Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Detecting rumor outbreaks in online social networks
D Frąszczak - Social Network Analysis and Mining, 2023 - Springer
Social media platforms are broadly used to exchange information by milliards of people
worldwide. Each day people share a lot of their updates and opinions on various types of …
worldwide. Each day people share a lot of their updates and opinions on various types of …
Application of social network analysis to the investigation of interpersonal connections
M Mincer, E Niewiadomska-Szynkiewicz - Journal of Telecommunications and …, 2012 - jtit.pl
Social network analysis (SNA) is an important and valuable tool for knowledge extraction
from massive and unstructured data. Social network provides a powerful abstraction of the …
from massive and unstructured data. Social network provides a powerful abstraction of the …
Modelling and analysis of transportation networks using complex networks: Poland case study
Z Tarapata - Archives of Transport, 2015 - archivesoftransport.com
In the paper a theoretical bases and empirical results deal with analysis and modelling of
transportation networks in Poland using complex networks have been presented. Properties …
transportation networks in Poland using complex networks have been presented. Properties …
Comparative study of supervised learning methods for malware analysis
Malware is a software designed to disrupt or even damage computer system or do other
unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti …
unwanted actions. Nowadays, malware is a common threat of the World Wide Web. Anti …
Multi-faceted methodology of the risk analysis and management referring to the IT system supporting the processing of documents at different levels of sensitivity
M Kiedrowicz - MATEC Web of Conferences, 2017 - matec-conferences.org
This article outlines the methodology of the IT system risk analysis and management,
including various categories of risk factors significant from the point of view of the sensitive …
including various categories of risk factors significant from the point of view of the sensitive …
[PDF][PDF] Czy sieci rządzą światem?: od Eulera do Barabasiego
Z Tarapata - Biuletyn Instytutu Systemów Informatycznych, 2012 - bibliotekanauki.pl
W pracy poruszono problem różnorodnych zastosowań modeli i metod teorii grafów i sieci.
W szczególności zwrócono uwagę na cechy charakterystyczne współczesnych sieci …
W szczególności zwrócono uwagę na cechy charakterystyczne współczesnych sieci …
[PDF][PDF] Application of social network inferred data to churn modeling in telecoms
W Gruszczyński, P Arabas - Journal of Telecommunications and …, 2016 - bibliotekanauki.pl
The subject of this work is the use of social network analysis to increase the effectiveness of
methods used to predict churn of telephony network subscribers. The social network is …
methods used to predict churn of telephony network subscribers. The social network is …
The Essence of Reflexive Control and Diffusion of Information in the Context of Information Environment Security
R Kasprzyk - Intelligent Systems in Production Engineering and …, 2019 - Springer
In this paper, a particular emphasis is put on discussing the theory of reflexive control as a
model for forecasting the decision-making process and influencing this process. Universal …
model for forecasting the decision-making process and influencing this process. Universal …
Modeling and simulation of botnet based cyber-threats
The paper presents an analysis of cyber-threats, with particular emphasis on the threats
resulting from botnet activity. Botnets are the most common types of threats and often …
resulting from botnet activity. Botnets are the most common types of threats and often …
Graph-network models and methods used to detect financial crimes with IAFEC graphs IT tool
The article outlines graph-network models used to detect financial crimes. The general
graph-network model of transaction participants was defined. The article also provides some …
graph-network model of transaction participants was defined. The article also provides some …