security Informatics
, pp. 287-304
-
-
Qin, J.1
Xu, J.J.2
Hu, D.3
Sageman, M.4
Chen, H.5
-
23
-
-
0012254042
-
The application of network analysis to criminal intelligence: An assessment of the prospects
-
M. K. Sparrow. The application of network analysis to criminal intelligence: An assessment of the prospects. Social networks, 13(3):251-274, 1991
-
(1991)
Social Networks
, vol.13
, Issue.3
, pp. 251-274
-
-
Sparrow, M.K.1
-
24
-
-
84869407868
-
The underground economy of fake antivirus software
-
B. Stone-Gross, R. Abman, R. Kemmerer, C. Kruegel, D. Steigerwald, and G. Vigna. The Underground Economy of Fake Antivirus Software. In Proceedings of the Workshop on Economics of Information Security (WEIS), 2011
-
(2011)
Proceedings of the Workshop on Economics of Information Security (WEIS)
-
-
Stone-Gross, B.1
Abman, R.2
Kemmerer, R.3
Kruegel, C.4
Steigerwald, D.5
Vigna, G.6
-
28
-
-
20344376408
-
Criminal network analysis and visualization
-
J. Xu and H. Chen. Criminal network analysis and visualization. Communications of the ACM, 48(6):100-107, 2005
-
(2005)
Communications of the ACM
, vol.48
, Issue.6
, pp. 100-107
-
-
Xu, J.1
Chen, H.2
-
29
-
-
4544224894
-
Fighting organized crimes: Using shortest-path algorithms to identify associations in criminal networks
-
J. J. Xu and H. Chen. Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks. Decision Support Systems, 38(3):473-487, 2004
-
(2004)
Decision Support Systems
, vol.38
, Issue.3
, pp. 473-487
-
-
Xu, J.J.1
Chen, H.2
-
30
-
-
20344383501
-
Crimenet explorer: A framework for criminal network knowledge discovery
-
J. J. Xu and H. Chen. Crimenet explorer: A framework for criminal network knowledge discovery. ACM Transactions on Information Systems (TOIS), 23(2):201-226, 2005
-
(2005)
ACM Transactions on Information Systems (TOIS)
, vol.23
, Issue.2
, pp. 201-226
-
-
Xu, J.J.1
Chen, H.2
-
31
-
-
84860872656
-
Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter
-
ACM
-
C. Yang, R. Harkreader, J. Zhang, S. Shin, and G. Gu. Analyzing spammers' social networks for fun and profit: A case study of cyber criminal ecosystem on twitter. In Proceedings of the 21st international conference on World Wide Web, pages 71-80. ACM, 2012.
-
(2012)
Proceedings of the 21st International Conference on World Wide Web
, pp. 71-80
-
-
Yang, C.1
Harkreader, R.2
Zhang, J.3
Shin, S.4
Gu, G.5
|