Please use this identifier to cite or link to this item:
https://idr.l2.nitk.ac.in/jspui/handle/123456789/8233
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Trivedi, H. | - |
dc.contributor.author | Bindu, P.V. | - |
dc.contributor.author | Santhi Thilagam, P. | - |
dc.date.accessioned | 2020-03-30T10:18:15Z | - |
dc.date.available | 2020-03-30T10:18:15Z | - |
dc.date.issued | 2018 | - |
dc.identifier.citation | Proceedings of the 2nd International Conference on Computing Methodologies and Communication, ICCMC 2018, 2018, Vol., , pp.914-919 | en_US |
dc.identifier.uri | https://idr.nitk.ac.in/jspui/handle/123456789/8233 | - |
dc.description.abstract | Information provenance problem is an important and challenging problem in social network analysis and it deals with identifying the origin or source of information spread in a social network. In this paper, an approach for detecting the source of an information spread as well as suspicious anomalous paths in a social network is proposed. An anomalous path is a sequence of nodes that propagates an anomalous information to the given destination nodes who cause an anomalous event. The proposed approach is based on attribute-based anomalies and information cascading technique. The anomalous paths are identified in two steps. The first step assigns an anomalous score to each and every vertex in the given graph based on suspicious attributes. The second step detects the source and suspicious anomalous paths in the network using the anomaly scores. The approach is tested on datasets such as Enron and Facebook to demonstrate its effectiveness. Detecting anomalous paths is useful in several applications including identifying terrorist attacks communication path, disease spreading pattern, and match-fixing hidden path between bookie and a cricketer. � 2018 IEEE. | en_US |
dc.title | Identifying Provenance of Information and Anomalous Paths in Attributed Social Networks | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Files in This Item:
There are no files associated with this item.
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.