Analysis of exchange market disruptors using graph-based social network analysis

Journal Title: Electronic and Cyber Defense - Year 2023, Vol 11, Issue 1

Abstract

Today, increasing the science and technology and the communication technologies, especially in cyberspace, however physically act have become interact with cyberspace has caused a more significant effect on the culture and geography of each country. Accordingly, dealing with these physical crimes interacts with cyberspace. Therefore, detecting crimes and identifying criminals using old methods is almost impossible. Therefore, databases and their processing can play an essential role in detecting crime patterns for police-security organizations. The highly effective methods and tools of social network analysis can discover the pattern and extract knowledge from the database to prevent and control crime. This article explores crime rules using social network analysis methods and offers suggestions for preventing crimes and identifying perpetrators. The analysis of social networks has great importance, and the results obtained from these analyzes can be used in similar applications. In this article, the first has been collected the data related to currency disruptors in recent years, then analyzed this data with social network techniques and identified compelling features for identifying virtual nodes. The results show that social network analysis methods have simulated a model with acceptable accuracy and introduced destructive nodes by analyzing features. However, identifying destructive nodes and crime prevention can be considered, thoroughly describing how to do this in the paper.

Authors and Affiliations

Hossein Sahlani

Keywords

Related Articles

A novel way to identify effective test-case in software testing

Test data generation is one of the costly parts of the software testing, which is performed according to the designed test cases. The problem of designing test cases and then generating optimized test data is one of the...

Investigating The Effect of Social Engineering Techniques on Employees Vulnerability(Case study: Tehran Municipality Employees)

Social engineering is the art of deceiving people in a way that no use of force and threat, something to do or provide that information to social engineer . Social engineering can follow self-interest or organizational o...

Detection of Interfering Signals and Estimation of Their Carrier Frequency in CNC Satellite Communications using Cyclic Spectrum Density

Satellite communication is considered a significant part of the enemy's communication information in electronic warfare due to its unique features and widespread use in communication systems. Therefore, from the electron...

Presenting A Method Based on Nearest Neighbors and Hamming Distance in Order to Identify Malicious Applications

Nowadays, Android-based devices such as smart phones, tablets, and recently virtual reality headsets have found increasing usage in our daily lives. Along with the development of software for these devices, new malicious...

Identify the Factors Affecting the Culture and Awareness of Cyber Security Using Theme Analysis

Cybercriminals are targeting more humans than machines these days because they try to exploit users' vulnerabilities to achieve their destructive goals. The main purpose of this study is to identify the factors affecting...

Download PDF file
  • EP ID EP730544
  • DOI -
  • Views 44
  • Downloads 0

How To Cite

Hossein Sahlani (2023). Analysis of exchange market disruptors using graph-based social network analysis. Electronic and Cyber Defense, 11(1), -. https://europub.co.uk/articles/-A-730544