Detecting rumor outbreaks in online social networks

D Frąszczak - Social Network Analysis and Mining, 2023 - Springer
Social media platforms are broadly used to exchange information by milliards of people
worldwide. Each day people share a lot of their updates and opinions on various types of …

Application of social network analysis to the investigation of interpersonal connections

M Mincer, E Niewiadomska-Szynkiewicz - Journal of Telecommunications and …, 2012 - jtit.pl
Social network analysis (SNA) is an important and valuable tool for knowledge extraction
from massive and unstructured data. Social network provides a powerful abstraction of the …

Modelling and analysis of transportation networks using complex networks: Poland case study

Z Tarapata - Archives of Transport, 2015 - archivesoftransport.com
In the paper a theoretical bases and empirical results deal with analysis and modelling of
transportation networks in Poland using complex networks have been presented. Properties …

Comparative study of supervised learning methods for malware analysis

M Kruczkowski, E Niewiadomska-Szynkiewicz - Journal of Telecommunications …, 2014 - jtit.pl
Malware is a software designed to disrupt or even damage computer system or do other
unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti …

Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity

M Kiedrowicz - MATEC Web of Conferences, 2017 - matec-conferences.org
This article outlines the methodology of the IT system risk analysis and management,
including various categories of risk factors significant from the point of view of the sensitive …

[PDF][PDF] Czy sieci rządzą światem?: od Eulera do Barabasiego

Z Tarapata - Biuletyn Instytutu Systemów Informatycznych, 2012 - bibliotekanauki.pl
W pracy poruszono problem różnorodnych zastosowań modeli i metod teorii grafów i sieci.
W szczególności zwrócono uwagę na cechy charakterystyczne współczesnych sieci …

[PDF][PDF] Application of social network inferred data to churn modeling in telecoms

W Gruszczyński, P Arabas - Journal of Telecommunications and …, 2016 - bibliotekanauki.pl
The subject of this work is the use of social network analysis to increase the effectiveness of
methods used to predict churn of telephony network subscribers. The social network is …

The Essence of Reflexive Control and Diffusion of Information in the Context of Information Environment Security

R Kasprzyk - Intelligent Systems in Production Engineering and …, 2019 - Springer
In this paper, a particular emphasis is put on discussing the theory of reflexive control as a
model for forecasting the decision-making process and influencing this process. Universal …

Modeling and simulation of botnet based cyber-threats

R Kasprzyk, M Paź, Z Tarapata - MATEC Web of …, 2017 - matec-conferences.org
The paper presents an analysis of cyber-threats, with particular emphasis on the threats
resulting from botnet activity. Botnets are the most common types of threats and often …

Graph-network models and methods used to detect financial crimes with IAFEC graphs IT tool

Z Tarapata, R Kasprzyk… - MATEC Web of …, 2018 - matec-conferences.org
The article outlines graph-network models used to detect financial crimes. The general
graph-network model of transaction participants was defined. The article also provides some …