SlideShare ist ein Scribd-Unternehmen logo
1 von 30
Downloaden Sie, um offline zu lesen
‫خرد‬ ‫و‬ ‫جان‬ ‫خداوند‬ ‫نام‬ ‫به‬
‫چگونه‬ ‫و‬ ‫چرا‬ ،‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬‫چگونه‬ ‫و‬ ‫چرا‬ ،‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬
:‫دهنده‬ ‫ارائه‬
‫حصارکی‬ ‫الهام‬
. .Elham hesaraki@gmail com
‫آپ‬ ‫اسکیل‬ ‫رویداد‬ ‫دومین‬ ‫در‬ ‫شده‬ ‫ارائه‬
‫ارائه‬ ‫محتوای‬
‫ها‬‫پرسش‬
‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬
‫تحلیل‬ ‫چرایی‬
‫موردی‬ ‫بررسی‬
‫تحلیل‬ ‫چگونگی‬
●
‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تعریف‬
•‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ ‫چرایی‬
•‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ ‫چگونگی‬
•‫موردی‬ ‫بررسی‬
‫‌ها‬‫ش‬‫پرس‬
‫چرایی‌تحلیل‬
•‫بازاریابی‬
•‫مشتریان‬ ‫با‬ ‫روابط‬ ‫مدیریت‬
•‫مشتریان‬ ‫علیق‬ ‫و‬ ‫بازار‬ ‫شناسایی‬
•‫ها‬‫انتخابات‬ ‫در‬ ‫ویژه‬ ‫به‬ ‫نتایج‬ ‫بینی‬‫پیش‬
•‫نوظهور‬ ‫موضوعات‬ ‫کشف‬
•‫موضوعی‬ ‫روندهای‬ ‫کشف‬
‫چرایی‌تحلیل‬
•‫تشنج‬ ‫ایجاد‬ ‫به‬ ‫که‬ ‫مجازی‬ ‫های‬‫شبکه‬ ‫در‬ ‫یافته‬ ‫سازمان‬ ‫های‬‫گروهک‬ ‫شناسایی‬
‫پردازند‬‫می‬ ‫واقعی‬ ‫و‬ ‫مجازی‬ ‫جوامع‬ ‫در‬
•‫اجتماعی‬ ‫مشکلت‬ ‫کشف‬ ‫جهت‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫در‬ ‫ناهنجاری‬ ‫تشخیص‬
‫واقعی‬ ‫جوامع‬ ‫در‬ ‫روانی‬ ‫و‬
•‫ساختاری‬ ‫و‬ ‫رفتاری‬ ‫های‬‫ویژگی‬ ‫ترکیب‬ ‫با‬ ‫کاربر‬ ‫رفتار‬ ‫در‬ ‫نویی‬ ‫تشخیص‬
‫شده‬ ‫هک‬ ‫کاربری‬ ‫های‬‫حساب‬ ‫کشف‬ ‫جهت‬
•‫ها‬‫سازمان‬ ‫یا‬ ‫افراد‬ ‫از‬ ‫متشکل‬ ‫ساختاری‬
•‫شبکه‬ ‫درون‬ ‫بازیگران‬ :‫ها‬‫گره‬
•‫ای‬‫گره‬ ‫میان‬ ‫روابط‬
•‫شبکه‬ ‫در‬ ‫روابط‬ ‫گوناگون‬ ‫انواع‬ ‫وجود‬
‫‌های‌اجتماعی‬‫ه‬‫شبک‬
•‫وب‬۲.۰‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحول‬ ‫و‬
•‫ها‬‫آن‬ ‫میان‬ ‫روابط‬ ‫و‬ ‫کاربران‬ ‫از‬ ‫متشکل‬ ‫ساختاری‬
‫‌های‌اجتماعی‌برخط‬‫ه‬‫شبک‬
•(‫)تلگرام‬ ‫آنی‬ ‫رسان‬ ‫پیام‬ ‫خدمات‬
•(‫)توییتر‬ ‫میکروبلگینگ‬ ‫خدمات‬
•(‫)یوتیوب‬ ‫ویدئو‬ ‫گذاری‬‫اشتراک‬ ‫به‬ ‫خدمات‬
•(‫)اینستاگرام‬ ‫تصاویر‬ ‫یا‬ ‫کوتاه‬ ‫زمان‬ ‫ویدئوی‬ ‫گذاری‬‫اشتراک‬ ‫به‬ ‫خدمات‬
•(‫بوک‬‫)فیس‬ ‫ترکیبی‬ ‫خدمات‬
‫‌های‌اجتماعی‌برخط‬‫ه‬‫انواع‌شبک‬
•:‫شامل‬ ‫یکتا‬ ‫ای‬‫صفحه‬
‫کاربری‬‫اسم/نام‬
‫سن‬
‫جغرافیایی‬ ‫موقعیت‬
‫محتوا‬ ‫گذاری‬‫اشتراک‬ ‫زمانی‬ ‫پنجره‬
‫شوندگان‬ ‫کنندگان/دنبال‬ ‫دنبال‬
(‫دهی‬‫پاسخ‬ ،‫پسندیدن‬ ،‫)بازنشر‬ ‫واکنشی‬ ‫های‬‫قابلیت‬
‫نمایه‌کاربری‬
•‫مشترک‬ ‫های‬‫ویژگی‬
•‫خاص‬ ‫های‬‫ویژگی‬
‫‌های‌شبکه‬‫ی‬‫ویژگ‬
‫کاراکتر‬ ‫محدودیت‬
‫محتوا‬ ‫نوع‬ ‫محدودیت‬
‫واقعی‬ ‫زمان‬ ‫واقعی/غیر‬ ‫زمان‬
•‫افراد‬ ‫میان‬ ‫های‬‫جریان‬ ‫و‬ ‫روابط‬ ‫سنجش‬ ‫و‬ ‫نگاشت‬
•‫داده‬ ‫انبوه‬ ‫حجم‬ ‫از‬ ‫خرد‬ ‫و‬ ‫دانش‬ ‫کشف‬
•!‫داده‬ ‫کلن‬ ‫مساله‬ ‫یک‬
‫‌های‌اجتماعی‌برخط‬‫ه‬‫تحلیل‌شبک‬
•‫شبکه‬ ‫تحلیل‬ ‫انواع‬
•‫تحلیل‬ ‫های‬‫سنجه‬
‫انواع‌تحلیل‌شبکه‬
.‫خیالی‬ ‫اجتماعی‬ ‫شبکه‬ ‫یک‬ ‫در‬ ‫کاربر‬ ‫اگو‬ ‫شبکه‬
‫اگو‬ ‫شبکه‬
‫شبکه‬ ‫سراسری‬ ‫تحلیل‬
•(‫هوموفیلی‬ ،‫تعدی‬ ،‫بسته‬ ‫شبکه‬ ،‫متقابل‬ ‫رابطه‬ ،‫تعدی‬ ،‫)قرابت‬ ‫ارتباطات‬
•(‫ساختاری‬ ‫چاله‬ ،‫شبکه‬ ‫چگالی‬ ،‫مرکزیت‬ ،‫)پل‬ ‫توزیع‬
•(‫انسجام‬ ‫ضریب‬ ،‫ستاره‬ ،‫)گروهک‬ ‫بندی‬‫بخش‬
•!‫جدایی‬ ‫درجه‬ ‫شش‬ ‫مفهوم‬
‫‌ها‬‫ه‬‫انواع‌سنج‬
•‫ها‬‫داده‬ ‫انواع‬
‫ناهنجار‬ ‫های‬‫توپولوژی‬ ‫انواع‬
‫ساختاری‬
‫رفتاری‬
‫ناهنجار‬ ‫های‬‫توپولوژی‬
‫انواع‌داده‬
‫بررسی‌موردی‬
•۱۹۵‫و‬ ‫گره‬۵۹۲۸‫یال‬
.‫ساختاری‬ ‫داده‬ ‫مجموعه‬ ‫گراف‬
‫بررسی‌موردی‬
•‫رفتاری‬ ‫های‬‫داده‬
•‫ساختاری‬ ‫های‬‫داده‬
:‫شده‬ ‫محاسبه‬ ‫مناسب‬ ‫خوشه‬ ‫تعداد‬۳
‫خوشه‬ ‫هر‬ ‫اعضای‬ ‫تعداد‬۴،۱‫و‬۱۹۰
:‫وینزور‬ ‫میانگین‬ ‫مقدار‬۳۹/۸
:‫شده‬ ‫محاسبه‬ ‫مناسب‬ ‫خوشه‬ ‫تعداد‬۳
‫خوشه‬ ‫هر‬ ‫اعضای‬ ‫تعداد‬۷۳،۵۰‫و‬۷۲
:‫وینزور‬ ‫میانگین‬ ‫مقدار‬۶۵/۴
‫منابع‬
[۱] Chandola V, Banerjee A and Kumar V "Anomaly Detection: A Survey", ACM Computer Survey, 41(3), Article
15, 1-58, 2009.
[۲] Hodge V and Austin J "A Survey of Outlier Detection Methodologies", Artificial Intelligence Review, 22(2),
85–126, 2004.
[۳] Hassanzadeh R Anomaly Detection in Online Social Networks: Using Data Mining Techniques and Fuzzy
Logic, School of Electrical Engineering and Computer Science, Queensland University of Technology, 2014.
[۴] Shearer C "The CRISP-DM model: The New Blueprint for Data Mining", Journal of Data Warehousing, 5,
13-22, 2000.
[۵] Tran D, Ma W and Sharma D "Network Anomaly Detection Using Fuzzy Gaussian Mixture Models",
International Journal of Future Generation Communication and Networking, 1(1), 37-42, 2006.
[۶] Kaur H and Gill N "Host Based Anomaly Detection Using Fuzzy Genetic Approach (FGA)", International
Journal of Computer Applications, 74(20), 2013.
]۷[‫در‬ ‫ناهنجاری‬ ‫تشخیص‬ ‫برای‬ ‫مصنوعی‬ ‫زنبورهای‬ ‫کلونی‬ ‫و‬ ‫منفی‬ ‫انتخاب‬ ‫های‬‫الگوریتم‬ ‫بر‬ ‫مبتنی‬ ‫ترکیبی‬ ‫رویکردی‬ ‫م‬ ‫آبادی‬ ‫و‬ ‫ف‬ ‫بارانی‬"
‫متحرک‬ ‫اقتضایی‬ ‫های‬‫شبکه‬"‫ایران‬ ‫رمز‬ ‫انجمن‬ ‫المللی‬‫بین‬ ‫کنفرانس‬‫شهریور‬ ،‫مشهد‬ ‫فردوسی‬ ‫دانشگاه‬ ،۱۳۹۰.
]۸[، ‫فازی‬ ‫گیری‬‫رای‬ ‫روش‬ ‫با‬ ‫خوشه‬ ‫بر‬ ‫مبتنی‬ ‫اقتضایی‬ ‫های‬‫شبکه‬ ‫در‬ ‫ناهنجاری‬ ‫تشخیص‬ ‫س‬ ‫جلیلی‬ ‫و‬ ‫م‬ ‫منش‬ ‫رحمانی‬" "‫برق‬ ‫مهندسی‬ ‫نشریه‬
‫ایران‬ ‫کامپیوتر‬ ‫مهندسی‬ ‫و‬) ،۲(۱۰‫زمستان‬ ،۱۳۹۱.
[9] Izakian H and Pedrycz W "Anomaly Detection in Time Series Data using a Fuzzy C-Means Clustering" Fifth
International Symposium on Computational Intelligence and Design (ISCID), IEEE, 1513-1518, China, 2013.
[10] [10] Rabatel J, Bringay S and Poncelet P "Fuzzy Anomaly Detection in Monitoring Sensor Data" 18th
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, 1-8, Spain, 2011.
‫منابع‬
[۱۱] Gómez J, González F and Dasgupta D "An Immuno-Fuzzy Approach to Anomaly Detection" The 12th IEEE
International Conference on Fuzzy Systems, 2, 1219-1224, USA, 2003.
[۱۲] Parvath Devi K and Siva Prasad YA "Study of Anomaly Identification Techniques in Large scale systems",
International Journal of Computer Trends and Technology, 3(1), 11-17, 2012.
[۱۳] Doostari M A, Zeinali R, Lashkari H and Ajamzamani M "Anomaly Detection in Cliques of Online Social
Networks Using Fuzzy Node-Fuzzy Graph",Journal of Basic and Applied Scientific Research, 3(8), 614-626,
2013.
[۱۴] Shamshirband Sh, Anuar N B, Mat Kiah L and Misra S "Anomaly Detection using Fuzzy Q-learning
Algorithm", Acta Polytechnica Hungarica, 11(8), 5-28, 2014.
[۱۵] Jabez J and Muthukumar B "Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection
Approach", Procedia Computer Science, sciencedirect, 48, 338-346, 2015.
[۱۶] Savage D, Zhang X, Yu X, Choua P b, Wang Q "Anomaly Detection in Online Social Networks", Social
Networks, sciencedirect, 39, 62-70, 2014.
[۱۷] www.systems-thinking.org/dikw/dikw.htm, Bellinger G, Castro D and Mills A, 2 January 2017, 23:00.
[۱۸] Mouthann N Effects of Big Data Analytic on Organization's Value Creation, Faculty of science and faculty of
economics and business, University of Amsterdam, 2012.
[۱۹] www.computable.nl/artikel/opinie/business-intelligence/4485335/1509029/big-data-wat-was-de-vraag.html,
Ras P, 2 January 2017, 23:30.
[۲۰] www.sync.nl/de-opvolger-van-de-cloud-big-data, Leeuwen R V, 2 January 2017, 23:30.
‫منابع‬
[۲۱] Han J and Kamber M and Cerra D Data Mining: Concepts and Techniques, Morgan Kaufmann,Waltham,
USA, 2012.
[۲۲] Kantardzic M Data Mining: Concepts, Models, Methods and Algorithms, Second Edition, John Wiley &
Sons, Hoboken, USA, 2011.
[۲۳] Tamilselvi R and Kalaiselvi S "An Overview of Data Mining Techniques and Applications", International
Journal of Science and Research (IJSR), 2(2), 506-509, 2013.
[۲۴] www.thearling.com/text/dmwhite/dmwhite.htm, Gartner Group High Performance Computing Research, 2
January 2017, 16:30.
[۲۵] Tan p, Steincach M and Kumar V Introduction to Data Mining, Addison Wesley, 2005.
[۲۶] Oracle BI Group Oracle Data Mining Concepts, Release 1, Oracle, 2008.
[۲۷] Gibert K, Sànchez-Marrè M and Codina V "Choosing the Right Data Mining Technique: Classification of
Methods and Intelligent Recommendation" International Congress on Environmental Modelling and Software
Modelling for Environment’s Sake, International Environmental Modelling and Software Society (iEMSs),
Canada, 2010.
[۲۸] Cheeseman P and Oldford R W Selecting models from data, Springer, 1994.
[۲۹] www.data-mining.philippefournierviger.com/whatarethestepstoimplementadataminingalgorithm, Fournier
Viger Ph, 2 January 2017, 20:30.
[۳۰] www.msdn.microsoft.com/en-us/library/ms175595.aspx, Anon, 2 January 2017, 21:00.
[۳۱] Witten I.H, Frank E and Hall M.A Data Mining: Practical Machine Learning Tools and Techniques, 3rd
Edtion, Morgan Kaufmann,Waltham, USA, 2011.
‫منابع‬
[۳۲] Chikohora T T "A Study of the Factors Considered when Choosing an Appropriate Data Mining Algorithm",
International Journal of Soft Computing and Engineering (IJSCE), 4(3), 42-45, July 2014.
[۳۳] www.ibm.com/developerworks/ru/library/ba-data-mining-techniques, Brown M, 2 January 2017, 21:30.
[۳۴] www.iaonline.theiia.org/data-mining-101-tools-and-techniques, Silltow J, 2 January 2017, 21:45.
[۳۵] Chung M.H and Gray P "Special Section Data mining", Journal of Management Information Systems, 16(1),
1999.
[۳۶] Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C and Wirth R CRISP-DM 1.0, SPSS, 2000.
[۳۷] Marsala Ch And Bounchon-Meunier B "Fuzzy Data Mining and Management of Interpretable and Subjective
Information", Elsevier Fuzzy Sets and Systems Journal, 281, 252–259, December 2015.
[۳۸] Casillas J, Cordón O, Herrera F and Magdalena L "Interpretability Improvements to Find the Balance
Interpretability Accuracy in Fuzzy Modeling: An Overview, Interpretability Issues in Fuzzy Modeling",
Springer, Berlin Heidelberg, 128, 3–22, 2003.
[۳۹] Elouedi Z, Mellouli K and Smets P "Belief decision trees: Theoretical Foundations", International Journal of
Approximate Reasoning, 28, 91–124, 2001.
[۴۰] Bujnowski P, Szmidt E and Kacprzyk J "Intuitionistic Fuzzy Decision Trees: A New Approach" 13th
International Conference on Artificial Intelligence and Soft Computing (ICAISC), Vol 8467 of Lecture Notes in
Computer Science, Springer, 181–192, 2014.
[۴۱] www.lrs.ed.uiuc.edu/TSE-portal/analysis/social-network-analysis, Gretzel U, 2 January 2017, 18:00.
[۴۲] Hogan B, Carrasco J A and Wellman B "Visualizing Personal Networks: Working with Participant-aided
Sociograms", Field Methods, Sage Publications, 19(2), 116-144, May 2007.
‫منابع‬
[۴۳] Freeman L The Development of Social Network Analysis, Empirical Press, Vancouver, 2006.
[۴۴] Otte E and Rousseau R "Social Network Analysis: a powerful strategy, also for the information sciences",
Journal of Information Science, 28(6), 441-453, 2002.
[۴۵] McPherson N, Smith-Lovin L and Cook J.M "Birds of a Feather: Homophily in Social Networks", Annual
Review of Sociology, 27, 415–444, 2001.
[۴۶] Podolny, J M and Baron J N "Resources and Relationships: Social Networks and Mobility in the
Workplace", American Sociological Review, 62(5), 673-693, 1997.
[۴۷] Flynn, F J, Reagans R E and Guillory L "Do You Two Know Each Other? Transitivity, Homophily and the
Need for (Network) Closure", Journal of Personality, 99(5), November 2010.
[۴۸] Maksim T and Alexander K Social Network Analysis for Startups: Finding Connections on the Social Web,
O'Reilly, 2011.
[۴۹] Guandong X, Xu Yu J and Lee W Web Mining and Social Networking: Techniques and Applications,
Springer, 2012.
[۵۰] www.intersci.ss.uci.edu/wiki/index.php/Cohesive_blocking, 2 January 2017, 23:30.
[۵۱] Hanneman R.A and Mark R "Concepts and Measures for Basic Network Analysis", The Sage Handbook of
Social Network Analysis, Sage, 346–347, 2005.
[۵۲] Pattillo J, Youssef N and Butenko S "On Clique Relaxation Models in Social Network Analysis", European
Journal of Operational Research, 226, 9-18, 20, 2013.
[۵۳] Kurka D.B, Godoy A and Von Zuben F.J "Online Social Network Analysis: A Survey of Research
Applications in Computer Science", The Computing Research Repository (CoRR), 2016.
‫منابع‬
[۵۴] Teng H, Chen K and Lu S " Adaptive Real-Time Anomaly Detection Using Inductively Generated
Sequential Patterns", IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer
Society Press, 278–284, 1990.
[۵۵] Rousseeuw P J and Leroy A M Robust Regression and Outlier Detection, John Wiley & Sons, USA, 1987.
[۵۶] Markou M and Singh S "Novelty Detection: A Review-part 1: Statistical Approaches", Signal Processing,
Elsevier, 83(12), 2481–2497, 2003.
[۵۷] Markou M and Singh S "Novelty Detection: A Review-Part 2: Neural Network Based Approaches", Signal
Processing, Elsevier, 83(12), 2499–2521, 2003.
[۵۸] Saunders R and Gero J "The Importance of Being Emergent" Conference of Artificial Intelligence in
Design, 2000.
[۵۹] Song X, Wu M, Jermaine C and Ranka S "Conditional Anomaly Detection", IEEE Transactions on
Knowledge and Data Engineering, 19(5), 631–645, 2007.
[۶۰] Weigend, A S, Mangeas M and Srivastava A.N "Nonlinear Gated Experts for Time-Series, Discovering
Regimes and Avoiding Overfitting", International Journal of Neural Systems, 6(4), 373–399, 1995.
[۶۱] Salvador S and Chan P "Learning States and Rules for Time-Series Anomaly Detection", Tech Rep in
Department of Computer Science, Florida Institute of Technology, Melbourne, 2003.
[۶۳] Shekhar S, Lu C T and Zhang P "Detecting Graph-Based Spatial Outliers: Algorithms and Applications (A
Summary of Results)" 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
ACM Press, USA, 371–376, 2001.
‫منابع‬
[۶۴] Phoha V V "The Springer Internet Security Dictionary", Springer Verlag, 2002
[۶۵] Denning D E, An Intrusion Detection Model", IEEE Transactions of Software Engineering, 13(2), 222–232,
1987.
[۶۶] Fawcett T and Provost F "Activity Monitoring: Noticing Interesting Changes in Behavior" 5th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 53–62, 1999.
[۶۷] Albrecht S, Busch J, Kloppenburg M, Metze F and Tavan P, Generalized Radial Basis Function Networks
for Classification and Novelty Detection: Self-Organization of Optional Bayesian Decision", Neural Networks,
13(10), 1075–1093, 2000.
[۶۸] Emamian V, Kaveh M and Tewfik A "Robust Clustering of Acoustic Emission Signals Using the Kohonen
Network" IEEE International Conference of Acoustics, Speech and Signal Processing IEEE Computer Society,
IEEE, 6, 3891-3894, Turkey, 2000.
[۶۹] Crook P and Hayes G "A Robot Implementation of a Biologically Inspired Method for Novelty Detection"
Towards Intelligent Mobile Robots Conference, Division of Informatics, UK, 2001.
[۷۰] Crook PA, Marsland S, Hayes G and Nehmzow "A Tale of Two Filters On-Line Novelty Detection"
International Conference on Robotics and Automation, 3894–3899, 2002.
[۷۱] Marsland S, Nehmzow U and Shapiro J "A Model of Habituation Applied to Mobile Robots" Towards
Intelligent Mobile Robots (TIMR), Bristol, 1999.
[۷۲] Marsland S, Nehmzow U and Shapiro J "Novelty Detection for Robot Neotaxis" 2nd International
Symposium on Neural Compuatation, 554 – 559, 2000.
[۷۳] Marsland S, Nehmzow U and Shapiro J "A Real-Time Novelty Detector for a Mobile Robot, EUREL
Conference on Advanced Robotics Systems, The Computing Research Repository (CoRR), 2000.
‫منابع‬
[۷۴] Sun J, Qu H, Chakrabarti D and Faloutsos "Neighborhood Formation and Anomaly Detection in Bipartite
Graphs", 5th IEEE International Conference on Data Mining, IEEE Computer Society, Washington, DC, USA,
418–425, 2005.
[۷۵] Ide T and Kashima H "Eigenspace-Based Anomaly Detection in Computer Systems" 10th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, ACM Press, USA, 440–449, 2004.
[۷۶] MacDonald J W and Ghosh D "Copa–Cancer Outlier Profile Analysis", Bioinformatics, 22(23), 2950–2951,
2007.
[۷۷] Tibshirani R and Hastie T "Outlier Sums for Differential Gene Rxpression Analysis", Biostatistics, 8(1), 2–
8, 2007.
[۷۸] Lu C T, Chen D and Kou Y "Algorithms for Spatial Outlier Detection" 3rd International Conference on
Data Mining, 597–600, 2003.
[۷۹] Lin S and Brown D E "An Outlier-Based Data Association Method for Linking Criminal Incidents" 3rd
SIAM Data Mining Conference, 2003.
[۸۰] Dutta H, Giannella C, Borne K and Kargupta H "Distributed Top-K Outlier Detection in Astronomy
Catalogs Using the Demac System" 7th SIAM International Conference on Data Mining, 2007.
[۸۱] Kou Y, Lu C T and Chen, D "Spatial Weighted Outlier Detection", SIAM Conference on Data Mining, 2006.
[۸۲] Forrest S, Warrender C and Pearlmutter B "Detecting Intrusions Using System Calls: Alternate Data
Models", IEEE ISRSP, IEEE Computer Society, USA, 133–145, 1999.
[۸۳] Sun P, Chawla S and Arunasalam B "Mining for Outliers in Sequential Databases" SIAM International
Conference on Data Mining, 2006.
‫منابع‬
[۸۴] Noble C C and Cook D J "Graph-Based Anomaly Detection" 9th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, ACM Press, 631–636, 2003.
[۸۵] Kumar V "Parallel and Distributed Computing for Cybersecurity", Online Distributed Systems, IEEE, 6(10),
2005.
[۸۶] Spence C, Parra L and Sajda P "Detection, Synthesis and Compression in Mammo Graphic Image Analysis
With a Hierarchical Image Probability Model" IEEE Workshop on Mathematical Methods in Biomedical Image
Analysis. IEEE Computer Society, USA, 3, 2001.
[۸۷] Fujimaki R, Yairi T and Machida K "An Approach to Spacecraft Anomaly Detection Problem Using Kernel
Feature Space" 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, ACM
Press, USA, 401–410, 2005.
[۸۸] Edgeworth F Y "On Discordant Observations", Philosophical Magazine, 23(5), 364–375, 1887.
[۸۹] Abdulsahib A Kh "Anomaly Detection In Text Data That Represented As A Graph Using DBSCAN
Algorithm", Journal Of Theoretical And Applied Information Technology, 95(9), 2017.
[۹۰]Carvalho L, Teixeira C, Dias E, Meira W and Carvalho O "A Simple And Effective Method For Anomaly
Detection In Health Care" SDM DMMH Workshop, 2015.
[۹۱] Nian Ke, Zhang H, Tayal A, Coleman Th And Li Y "Auto Insurance Fraud Detection Using Unsupervised
Specrtal Ranking For Anomaly", The Journal Of Finance And Data Science, 58-75, 2016.
[۹۲]Kroll B, Schaffranek D, Schriegel S And Niggemann O "System Modelling Based On Machine Learning
For Anomaly Detection And Predective Maintenance In Industrial Plants", IEEE Emerging Technology And
Factory Automation (ETFA), 2014.
‫منابع‬
[۹۳] Gosh A, Qin Sh, Lee J And Wang G "PLAT: An Automated Fault And Behavioral Anomaly Detection Tool
For PLC Controlled Manufacturing Systems", Computational Intelligence And Neuroscience, Hidwai Publishing
Corporation, 2016.
[۹۴] Boyd D M and Ellison N B "Social Network Sites: Definition, History, and Scholarship", Journal of
Computer Mediated Communication, 13(1), 210-230, 2008.
[۹۵] Sundén J Material Virtualities: Approaching Online Textual Embodiment, Peter Lang Publishing, 2003.
[۹۶] Tang L "Online Friendship", Encyclopedia of Cyber Behavior, 412-421, 2012.
[۹۷] www.aic.gov.au/en/publications/current%20series/rpp/100-120/rpp103.aspx, Choo K R, 2 January 2017,
18:30.
[۹۸] www.socialmediatoday.com/pamdyer/564409/6-types-social-media-users, Rozen D, Askalani M And Senn
T, 2 January 2017, 19:30..
[۹۹] Kumar R, Novak J and Tomkins, A Structure and Evolution of Online Social Networks In Link Mining:
Models, Algorithms, and Applications, Springer,337-357 (1 Chapter of Book), 2010.
[۱۰۰] Thelwall M "Social Networks, Gender, and Friending: An Analysis of MySpace Member Profiles", Journal
of the American Society for Information Science and Technology, 59(8), 1321-1330, 2008.
[۱۰۱] Gupta A, Sycara K P, Gordon G J and Hefn, A "Exploring Friend's Influence in Cultures in Twitter",
Advances in Social Networks Analysis and Mining (ASONAM) IEEE ACM International Conference, 584-591,
USA, 2013.
[۱۰۲] Akoglu L, McGlohon M and Faloutsos C "OddBall: Spotting Anomalies in Weighted Graphs" 14th
Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer, 410-421, Berlin,
2010.
‫منابع‬
[۱۰۴] Gjoka M, Kurant M, Butts C T and Markopoulou A "Walking in Facebook: A Case Study of Unbiased
Sampling of OSNs", INFOCOM, IEEE, 1-9, 2010.
[۱۰۵] Gross R and Acquisti A "Information Revelation and Privacy in Online Social Networks" ACM Workshop on
Privacy in the Electronic Society, 71-80, USA, 2005.
[۱۰۶] Hodge M.J "The Fourth Amendment and Privacy Issues on the New Internet: Facebook.com and
Myspace.com", ULJ, 31(2006), 95-123, 2006.
[۱۰۷] Ugander J, Karrer B, Backstrom L and Marlow C "The Anatomy of the Facebook Social Graph", The
Computing Research Repository (CoRR), 2011.
[۱۰۸] ] Newman M E, Watts D J and Strogatz S.H "Random Graph Models of Social Networks", National
Academy of Sciences of the United States of America, 99(1), 2566-2572. 2002.
[۱۰۹] Chakrabarti D, Faloutsos C and McGlohon M Managing and Mining Graph Data, 69-123 (1 Chapter),
Springer, US, 2010.
[۱۱۰] Guzman jh and Poblete B "On-line Relevant Anomaly Detection in the Twitter Stream: An Efficient Bursty
Keyword Detection Model" ACM SIGKDD Workshop on Outlier Detection and Description, USA, 31-39, 2013.
[۱۱۱] Kaur R and Singh S "A Survey of Data Mining and Social Network Analysis Based Anomaly Detection
Techniques", Egyptian Informatics Journal, 17, 199–216, 2016.
[۱۱۲] Rawat A, Gugnani G, Shastri M and Kumar P "Anomaly Recognition in Online Social Networks",
International Journal of Security and Its Applications, 9(7), 109-118, 2015.
[۱۱۳] Viswanath B, Bashir A B, Crovella M and Guha S "Towards Detecting Anomalous User Behavior in Online
Social Networks" 23rd USENIX Security Symposium, USA, 2014.
‫منابع‬
[۱۱۴] Egele M, Stringhini G, Kruegel Ch and Vigna G "COMPA : Detecting Compromised Accounts on Social
Networks" 20th Annual Network & Distributed System Security Symposium, USA,2013.
[۱۱۵] Altshuler Y, Fire M, Shmueli E, Elovici E, Bruckstein A, Pentland A and Lazer D "Detecting Anomalous
Behaviors Using Structural Properties of Social Networks", 6th International Conference, 433-440, USA, 2013.
[۱۱۶] Charrad M, Ghazzali N, Boiteau V and Niknafs A "Package NbClust V3.0", The Comprehensive R Archive
Network, 2015.
[۱۱۷] Breunig, M, Kriegel H And Sander J "LOF: Identifying Density-based Local Outliers" ACM SIGMOD
International Conference on Management of Data, 93–104, 2000.
[۱۱۸] Martin E, Hans-Peter K, Jorg S and Xiaowei X "A Density-based Algorithm for Discovering Clusters in
Large Spatial Databases with Noise" Second International Conference on Knowledge Discovery and Data
Mining (KDD-96), 226-231, USA, 1996.
[۱۱۹] David M W "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness And
Correlation", Journal of Machine Learning Technologies, 2(1), 37–63, 2011.
‫سپاس‌از‌همراهی‌شما‬

Weitere ähnliche Inhalte

Was ist angesagt?

Issues, challenges, and solutions
Issues, challenges, and solutionsIssues, challenges, and solutions
Issues, challenges, and solutionscsandit
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get NewsPurdue RCODI
 
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Artificial Intelligence Institute at UofSC
 
Identifying semantics characteristics of user’s interactions datasets through...
Identifying semantics characteristics of user’s interactions datasets through...Identifying semantics characteristics of user’s interactions datasets through...
Identifying semantics characteristics of user’s interactions datasets through...Fernando de Assis Rodrigues
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.docbutest
 
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...Anastasija Nikiforova
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESSIJDKP
 
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...IJMTST Journal
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesEditor IJMTER
 
The Challenge of Deeper Knowledge Graphs for Science
The Challenge of Deeper Knowledge Graphs for ScienceThe Challenge of Deeper Knowledge Graphs for Science
The Challenge of Deeper Knowledge Graphs for SciencePaul Groth
 

Was ist angesagt? (14)

Issues, challenges, and solutions
Issues, challenges, and solutionsIssues, challenges, and solutions
Issues, challenges, and solutions
 
Data Mining
Data MiningData Mining
Data Mining
 
FACT - A New Way to Get News
FACT - A New Way to Get NewsFACT - A New Way to Get News
FACT - A New Way to Get News
 
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
Knowledge-empowered Probabilistic Graphical Models for Physical-Cyber-Social ...
 
Identifying semantics characteristics of user’s interactions datasets through...
Identifying semantics characteristics of user’s interactions datasets through...Identifying semantics characteristics of user’s interactions datasets through...
Identifying semantics characteristics of user’s interactions datasets through...
 
Hy3414631468
Hy3414631468Hy3414631468
Hy3414631468
 
DATA MINING.doc
DATA MINING.docDATA MINING.doc
DATA MINING.doc
 
nm
nmnm
nm
 
Data mining
Data miningData mining
Data mining
 
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
Stakeholder-centred Identification of Data Quality Issues: Knowledge that Can...
 
LINK MINING PROCESS
LINK MINING PROCESSLINK MINING PROCESS
LINK MINING PROCESS
 
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
A Novel Approach of Data Driven Analytics for Personalized Healthcare through...
 
Cluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for DatabasesCluster Based Access Privilege Management Scheme for Databases
Cluster Based Access Privilege Management Scheme for Databases
 
The Challenge of Deeper Knowledge Graphs for Science
The Challenge of Deeper Knowledge Graphs for ScienceThe Challenge of Deeper Knowledge Graphs for Science
The Challenge of Deeper Knowledge Graphs for Science
 

Ähnlich wie تحلیل شبکه‌های اجتماعی چرا و چگونه

Building Effective Visualization Shiny WVF
Building Effective Visualization Shiny WVFBuilding Effective Visualization Shiny WVF
Building Effective Visualization Shiny WVFOlga Scrivner
 
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Lu Xiao
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGCarrie Romero
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachAndry Alamsyah
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)Han Woo PARK
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligenceaciijournal
 
PhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designPhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designdonellemckinley
 
Mapping big data science
Mapping big data scienceMapping big data science
Mapping big data scienceHan Woo PARK
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Sciencejournal ijrtem
 
From Text to Data to the World: The Future of Knowledge Graphs
From Text to Data to the World: The Future of Knowledge GraphsFrom Text to Data to the World: The Future of Knowledge Graphs
From Text to Data to the World: The Future of Knowledge GraphsPaul Groth
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021AIRCC Publishing Corporation
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.docbutest
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data MiningAbcdDcba12
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebNoshir Contractor
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - gerogepatton
 
Positioning and presenting design science research for maximum impact
Positioning and presenting design science research for maximum impactPositioning and presenting design science research for maximum impact
Positioning and presenting design science research for maximum impactNauman Shahid
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...AIRCC Publishing Corporation
 
Big Data and the Art of Data Science
Big Data and the Art of Data ScienceBig Data and the Art of Data Science
Big Data and the Art of Data ScienceAndrew Gardner
 

Ähnlich wie تحلیل شبکه‌های اجتماعی چرا و چگونه (20)

Building Effective Visualization Shiny WVF
Building Effective Visualization Shiny WVFBuilding Effective Visualization Shiny WVF
Building Effective Visualization Shiny WVF
 
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
Supporting Rationale Awareness in Large-Scale Online Open Participative Activ...
 
A LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMININGA LITERATURE REVIEW ON DATAMINING
A LITERATURE REVIEW ON DATAMINING
 
Big Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network ApproachBig Data Analytics : A Social Network Approach
Big Data Analytics : A Social Network Approach
 
Big data divided (24 march2014)
Big data divided (24 march2014)Big data divided (24 march2014)
Big data divided (24 march2014)
 
June 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational IntelligenceJune 2020: Top Read Articles in Advanced Computational Intelligence
June 2020: Top Read Articles in Advanced Computational Intelligence
 
PhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website designPhD proposal: Specialized heuristics for crowdsourcing website design
PhD proposal: Specialized heuristics for crowdsourcing website design
 
HDRIO Presentation - 2018
HDRIO Presentation - 2018HDRIO Presentation - 2018
HDRIO Presentation - 2018
 
Mapping big data science
Mapping big data scienceMapping big data science
Mapping big data science
 
Computational Social Science
Computational Social ScienceComputational Social Science
Computational Social Science
 
From Text to Data to the World: The Future of Knowledge Graphs
From Text to Data to the World: The Future of Knowledge GraphsFrom Text to Data to the World: The Future of Knowledge Graphs
From Text to Data to the World: The Future of Knowledge Graphs
 
Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021Top 10 Download Article in Computer Science & Information Technology: March 2021
Top 10 Download Article in Computer Science & Information Technology: March 2021
 
Ci2004-10.doc
Ci2004-10.docCi2004-10.doc
Ci2004-10.doc
 
Introduction to Data Mining
Introduction to Data MiningIntroduction to Data Mining
Introduction to Data Mining
 
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and WebOpen Grid Forum workshop on Social Networks, Semantic Grids and Web
Open Grid Forum workshop on Social Networks, Semantic Grids and Web
 
Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 - Top 5 most viewed articles from academia in 2019 -
Top 5 most viewed articles from academia in 2019 -
 
Positioning and presenting design science research for maximum impact
Positioning and presenting design science research for maximum impactPositioning and presenting design science research for maximum impact
Positioning and presenting design science research for maximum impact
 
TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...TOP 10 Cited Computer Science & Information Technology Research Articles From...
TOP 10 Cited Computer Science & Information Technology Research Articles From...
 
Big Data and the Art of Data Science
Big Data and the Art of Data ScienceBig Data and the Art of Data Science
Big Data and the Art of Data Science
 
Digital Methods by Richard Rogers
Digital Methods by Richard RogersDigital Methods by Richard Rogers
Digital Methods by Richard Rogers
 

Kürzlich hochgeladen

Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Valters Lauzums
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...amitlee9823
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxolyaivanovalion
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...amitlee9823
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz1
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxolyaivanovalion
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxolyaivanovalion
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023ymrp368
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusTimothy Spann
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfRachmat Ramadhan H
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...amitlee9823
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% SecurePooja Nehwal
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...SUHANI PANDEY
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxJohnnyPlasten
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxolyaivanovalion
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Delhi Call girls
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...shambhavirathore45
 

Kürzlich hochgeladen (20)

Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
Call Girls Bannerghatta Road Just Call 👗 7737669865 👗 Top Class Call Girl Ser...
 
Carero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptxCarero dropshipping via API with DroFx.pptx
Carero dropshipping via API with DroFx.pptx
 
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
BigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptxBigBuy dropshipping via API with DroFx.pptx
BigBuy dropshipping via API with DroFx.pptx
 
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts ServiceCall Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
Call Girls In Shalimar Bagh ( Delhi) 9953330565 Escorts Service
 
Edukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFxEdukaciniai dropshipping via API with DroFx
Edukaciniai dropshipping via API with DroFx
 
Data-Analysis for Chicago Crime Data 2023
Data-Analysis for Chicago Crime Data  2023Data-Analysis for Chicago Crime Data  2023
Data-Analysis for Chicago Crime Data 2023
 
Generative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and MilvusGenerative AI on Enterprise Cloud with NiFi and Milvus
Generative AI on Enterprise Cloud with NiFi and Milvus
 
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdfMarket Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
Market Analysis in the 5 Largest Economic Countries in Southeast Asia.pdf
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% SecureCall me @ 9892124323  Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
Call me @ 9892124323 Cheap Rate Call Girls in Vashi with Real Photo 100% Secure
 
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
VIP Model Call Girls Hinjewadi ( Pune ) Call ON 8005736733 Starting From 5K t...
 
Log Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptxLog Analysis using OSSEC sasoasasasas.pptx
Log Analysis using OSSEC sasoasasasas.pptx
 
CebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptxCebaBaby dropshipping via API with DroFX.pptx
CebaBaby dropshipping via API with DroFX.pptx
 
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
Call Girls in Sarai Kale Khan Delhi 💯 Call Us 🔝9205541914 🔝( Delhi) Escorts S...
 
Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...Determinants of health, dimensions of health, positive health and spectrum of...
Determinants of health, dimensions of health, positive health and spectrum of...
 

تحلیل شبکه‌های اجتماعی چرا و چگونه

  • 1. ‫خرد‬ ‫و‬ ‫جان‬ ‫خداوند‬ ‫نام‬ ‫به‬
  • 2. ‫چگونه‬ ‫و‬ ‫چرا‬ ،‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬‫چگونه‬ ‫و‬ ‫چرا‬ ،‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ :‫دهنده‬ ‫ارائه‬ ‫حصارکی‬ ‫الهام‬ . .Elham hesaraki@gmail com ‫آپ‬ ‫اسکیل‬ ‫رویداد‬ ‫دومین‬ ‫در‬ ‫شده‬ ‫ارائه‬
  • 3. ‫ارائه‬ ‫محتوای‬ ‫ها‬‫پرسش‬ ‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ ‫چرایی‬ ‫موردی‬ ‫بررسی‬ ‫تحلیل‬ ‫چگونگی‬
  • 4. ● ‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تعریف‬ •‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ ‫چرایی‬ •‫برخط‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحلیل‬ ‫چگونگی‬ •‫موردی‬ ‫بررسی‬ ‫‌ها‬‫ش‬‫پرس‬
  • 5. ‫چرایی‌تحلیل‬ •‫بازاریابی‬ •‫مشتریان‬ ‫با‬ ‫روابط‬ ‫مدیریت‬ •‫مشتریان‬ ‫علیق‬ ‫و‬ ‫بازار‬ ‫شناسایی‬ •‫ها‬‫انتخابات‬ ‫در‬ ‫ویژه‬ ‫به‬ ‫نتایج‬ ‫بینی‬‫پیش‬ •‫نوظهور‬ ‫موضوعات‬ ‫کشف‬ •‫موضوعی‬ ‫روندهای‬ ‫کشف‬
  • 6. ‫چرایی‌تحلیل‬ •‫تشنج‬ ‫ایجاد‬ ‫به‬ ‫که‬ ‫مجازی‬ ‫های‬‫شبکه‬ ‫در‬ ‫یافته‬ ‫سازمان‬ ‫های‬‫گروهک‬ ‫شناسایی‬ ‫پردازند‬‫می‬ ‫واقعی‬ ‫و‬ ‫مجازی‬ ‫جوامع‬ ‫در‬ •‫اجتماعی‬ ‫مشکلت‬ ‫کشف‬ ‫جهت‬ ‫اجتماعی‬ ‫های‬‫شبکه‬ ‫در‬ ‫ناهنجاری‬ ‫تشخیص‬ ‫واقعی‬ ‫جوامع‬ ‫در‬ ‫روانی‬ ‫و‬ •‫ساختاری‬ ‫و‬ ‫رفتاری‬ ‫های‬‫ویژگی‬ ‫ترکیب‬ ‫با‬ ‫کاربر‬ ‫رفتار‬ ‫در‬ ‫نویی‬ ‫تشخیص‬ ‫شده‬ ‫هک‬ ‫کاربری‬ ‫های‬‫حساب‬ ‫کشف‬ ‫جهت‬
  • 7. •‫ها‬‫سازمان‬ ‫یا‬ ‫افراد‬ ‫از‬ ‫متشکل‬ ‫ساختاری‬ •‫شبکه‬ ‫درون‬ ‫بازیگران‬ :‫ها‬‫گره‬ •‫ای‬‫گره‬ ‫میان‬ ‫روابط‬ •‫شبکه‬ ‫در‬ ‫روابط‬ ‫گوناگون‬ ‫انواع‬ ‫وجود‬ ‫‌های‌اجتماعی‬‫ه‬‫شبک‬
  • 8. •‫وب‬۲.۰‫اجتماعی‬ ‫های‬‫شبکه‬ ‫تحول‬ ‫و‬ •‫ها‬‫آن‬ ‫میان‬ ‫روابط‬ ‫و‬ ‫کاربران‬ ‫از‬ ‫متشکل‬ ‫ساختاری‬ ‫‌های‌اجتماعی‌برخط‬‫ه‬‫شبک‬
  • 9. •(‫)تلگرام‬ ‫آنی‬ ‫رسان‬ ‫پیام‬ ‫خدمات‬ •(‫)توییتر‬ ‫میکروبلگینگ‬ ‫خدمات‬ •(‫)یوتیوب‬ ‫ویدئو‬ ‫گذاری‬‫اشتراک‬ ‫به‬ ‫خدمات‬ •(‫)اینستاگرام‬ ‫تصاویر‬ ‫یا‬ ‫کوتاه‬ ‫زمان‬ ‫ویدئوی‬ ‫گذاری‬‫اشتراک‬ ‫به‬ ‫خدمات‬ •(‫بوک‬‫)فیس‬ ‫ترکیبی‬ ‫خدمات‬ ‫‌های‌اجتماعی‌برخط‬‫ه‬‫انواع‌شبک‬
  • 10. •:‫شامل‬ ‫یکتا‬ ‫ای‬‫صفحه‬ ‫کاربری‬‫اسم/نام‬ ‫سن‬ ‫جغرافیایی‬ ‫موقعیت‬ ‫محتوا‬ ‫گذاری‬‫اشتراک‬ ‫زمانی‬ ‫پنجره‬ ‫شوندگان‬ ‫کنندگان/دنبال‬ ‫دنبال‬ (‫دهی‬‫پاسخ‬ ،‫پسندیدن‬ ،‫)بازنشر‬ ‫واکنشی‬ ‫های‬‫قابلیت‬ ‫نمایه‌کاربری‬
  • 11. •‫مشترک‬ ‫های‬‫ویژگی‬ •‫خاص‬ ‫های‬‫ویژگی‬ ‫‌های‌شبکه‬‫ی‬‫ویژگ‬ ‫کاراکتر‬ ‫محدودیت‬ ‫محتوا‬ ‫نوع‬ ‫محدودیت‬ ‫واقعی‬ ‫زمان‬ ‫واقعی/غیر‬ ‫زمان‬
  • 12. •‫افراد‬ ‫میان‬ ‫های‬‫جریان‬ ‫و‬ ‫روابط‬ ‫سنجش‬ ‫و‬ ‫نگاشت‬ •‫داده‬ ‫انبوه‬ ‫حجم‬ ‫از‬ ‫خرد‬ ‫و‬ ‫دانش‬ ‫کشف‬ •!‫داده‬ ‫کلن‬ ‫مساله‬ ‫یک‬ ‫‌های‌اجتماعی‌برخط‬‫ه‬‫تحلیل‌شبک‬
  • 13. •‫شبکه‬ ‫تحلیل‬ ‫انواع‬ •‫تحلیل‬ ‫های‬‫سنجه‬ ‫انواع‌تحلیل‌شبکه‬ .‫خیالی‬ ‫اجتماعی‬ ‫شبکه‬ ‫یک‬ ‫در‬ ‫کاربر‬ ‫اگو‬ ‫شبکه‬ ‫اگو‬ ‫شبکه‬ ‫شبکه‬ ‫سراسری‬ ‫تحلیل‬
  • 14. •(‫هوموفیلی‬ ،‫تعدی‬ ،‫بسته‬ ‫شبکه‬ ،‫متقابل‬ ‫رابطه‬ ،‫تعدی‬ ،‫)قرابت‬ ‫ارتباطات‬ •(‫ساختاری‬ ‫چاله‬ ،‫شبکه‬ ‫چگالی‬ ،‫مرکزیت‬ ،‫)پل‬ ‫توزیع‬ •(‫انسجام‬ ‫ضریب‬ ،‫ستاره‬ ،‫)گروهک‬ ‫بندی‬‫بخش‬ •!‫جدایی‬ ‫درجه‬ ‫شش‬ ‫مفهوم‬ ‫‌ها‬‫ه‬‫انواع‌سنج‬
  • 15. •‫ها‬‫داده‬ ‫انواع‬ ‫ناهنجار‬ ‫های‬‫توپولوژی‬ ‫انواع‬ ‫ساختاری‬ ‫رفتاری‬ ‫ناهنجار‬ ‫های‬‫توپولوژی‬ ‫انواع‌داده‬
  • 17. ‫بررسی‌موردی‬ •‫رفتاری‬ ‫های‬‫داده‬ •‫ساختاری‬ ‫های‬‫داده‬ :‫شده‬ ‫محاسبه‬ ‫مناسب‬ ‫خوشه‬ ‫تعداد‬۳ ‫خوشه‬ ‫هر‬ ‫اعضای‬ ‫تعداد‬۴،۱‫و‬۱۹۰ :‫وینزور‬ ‫میانگین‬ ‫مقدار‬۳۹/۸ :‫شده‬ ‫محاسبه‬ ‫مناسب‬ ‫خوشه‬ ‫تعداد‬۳ ‫خوشه‬ ‫هر‬ ‫اعضای‬ ‫تعداد‬۷۳،۵۰‫و‬۷۲ :‫وینزور‬ ‫میانگین‬ ‫مقدار‬۶۵/۴
  • 18. ‫منابع‬ [۱] Chandola V, Banerjee A and Kumar V "Anomaly Detection: A Survey", ACM Computer Survey, 41(3), Article 15, 1-58, 2009. [۲] Hodge V and Austin J "A Survey of Outlier Detection Methodologies", Artificial Intelligence Review, 22(2), 85–126, 2004. [۳] Hassanzadeh R Anomaly Detection in Online Social Networks: Using Data Mining Techniques and Fuzzy Logic, School of Electrical Engineering and Computer Science, Queensland University of Technology, 2014. [۴] Shearer C "The CRISP-DM model: The New Blueprint for Data Mining", Journal of Data Warehousing, 5, 13-22, 2000. [۵] Tran D, Ma W and Sharma D "Network Anomaly Detection Using Fuzzy Gaussian Mixture Models", International Journal of Future Generation Communication and Networking, 1(1), 37-42, 2006. [۶] Kaur H and Gill N "Host Based Anomaly Detection Using Fuzzy Genetic Approach (FGA)", International Journal of Computer Applications, 74(20), 2013. ]۷[‫در‬ ‫ناهنجاری‬ ‫تشخیص‬ ‫برای‬ ‫مصنوعی‬ ‫زنبورهای‬ ‫کلونی‬ ‫و‬ ‫منفی‬ ‫انتخاب‬ ‫های‬‫الگوریتم‬ ‫بر‬ ‫مبتنی‬ ‫ترکیبی‬ ‫رویکردی‬ ‫م‬ ‫آبادی‬ ‫و‬ ‫ف‬ ‫بارانی‬" ‫متحرک‬ ‫اقتضایی‬ ‫های‬‫شبکه‬"‫ایران‬ ‫رمز‬ ‫انجمن‬ ‫المللی‬‫بین‬ ‫کنفرانس‬‫شهریور‬ ،‫مشهد‬ ‫فردوسی‬ ‫دانشگاه‬ ،۱۳۹۰. ]۸[، ‫فازی‬ ‫گیری‬‫رای‬ ‫روش‬ ‫با‬ ‫خوشه‬ ‫بر‬ ‫مبتنی‬ ‫اقتضایی‬ ‫های‬‫شبکه‬ ‫در‬ ‫ناهنجاری‬ ‫تشخیص‬ ‫س‬ ‫جلیلی‬ ‫و‬ ‫م‬ ‫منش‬ ‫رحمانی‬" "‫برق‬ ‫مهندسی‬ ‫نشریه‬ ‫ایران‬ ‫کامپیوتر‬ ‫مهندسی‬ ‫و‬) ،۲(۱۰‫زمستان‬ ،۱۳۹۱. [9] Izakian H and Pedrycz W "Anomaly Detection in Time Series Data using a Fuzzy C-Means Clustering" Fifth International Symposium on Computational Intelligence and Design (ISCID), IEEE, 1513-1518, China, 2013. [10] [10] Rabatel J, Bringay S and Poncelet P "Fuzzy Anomaly Detection in Monitoring Sensor Data" 18th IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, 1-8, Spain, 2011.
  • 19. ‫منابع‬ [۱۱] Gómez J, González F and Dasgupta D "An Immuno-Fuzzy Approach to Anomaly Detection" The 12th IEEE International Conference on Fuzzy Systems, 2, 1219-1224, USA, 2003. [۱۲] Parvath Devi K and Siva Prasad YA "Study of Anomaly Identification Techniques in Large scale systems", International Journal of Computer Trends and Technology, 3(1), 11-17, 2012. [۱۳] Doostari M A, Zeinali R, Lashkari H and Ajamzamani M "Anomaly Detection in Cliques of Online Social Networks Using Fuzzy Node-Fuzzy Graph",Journal of Basic and Applied Scientific Research, 3(8), 614-626, 2013. [۱۴] Shamshirband Sh, Anuar N B, Mat Kiah L and Misra S "Anomaly Detection using Fuzzy Q-learning Algorithm", Acta Polytechnica Hungarica, 11(8), 5-28, 2014. [۱۵] Jabez J and Muthukumar B "Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection Approach", Procedia Computer Science, sciencedirect, 48, 338-346, 2015. [۱۶] Savage D, Zhang X, Yu X, Choua P b, Wang Q "Anomaly Detection in Online Social Networks", Social Networks, sciencedirect, 39, 62-70, 2014. [۱۷] www.systems-thinking.org/dikw/dikw.htm, Bellinger G, Castro D and Mills A, 2 January 2017, 23:00. [۱۸] Mouthann N Effects of Big Data Analytic on Organization's Value Creation, Faculty of science and faculty of economics and business, University of Amsterdam, 2012. [۱۹] www.computable.nl/artikel/opinie/business-intelligence/4485335/1509029/big-data-wat-was-de-vraag.html, Ras P, 2 January 2017, 23:30. [۲۰] www.sync.nl/de-opvolger-van-de-cloud-big-data, Leeuwen R V, 2 January 2017, 23:30.
  • 20. ‫منابع‬ [۲۱] Han J and Kamber M and Cerra D Data Mining: Concepts and Techniques, Morgan Kaufmann,Waltham, USA, 2012. [۲۲] Kantardzic M Data Mining: Concepts, Models, Methods and Algorithms, Second Edition, John Wiley & Sons, Hoboken, USA, 2011. [۲۳] Tamilselvi R and Kalaiselvi S "An Overview of Data Mining Techniques and Applications", International Journal of Science and Research (IJSR), 2(2), 506-509, 2013. [۲۴] www.thearling.com/text/dmwhite/dmwhite.htm, Gartner Group High Performance Computing Research, 2 January 2017, 16:30. [۲۵] Tan p, Steincach M and Kumar V Introduction to Data Mining, Addison Wesley, 2005. [۲۶] Oracle BI Group Oracle Data Mining Concepts, Release 1, Oracle, 2008. [۲۷] Gibert K, Sànchez-Marrè M and Codina V "Choosing the Right Data Mining Technique: Classification of Methods and Intelligent Recommendation" International Congress on Environmental Modelling and Software Modelling for Environment’s Sake, International Environmental Modelling and Software Society (iEMSs), Canada, 2010. [۲۸] Cheeseman P and Oldford R W Selecting models from data, Springer, 1994. [۲۹] www.data-mining.philippefournierviger.com/whatarethestepstoimplementadataminingalgorithm, Fournier Viger Ph, 2 January 2017, 20:30. [۳۰] www.msdn.microsoft.com/en-us/library/ms175595.aspx, Anon, 2 January 2017, 21:00. [۳۱] Witten I.H, Frank E and Hall M.A Data Mining: Practical Machine Learning Tools and Techniques, 3rd Edtion, Morgan Kaufmann,Waltham, USA, 2011.
  • 21. ‫منابع‬ [۳۲] Chikohora T T "A Study of the Factors Considered when Choosing an Appropriate Data Mining Algorithm", International Journal of Soft Computing and Engineering (IJSCE), 4(3), 42-45, July 2014. [۳۳] www.ibm.com/developerworks/ru/library/ba-data-mining-techniques, Brown M, 2 January 2017, 21:30. [۳۴] www.iaonline.theiia.org/data-mining-101-tools-and-techniques, Silltow J, 2 January 2017, 21:45. [۳۵] Chung M.H and Gray P "Special Section Data mining", Journal of Management Information Systems, 16(1), 1999. [۳۶] Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C and Wirth R CRISP-DM 1.0, SPSS, 2000. [۳۷] Marsala Ch And Bounchon-Meunier B "Fuzzy Data Mining and Management of Interpretable and Subjective Information", Elsevier Fuzzy Sets and Systems Journal, 281, 252–259, December 2015. [۳۸] Casillas J, Cordón O, Herrera F and Magdalena L "Interpretability Improvements to Find the Balance Interpretability Accuracy in Fuzzy Modeling: An Overview, Interpretability Issues in Fuzzy Modeling", Springer, Berlin Heidelberg, 128, 3–22, 2003. [۳۹] Elouedi Z, Mellouli K and Smets P "Belief decision trees: Theoretical Foundations", International Journal of Approximate Reasoning, 28, 91–124, 2001. [۴۰] Bujnowski P, Szmidt E and Kacprzyk J "Intuitionistic Fuzzy Decision Trees: A New Approach" 13th International Conference on Artificial Intelligence and Soft Computing (ICAISC), Vol 8467 of Lecture Notes in Computer Science, Springer, 181–192, 2014. [۴۱] www.lrs.ed.uiuc.edu/TSE-portal/analysis/social-network-analysis, Gretzel U, 2 January 2017, 18:00. [۴۲] Hogan B, Carrasco J A and Wellman B "Visualizing Personal Networks: Working with Participant-aided Sociograms", Field Methods, Sage Publications, 19(2), 116-144, May 2007.
  • 22. ‫منابع‬ [۴۳] Freeman L The Development of Social Network Analysis, Empirical Press, Vancouver, 2006. [۴۴] Otte E and Rousseau R "Social Network Analysis: a powerful strategy, also for the information sciences", Journal of Information Science, 28(6), 441-453, 2002. [۴۵] McPherson N, Smith-Lovin L and Cook J.M "Birds of a Feather: Homophily in Social Networks", Annual Review of Sociology, 27, 415–444, 2001. [۴۶] Podolny, J M and Baron J N "Resources and Relationships: Social Networks and Mobility in the Workplace", American Sociological Review, 62(5), 673-693, 1997. [۴۷] Flynn, F J, Reagans R E and Guillory L "Do You Two Know Each Other? Transitivity, Homophily and the Need for (Network) Closure", Journal of Personality, 99(5), November 2010. [۴۸] Maksim T and Alexander K Social Network Analysis for Startups: Finding Connections on the Social Web, O'Reilly, 2011. [۴۹] Guandong X, Xu Yu J and Lee W Web Mining and Social Networking: Techniques and Applications, Springer, 2012. [۵۰] www.intersci.ss.uci.edu/wiki/index.php/Cohesive_blocking, 2 January 2017, 23:30. [۵۱] Hanneman R.A and Mark R "Concepts and Measures for Basic Network Analysis", The Sage Handbook of Social Network Analysis, Sage, 346–347, 2005. [۵۲] Pattillo J, Youssef N and Butenko S "On Clique Relaxation Models in Social Network Analysis", European Journal of Operational Research, 226, 9-18, 20, 2013. [۵۳] Kurka D.B, Godoy A and Von Zuben F.J "Online Social Network Analysis: A Survey of Research Applications in Computer Science", The Computing Research Repository (CoRR), 2016.
  • 23. ‫منابع‬ [۵۴] Teng H, Chen K and Lu S " Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns", IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer Society Press, 278–284, 1990. [۵۵] Rousseeuw P J and Leroy A M Robust Regression and Outlier Detection, John Wiley & Sons, USA, 1987. [۵۶] Markou M and Singh S "Novelty Detection: A Review-part 1: Statistical Approaches", Signal Processing, Elsevier, 83(12), 2481–2497, 2003. [۵۷] Markou M and Singh S "Novelty Detection: A Review-Part 2: Neural Network Based Approaches", Signal Processing, Elsevier, 83(12), 2499–2521, 2003. [۵۸] Saunders R and Gero J "The Importance of Being Emergent" Conference of Artificial Intelligence in Design, 2000. [۵۹] Song X, Wu M, Jermaine C and Ranka S "Conditional Anomaly Detection", IEEE Transactions on Knowledge and Data Engineering, 19(5), 631–645, 2007. [۶۰] Weigend, A S, Mangeas M and Srivastava A.N "Nonlinear Gated Experts for Time-Series, Discovering Regimes and Avoiding Overfitting", International Journal of Neural Systems, 6(4), 373–399, 1995. [۶۱] Salvador S and Chan P "Learning States and Rules for Time-Series Anomaly Detection", Tech Rep in Department of Computer Science, Florida Institute of Technology, Melbourne, 2003. [۶۳] Shekhar S, Lu C T and Zhang P "Detecting Graph-Based Spatial Outliers: Algorithms and Applications (A Summary of Results)" 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, USA, 371–376, 2001.
  • 24. ‫منابع‬ [۶۴] Phoha V V "The Springer Internet Security Dictionary", Springer Verlag, 2002 [۶۵] Denning D E, An Intrusion Detection Model", IEEE Transactions of Software Engineering, 13(2), 222–232, 1987. [۶۶] Fawcett T and Provost F "Activity Monitoring: Noticing Interesting Changes in Behavior" 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 53–62, 1999. [۶۷] Albrecht S, Busch J, Kloppenburg M, Metze F and Tavan P, Generalized Radial Basis Function Networks for Classification and Novelty Detection: Self-Organization of Optional Bayesian Decision", Neural Networks, 13(10), 1075–1093, 2000. [۶۸] Emamian V, Kaveh M and Tewfik A "Robust Clustering of Acoustic Emission Signals Using the Kohonen Network" IEEE International Conference of Acoustics, Speech and Signal Processing IEEE Computer Society, IEEE, 6, 3891-3894, Turkey, 2000. [۶۹] Crook P and Hayes G "A Robot Implementation of a Biologically Inspired Method for Novelty Detection" Towards Intelligent Mobile Robots Conference, Division of Informatics, UK, 2001. [۷۰] Crook PA, Marsland S, Hayes G and Nehmzow "A Tale of Two Filters On-Line Novelty Detection" International Conference on Robotics and Automation, 3894–3899, 2002. [۷۱] Marsland S, Nehmzow U and Shapiro J "A Model of Habituation Applied to Mobile Robots" Towards Intelligent Mobile Robots (TIMR), Bristol, 1999. [۷۲] Marsland S, Nehmzow U and Shapiro J "Novelty Detection for Robot Neotaxis" 2nd International Symposium on Neural Compuatation, 554 – 559, 2000. [۷۳] Marsland S, Nehmzow U and Shapiro J "A Real-Time Novelty Detector for a Mobile Robot, EUREL Conference on Advanced Robotics Systems, The Computing Research Repository (CoRR), 2000.
  • 25. ‫منابع‬ [۷۴] Sun J, Qu H, Chakrabarti D and Faloutsos "Neighborhood Formation and Anomaly Detection in Bipartite Graphs", 5th IEEE International Conference on Data Mining, IEEE Computer Society, Washington, DC, USA, 418–425, 2005. [۷۵] Ide T and Kashima H "Eigenspace-Based Anomaly Detection in Computer Systems" 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, USA, 440–449, 2004. [۷۶] MacDonald J W and Ghosh D "Copa–Cancer Outlier Profile Analysis", Bioinformatics, 22(23), 2950–2951, 2007. [۷۷] Tibshirani R and Hastie T "Outlier Sums for Differential Gene Rxpression Analysis", Biostatistics, 8(1), 2– 8, 2007. [۷۸] Lu C T, Chen D and Kou Y "Algorithms for Spatial Outlier Detection" 3rd International Conference on Data Mining, 597–600, 2003. [۷۹] Lin S and Brown D E "An Outlier-Based Data Association Method for Linking Criminal Incidents" 3rd SIAM Data Mining Conference, 2003. [۸۰] Dutta H, Giannella C, Borne K and Kargupta H "Distributed Top-K Outlier Detection in Astronomy Catalogs Using the Demac System" 7th SIAM International Conference on Data Mining, 2007. [۸۱] Kou Y, Lu C T and Chen, D "Spatial Weighted Outlier Detection", SIAM Conference on Data Mining, 2006. [۸۲] Forrest S, Warrender C and Pearlmutter B "Detecting Intrusions Using System Calls: Alternate Data Models", IEEE ISRSP, IEEE Computer Society, USA, 133–145, 1999. [۸۳] Sun P, Chawla S and Arunasalam B "Mining for Outliers in Sequential Databases" SIAM International Conference on Data Mining, 2006.
  • 26. ‫منابع‬ [۸۴] Noble C C and Cook D J "Graph-Based Anomaly Detection" 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 631–636, 2003. [۸۵] Kumar V "Parallel and Distributed Computing for Cybersecurity", Online Distributed Systems, IEEE, 6(10), 2005. [۸۶] Spence C, Parra L and Sajda P "Detection, Synthesis and Compression in Mammo Graphic Image Analysis With a Hierarchical Image Probability Model" IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. IEEE Computer Society, USA, 3, 2001. [۸۷] Fujimaki R, Yairi T and Machida K "An Approach to Spacecraft Anomaly Detection Problem Using Kernel Feature Space" 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, ACM Press, USA, 401–410, 2005. [۸۸] Edgeworth F Y "On Discordant Observations", Philosophical Magazine, 23(5), 364–375, 1887. [۸۹] Abdulsahib A Kh "Anomaly Detection In Text Data That Represented As A Graph Using DBSCAN Algorithm", Journal Of Theoretical And Applied Information Technology, 95(9), 2017. [۹۰]Carvalho L, Teixeira C, Dias E, Meira W and Carvalho O "A Simple And Effective Method For Anomaly Detection In Health Care" SDM DMMH Workshop, 2015. [۹۱] Nian Ke, Zhang H, Tayal A, Coleman Th And Li Y "Auto Insurance Fraud Detection Using Unsupervised Specrtal Ranking For Anomaly", The Journal Of Finance And Data Science, 58-75, 2016. [۹۲]Kroll B, Schaffranek D, Schriegel S And Niggemann O "System Modelling Based On Machine Learning For Anomaly Detection And Predective Maintenance In Industrial Plants", IEEE Emerging Technology And Factory Automation (ETFA), 2014.
  • 27. ‫منابع‬ [۹۳] Gosh A, Qin Sh, Lee J And Wang G "PLAT: An Automated Fault And Behavioral Anomaly Detection Tool For PLC Controlled Manufacturing Systems", Computational Intelligence And Neuroscience, Hidwai Publishing Corporation, 2016. [۹۴] Boyd D M and Ellison N B "Social Network Sites: Definition, History, and Scholarship", Journal of Computer Mediated Communication, 13(1), 210-230, 2008. [۹۵] Sundén J Material Virtualities: Approaching Online Textual Embodiment, Peter Lang Publishing, 2003. [۹۶] Tang L "Online Friendship", Encyclopedia of Cyber Behavior, 412-421, 2012. [۹۷] www.aic.gov.au/en/publications/current%20series/rpp/100-120/rpp103.aspx, Choo K R, 2 January 2017, 18:30. [۹۸] www.socialmediatoday.com/pamdyer/564409/6-types-social-media-users, Rozen D, Askalani M And Senn T, 2 January 2017, 19:30.. [۹۹] Kumar R, Novak J and Tomkins, A Structure and Evolution of Online Social Networks In Link Mining: Models, Algorithms, and Applications, Springer,337-357 (1 Chapter of Book), 2010. [۱۰۰] Thelwall M "Social Networks, Gender, and Friending: An Analysis of MySpace Member Profiles", Journal of the American Society for Information Science and Technology, 59(8), 1321-1330, 2008. [۱۰۱] Gupta A, Sycara K P, Gordon G J and Hefn, A "Exploring Friend's Influence in Cultures in Twitter", Advances in Social Networks Analysis and Mining (ASONAM) IEEE ACM International Conference, 584-591, USA, 2013. [۱۰۲] Akoglu L, McGlohon M and Faloutsos C "OddBall: Spotting Anomalies in Weighted Graphs" 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer, 410-421, Berlin, 2010.
  • 28. ‫منابع‬ [۱۰۴] Gjoka M, Kurant M, Butts C T and Markopoulou A "Walking in Facebook: A Case Study of Unbiased Sampling of OSNs", INFOCOM, IEEE, 1-9, 2010. [۱۰۵] Gross R and Acquisti A "Information Revelation and Privacy in Online Social Networks" ACM Workshop on Privacy in the Electronic Society, 71-80, USA, 2005. [۱۰۶] Hodge M.J "The Fourth Amendment and Privacy Issues on the New Internet: Facebook.com and Myspace.com", ULJ, 31(2006), 95-123, 2006. [۱۰۷] Ugander J, Karrer B, Backstrom L and Marlow C "The Anatomy of the Facebook Social Graph", The Computing Research Repository (CoRR), 2011. [۱۰۸] ] Newman M E, Watts D J and Strogatz S.H "Random Graph Models of Social Networks", National Academy of Sciences of the United States of America, 99(1), 2566-2572. 2002. [۱۰۹] Chakrabarti D, Faloutsos C and McGlohon M Managing and Mining Graph Data, 69-123 (1 Chapter), Springer, US, 2010. [۱۱۰] Guzman jh and Poblete B "On-line Relevant Anomaly Detection in the Twitter Stream: An Efficient Bursty Keyword Detection Model" ACM SIGKDD Workshop on Outlier Detection and Description, USA, 31-39, 2013. [۱۱۱] Kaur R and Singh S "A Survey of Data Mining and Social Network Analysis Based Anomaly Detection Techniques", Egyptian Informatics Journal, 17, 199–216, 2016. [۱۱۲] Rawat A, Gugnani G, Shastri M and Kumar P "Anomaly Recognition in Online Social Networks", International Journal of Security and Its Applications, 9(7), 109-118, 2015. [۱۱۳] Viswanath B, Bashir A B, Crovella M and Guha S "Towards Detecting Anomalous User Behavior in Online Social Networks" 23rd USENIX Security Symposium, USA, 2014.
  • 29. ‫منابع‬ [۱۱۴] Egele M, Stringhini G, Kruegel Ch and Vigna G "COMPA : Detecting Compromised Accounts on Social Networks" 20th Annual Network & Distributed System Security Symposium, USA,2013. [۱۱۵] Altshuler Y, Fire M, Shmueli E, Elovici E, Bruckstein A, Pentland A and Lazer D "Detecting Anomalous Behaviors Using Structural Properties of Social Networks", 6th International Conference, 433-440, USA, 2013. [۱۱۶] Charrad M, Ghazzali N, Boiteau V and Niknafs A "Package NbClust V3.0", The Comprehensive R Archive Network, 2015. [۱۱۷] Breunig, M, Kriegel H And Sander J "LOF: Identifying Density-based Local Outliers" ACM SIGMOD International Conference on Management of Data, 93–104, 2000. [۱۱۸] Martin E, Hans-Peter K, Jorg S and Xiaowei X "A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise" Second International Conference on Knowledge Discovery and Data Mining (KDD-96), 226-231, USA, 1996. [۱۱۹] David M W "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness And Correlation", Journal of Machine Learning Technologies, 2(1), 37–63, 2011.