Using social network analysis to identify key hackers for keylogging tools in hacker forums.
Sagar SamtaniHsinchun ChenPublished in: ISI (2016)
Keyphrases
- social network analysis
- network analysis
- social networks
- network security
- homeland security
- graph theory
- link prediction
- web mining
- link discovery
- key players
- online social networking
- complex networks
- communication patterns
- social media
- criminal networks
- structural patterns
- social network data
- law enforcement
- social relationships
- intrusion detection
- terrorist networks
- technology enhanced learning
- content analysis
- intrusion detection system
- social interaction
- link formation
- mining and social network analysis