A Dynamic Metaheuristic Algorithm for Influence Maximization in Social Networks
Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 2
Abstract
During the very last decade, people have been spending lots of time working with social networks to interact with friends and to share information, thoughts, news, and etc. These social networks comprise a very important part of our daily lives. Along with the exploitation of the development of social networks, finding influential individuals in a social network has many practical functions in marketing, politics, and even control of the diseases. In the present research, a novel method called the dynamic generalized vulture algorithm has been proposed to solve influence maximization problems. Regarding the fact that in real world social networks own very dynamic and scalable nature, through our proposed algorithm, we have considered two important criteria which have been rarely taken into consideration in previous projects. The first criterion is due to the network structure change during time pass and the other refers to scalability. The suggested algorithm was measured considering standard data sets. The results showed that the proposed algorithm has been more scalable and has had higher precision in locating the most influential tops in such networks compared with other algorithms due to the reduction of search area and using several different mechanisms during navigation and optimization, balance creation and moving through these stages.
Authors and Affiliations
Jalil Jabbari Lotf, Mohammad Abdollahi Azgomi, Mohammad Reza Ebrahimi Dishabi
Mobile botnets detection using deep learning techniques
Smartphones are now well integrated with advanced capabilities and technologies such as the Internet. Today, due to the facilities and capabilities and the widespread use of smart mobile devices, mobile security has beco...
Developing an Improved Method for Malware Attack Detection in Cloud Computing using Ensemble Learning
Nowadays, detecting unusual events in the network has been the subject of many researches. Network traffic is huge and very large, and this leads to high data size and increased noise, which makes it very difficult to ex...
Developing a Threat-Tolerability Bilateral Concept within a Differential Game for the Analysis of the Insider/Adversary Behavior in Operational environment
Threat-tolerability as an innovative bilateral concept that focuses on the analysis of insider/adversary behavior is proposed. A zero sum differential game is designed to model the interaction between the two introduced...
Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications
Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...
Identify malicious traffic on IoT infrastructure using neural networks and deep learning
The Internet of Things is a network of physical devices and equipment that includes sensors, software, and other technologies for exchanging data with other devices and systems over the Internet. The spread of the Intern...