what-when-how
In Depth Tutorials and Information
12.6.1 Susceptibility ........................................................................... 308
12.6.2 Transmissibility ........................................................................309
12.6.3 A graph of IM Network............................................................309
12.6.4 he General Information Dissemination Model .......................309
12.7 Conclusions............................................................................................ 310
References ......................................................................................................... 310
12.1 Introduction
Currently, many researchers have proposed many ideas on the sociotechnical net-
work protocol designs in different aspects. Some researchers have analyzed the
Internet routing protocol, a new kind of communication architecture that has been
invented with the aim to increase security. Davis Social Links is based on relation-
ship (trust level) to establish the route between different nodes, eliminating many
kinds of attacks or SPAM. Nowadays, many researchers worldwide want to model
terrorist networks, because the terrorist activities in some regions are intense. he
key issue for destabilizing the terrorist networks is how to find the important nodes
or the high degree nodes. Some researchers have argued that if we can find the high
degree nodes in the networks and remove them, the entire network will not work
anymore.
For link prediction, people use mathematic ways to estimate the possibility of
two nodes' communication. So they just calculate the common neighbors, which
play very important roles such as a bridge that can make two nodes communicate
with each other.
For disconnected social networks analysis, some researchers have proposed the
design of clusters that do not connect with each other. hey can use another cluster
as a bridge for intercluster communication.
People also want to understand how messages or information propagate in the
social network. he researchers try to model the spread of ideas in the online social
networks. he propagation latency in these networks is a vital issue. Researchers
can analyze the network backbone and use vector clock to measure the network
latency. Furthermore, they can also find the reason why different nodes have dif-
ferent latencies.
12.2 DavisSocialLinks:IntegratingSocial
NetworkswithInternetRouting[1]
12.2.1 The DSl (Davis Social Links) Architecture
To achieve the network security, a novel communication architecture called Davis
Social Links (DSL) has been proposed in [1]. he links between nodes in the social
network indicate the relationship between nodes. Generally, DSL demonstrates that
Search WWH ::




Custom Search