Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 6 of 6

Full-Text Articles in Engineering

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini Jun 2019

Influence Spread In Two-Layer Interdependent Networks: Designed Single-Layer Or Random Two-Layer Initial Spreaders?, Hana Khamfroush, Nathaniel Hudson, Samuel Iloo, Mahshid R. Naeini

Computer Science Faculty Publications

Influence spread in multi-layer interdependent networks (M-IDN) has been studied in the last few years; however, prior works mostly focused on the spread that is initiated in a single layer of an M-IDN. In real world scenarios, influence spread can happen concurrently among many or all components making up the topology of an M-IDN. This paper investigates the effectiveness of different influence spread strategies in M-IDNs by providing a comprehensive analysis of the time evolution of influence propagation given different initial spreader strategies. For this study we consider a two-layer interdependent network and a general probabilistic threshold influence spread model …


Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen Jan 2019

Trust Model And Simulation Of E-Commerce Based On Social Networks, Yu Zhen, Zhu Jie, Guicheng Shen

Journal of System Simulation

Abstract: In the current e-commerce industry, users need to check for the historical evaluation of the commodity before buying goods mostly, but false recommendations and massive redundancy recommendation problem which widely exists at present seriously affect the effectiveness and accuracy of users’ obtaining recommendations. For getting trust in e-commerce transactions, an e-commerce trust model SNTrust based on social networks is proposed. In SNTrust model, each user maintains a trusted social network set; a topological structure of the user information diffusion in the social network is described in the model, and the recommendation node trust is introduced to measure its credibility, …


Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh Jan 2019

Community Detection In Complex Networks Using A New Agglomerative Approach, Majid Arasteh, Somayeh Alizadeh

Turkish Journal of Electrical Engineering and Computer Sciences

Complex networks are used for the representation of complex systems such as social networks. Graph analysis comprises various tools such as community detection algorithms to uncover hidden data. Community detection aims to detect similar subgroups of networks that have tight interconnections with each other while, there is a sparse connection among different subgroups. In this paper, a greedy and agglomerative approach is proposed to detect communities. The proposed method is fast and often detects high-quality communities. The suggested method has several steps. In the first step, each node is assigned to a separated community. In the second step, a vertex …


Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud Jan 2019

Understanding Attribute And Social Circle Correlation In Social Networks, Pranav Nerurkar, Madhav Chandane, Sunil Bhirud

Turkish Journal of Electrical Engineering and Computer Sciences

Social circles, groups, lists, etc. are functionalities that allow users of online social network (OSN) platforms to manually organize their social media contacts. However, this facility provided by OSNs has not received appreciation from users due to the tedious nature of the task of organizing the ones that are only contacted periodically. In view of the numerous benefits of this functionality, it may be advantageous to investigate measures that lead to enhancements in its efficacy by allowing for automatic creation of customized groups of users (social circles, groups, lists, etc). The field of study for this purpose, i.e. creating coarse-grained …


Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li Jan 2019

Securing Modern Cyberspace Using A Multi-Faceted Approach, Yu Li

Browse all Theses and Dissertations

Security has become one of the most significant concerns for our cyberspace. Securing the cyberspace, however, becomes increasingly challenging. This can be attributed to the rapidly growing diversities and complexity of the modern cyberspace. Specifically, it is not any more dominated by connected personal computers (PCs); instead, it is greatly characterized by cyber-physical systems (CPS), embedded systems, dynamic services, and human-computer interactions. Securing modern cyberspace therefore calls for a multi-faceted approach capable of systematically integrating these emerging characteristics. This dissertation presents our novel and significant solutions towards this direction. Specifically, we have devised automated, systematic security solutions to three critical …


Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis Jan 2019

Privacy Issues In Post Dissemination On Facebook, Burcu Sayi̇n Günel, Serap Şahi̇n, Dimitris G. Kogias, Charalampos Z. Patrikakis

Turkish Journal of Electrical Engineering and Computer Sciences

With social networks (SNs) being populated by a still increasing numbers of people who take advantage of the communication and collaboration capabilities that they offer, the probability of the exposure of people's personal moments to a wider than expected audience is also increasing. By studying the functionalities and characteristics that modern SNs offer, along with the people's habits and common behaviors in them, it is easy to understand that several privacy risks may exist, many of which people may be unaware of. In this paper, we focus on users' interactions with posts in a social network (SN), using Facebook as …