Analysis of exchange market disruptors using graph-based social network analysis
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1
Abstract
Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture and geography of each country. Accordingly, dealing with these physical crimes interacts with cyberspace. Therefore, detecting crimes and identifying criminals using old methods is almost impossible. Therefore, databases and their processing can play an essential role in detecting crime patterns for police-security organizations. The highly effective methods and tools of social network analysis can discover the pattern and extract knowledge from the database to prevent and control crime. This article explores crime rules using social network analysis methods and offers suggestions for preventing crimes and identifying perpetrators. The analysis of social networks has great importance, and the results obtained from these analyzes can be used in similar applications. In this article, the first has been collected the data related to currency disruptors in recent years, then analyzed this data with social network techniques and identified compelling features for identifying virtual nodes. The results show that social network analysis methods have simulated a model with acceptable accuracy and introduced destructive nodes by analyzing features. However, identifying destructive nodes and crime prevention can be considered, thoroughly describing how to do this in the paper.
Authors and Affiliations
Hossein Sahlani
Motion-encoded Gravitational Search Algorithm for moving target search using UAVs
In this paper, a new algorithm called Motion Coding Gravitational Search Algorithm (MGSA) is proposed to find a moving target using a unmanned aerial vehicles (UAVs). Using the laws of physics and the properties of the e...
Reducing the Destructive Effect of Misbehaving Users in Cooperative Spectrum Sensing using Reinforcement Learning
The presence of misbehaving users in Cognitive Radio Networks (CRN) can disrupt the process of spectrum sensing and detecting the status of the Primary User (PU). In order to reduce the destructive effect of this group o...
An Optimized Compound Deep Neural Network Integrating With Feature Selection for Intrusion Detection System in Cyber Attacks
In today's digital era, security issues and cyber attacks have become a serious and attention-needed concern as they hamper secured and vital information relating to organizations or individuals. Accordingly, timely dete...
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...
A Trust Evaluation Model for Cloud Computing Using Bayesian Network
In recent years, cloud computing has attracted much attention as a new computing model for providing infrastructure, platform, and software as a service. There is an important challenge in trust management between cloud...