[PDF][PDF] Bot detection by friends graph in social networks.

M Kolomeets, A Chechulin, IV Kotenko - J. Wirel. Mob. Networks …, 2021 - academia.edu
In this paper, we propose a machine learning approach to detecting malicious bots on the
VKontakte social network. The advantage of this approach is that only the friends graph is …

The impact of Twitter on political influence on the choice of a running mate: Social Network Analysis and Semantic Analysis--A Review

I Wanza, I Kamuti, D Gichohi, K Gikunda - arXiv preprint arXiv:2208.00479, 2022 - arxiv.org
In this new era of social media, social networks are becoming increasingly important
sources of user-generated content on the internet. These kinds of information resources …

Graph theory-based structural analysis on density anomaly of silica glass

AR Tan, S Urata, M Yamada… - Computational Materials …, 2023 - Elsevier
Analyzing the atomic structure of glassy materials is a tremendous challenge both
experimentally and computationally, and the lack of direct, detailed insights into glass …

[PDF][PDF] Reference architecture for social networks graph analysis tool

M Kolomeets, A Benachour, D El Baz… - Journal of Wireless …, 2019 - researchgate.net
When analyzing social networks, graph data structures are often used. Such graphs may
have a complex structure that makes their operational analysis difficult or even impossible …

ISOMORPH: an efficient application on GPU for detecting graph isomorphism

A Llanes, B Imbernón Tudela, M Curado… - Engineering …, 2023 - emerald.com
Purpose The authors will review the main concepts of graphs, present the implemented
algorithm, as well as explain the different techniques applied to the graph, to achieve an …

Towards revealing parallel adversarial attack on politician socialnet of graph structure

Y Tian, J Liu, E Tong, W Niu, L Chang… - Security and …, 2021 - Wiley Online Library
Socialnet becomes an important component in real life, drawing a lot of study issues of
security and safety. Recently, for the features of graph structure in socialnet, adversarial …

Augmented reality for visualizing security data for cybernetic and cyberphysical systems

M Kolomeets, A Chechulin, K Zhernova… - 2020 28th Euromicro …, 2020 - ieeexplore.ieee.org
The paper discusses the use of virtual (VR) and augmented (AR) reality for visual analytics
in information security. Paper answers two questions:“In which areas of information security …

The impact of Twitter on political influence on the choice of a running mate: Social Network Analysis and Semantic Analysis-A Review

IW Musyoka, IK Mwendo, DG Maina, K Gikunda - 2022 - repository.dkut.ac.ke
In this new era of social media, social networks are becoming increasingly important
sources of user-generated content on the internet. These kinds of information resources …

[HTML][HTML] Российская гуманитарная миссия в Бергамо в борьбе с пандемией коронавируса: отражение в медиадискурсе Италии

ДП Гавра, КА Науменко - Вестник Московского университета …, 2020 - cyberleninka.ru
В статье представлены результаты исследования отражения в медиадискурсе Италии
российской гуманитарной миссии «Из России с любовью» в Бергамо в апреле 2020 г.-в …

Graph Databases for Complex Network Analysis

L Chunjiang, L Shuying… - Data Analysis and …, 2021 - manu44.magtech.com.cn
[Objective] This paper systematically reviews the progress and trends of graph database
research and applications for complex network analysis.[Coverage] We searched the Web of …