Link-Anomaly Detection in Twitter Streams

Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2

Abstract

: Rapid growth of social network gives emergence to the detection of emerging topics. The information exchanged over social network post not only includes text but also images, URLs and videos therefore conventional frequency based appropriate in this context. By taking into consideration the links between users that are generated dynamically through replies ,mentions, and retweets are included. This paper highlights the analysis of a probability model that mention the behavior of a social network user. This model is used to detect the anomalies emerged . From hundreds of users anomaly scores are aggregated. In the proposed system it is only based on replay/mention relationship and is experiment zed with in real datasets gathered from twitter

Authors and Affiliations

Keywords

Related Articles

Semantic Similarity Using Web Search Engine

Measuring the semantic similarity between words is an important component in various tasks on the web such as relation extraction, document clustering, and automatic metadata extraction. Despite the usefulness of semanti...

Evaluation of Radiation Dose Received By Patient during Cardiac Catheterization Procedure

The current study intends to measure patient dose and estimate the radiation dose received for patient in (IC) procedures. The study was measured radiation doses to (212) patients during interventional cardiology proced...

Molecular Modeling Approach for Identification of Interaction between Doxorubicin and Affibody A Receptor Binding Protein

Study of a comprehensive evaluation of interaction mechanism of the doxorubicin with affibody to prevent the cytotoxicity of the drug when such complex molecule are used as an specific targeted drug delivery, by an...

Proposed Methods of IP Spoofing Detection & Prevention

In computer networking, the term IP address spoofing or IP spoofing refers to the creation of Internet Protocol (IP) packets with a forged source IP address, called spoofing, with the purpose of concealing the identity o...

An Improved Hierarchical Technique for Document Clustering

Data mining is the process of non-trivial discovery from implied, previously unknown, and potentially useful information from data in large databases. Hence it is a core element in knowledge discovery, often used synonym...

Download PDF file
  • EP ID EP356603
  • DOI -
  • Views 74
  • Downloads 0

How To Cite

(2015). Link-Anomaly Detection in Twitter Streams. UNKNOWN, 4(2), -. https://europub.co.uk/articles/-A-356603