“…To investigate the dynamics of network the approaches are used [6,37,23]. The simulation of network graph evolution exploring different strategies for network building and showing the location of edges has an important role in networks evolution.…”
Section: Evolution In Dynamic Social Networkmentioning
This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are considered.
“…To investigate the dynamics of network the approaches are used [6,37,23]. The simulation of network graph evolution exploring different strategies for network building and showing the location of edges has an important role in networks evolution.…”
Section: Evolution In Dynamic Social Networkmentioning
This article considers a short survey of basic methods of social networks analysis, which are used for detecting cyber threats. The main types of social network threats are presented. Basic methods of graph theory and data mining, that deals with social networks analysis are described. Typical security tasks of social network analysis, such as community detection in network, detection of leaders in communities, detection experts in networks, clustering text information and others are considered.
“…These early models were implemented using a system dynamics approach and utilised ordinary differential equations (ODEs) to model two-sided conflicts between a state and a rebel group (Forrester 1968;Hanneman 1988). These equations contain time derivatives (of troop numbers for example) and are used to describe dynamic phenomena, evolution and variation.…”
Section: Previous Numerical Models Of Civil Conflictmentioning
This paper explores ways in which civil conflict can be simulated using numerical methods. A general two-party model of conflict is developed by extending an approach proposed by [Christia, F., (2012), Alliance Formation in Civil Wars, Cambridge University Press, New York], which is based on a metric of the 'relative power' that exists between the state and a rebel group. Various definitions of relative power are considered and one of these is chosen to illustrate different types of two-sided armed conflict, namely direct-fire, guerrilla and asymmetric warfare. The additional suggestion of Christia that random or stochastic events can lead to unexpected conflict outcomes is also further extended in this paper. The inclusion in the model of terms describing concurrent rebel recruitment of civilians and state deployment of troops are then described. Examples are presented for various hypothetical cases. It is demonstrated that numerical simulation techniques have great potential for modelling civil war. The Christia approach is shown to provide an excellent basis from which numerical models of civil conflict can be built and from which the progress of a conflict can usefully be visualised graphically.
“…En un principio se centró en la Dinámica de Sistemas, que requería de la gran capacidad de cálculo que estos ordenadores proporcionaban, ya que consistía en utilizar grandes sistemas de ecuaciones diferenciales para representar las trayectorias de las variables en el tiempo (Hanneman, 1988). Sin embargo, la dinámica de sistemas está restringida al análisis del nivel «macro-social», y solo permitía modelar aquello que pudiera ser traducido a ecuaciones.…”
Section: Evolución De Las Técnicas De Simulación Hasta Los Sistemas Munclassified
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.