© 2013

Mining Social Networks and Security Informatics

  • Tansel Özyer
  • Zeki Erdem
  • Jon Rokne
  • Suheil Khoury
  • Provides current research and applications of social networks in security informatics

  • Discusses current cybersecurity techniques

  • Demonstrates computational analysis methods for security professionals and researchers


Part of the Lecture Notes in Social Networks book series (LNSN)

Table of contents

  1. Front Matter
    Pages I-VI
  2. Murat Obali, Bunyamin Dursun
    Pages 1-14
  3. Fergal Reid, Aaron McDaid, Neil Hurley
    Pages 79-105
  4. Michael Farrugia, Neil Hurley, Aaron Quigley
    Pages 107-126
  5. Vasileios Anastopoulos, Panagiotis Karampelas, Reda Alhajj
    Pages 161-181
  6. Dhiraj Murthy, Alexander Gross, Alexander Takata, Stephanie Bond
    Pages 183-202
  7. Sara Javanmardi, David W. McDonald, Rich Caruana, Sholeh Forouzan, Cristina V. Lopes
    Pages 203-225
  8. Yang Yang, Yizhou Sun, Saurav Pandit, Nitesh V. Chawla, Jiawei Han
    Pages 227-242
  9. Mohammad Reza Faghani, Uyen Trang Nguyen
    Pages 243-265
  10. Ahmed Elhajj, Abdallah Elsheikh, Omar Addam, Mohamad Alzohbi, Omar Zarour, Alper Aksaç et al.
    Pages 267-283

About this book


Crime, terrorism and security are in the forefront of current societal concerns. This edited volume presents research based on social network techniques showing how data from crime and terror networks can be analyzed and how information can be extracted. The topics covered include crime data mining and visualization; organized crime detection; crime network visualization; computational criminology; aspects of terror network analyses and threat prediction including cyberterrorism and the related area of dark web; privacy issues in social networks; security informatics; graph algorithms for social networks; general aspects of social networks such as pattern and anomaly detection; community discovery; link analysis and spatio-temporal network mining. These topics will be of interest to researchers and practitioners in the general area of security informatics.  The volume will also serve as a general reference for readers that would want to become familiar with current research in the fast growing field of cybersecurity.


Dynamic Integration Data Sources Fuzzy Community Structures Malware Propagation Social Networks Measuremen Metrics Community Detection Algorithms Privacy and Social Networks SAINT Similarity Measures Terrorist Networks Terrorist Network Analysis

Editors and affiliations

  • Tansel Özyer
    • 1
  • Zeki Erdem
    • 2
  • Jon Rokne
    • 3
  • Suheil Khoury
    • 4
  1. 1.Department of Computer EngineeringTOBB UniversitySogutozu AnkaraTurkey
  2. 2.Information Technologies InstituteTUBITAK BILGEMKocaeliTurkey
  3. 3.Computer ScienceUniversity of CalgaryCalgaryCanada
  4. 4.American University of SharjahSharjahSaudi Arabia

Bibliographic information