large networks
Recently Published Documents


TOTAL DOCUMENTS

630
(FIVE YEARS 111)

H-INDEX

53
(FIVE YEARS 4)

2022 ◽  
Vol 105 (1) ◽  
Author(s):  
Andrea Marcello Mambuca ◽  
Chiara Cammarota ◽  
Izaak Neri

2022 ◽  
pp. 116467
Author(s):  
Amir Olswang ◽  
Tom Gonda ◽  
Rami Puzis ◽  
Guy Shani ◽  
Bracha Shapira ◽  
...  
Keyword(s):  

2021 ◽  
Vol 7 ◽  
pp. e822
Author(s):  
Zhisheng Yang ◽  
Jinyong Cheng

In the field of deep learning, the processing of large network models on billions or even tens of billions of nodes and numerous edge types is still flawed, and the accuracy of recommendations is greatly compromised when large network embeddings are applied to recommendation systems. To solve the problem of inaccurate recommendations caused by processing deficiencies in large networks, this paper combines the attributed multiplex heterogeneous network with the attention mechanism that introduces the softsign and sigmoid function characteristics and derives a new framework SSN_GATNE-T (S represents the softsign function, SN represents the attention mechanism introduced by the Softsign function, and GATNE-T represents the transductive embeddings learning for attribute multiple heterogeneous networks). The attributed multiplex heterogeneous network can help obtain more user-item information with more attributes. No matter how many nodes and types are included in the model, our model can handle it well, and the improved attention mechanism can help annotations to obtain more useful information via a combination of the two. This can help to mine more potential information to improve the recommendation effect; in addition, the application of the softsign function in the fully connected layer of the model can better reduce the loss of potential user information, which can be used for accurate recommendation by the model. Using the Adam optimizer to optimize the model can not only make our model converge faster, but it is also very helpful for model tuning. The proposed framework SSN_GATNE-T was tested for two different types of datasets, Amazon and YouTube, using three evaluation indices, ROC-AUC (receiver operating characteristic-area under curve), PR-AUC (precision recall-area under curve) and F1 (F1-score), and found that SSN_GATNE-T improved on all three evaluation indices compared to the mainstream recommendation models currently in existence. This not only demonstrates that the framework can deal well with the shortcomings of obtaining accurate interaction information due to the presence of a large number of nodes and edge types of the embedding of large network models, but also demonstrates the effectiveness of addressing the shortcomings of large networks to improve recommendation performance. In addition, the model is also a good solution to the cold start problem.


2021 ◽  
Vol 1 (1) ◽  
pp. 45-57
Author(s):  
Salim M. Ali ◽  
Ammar A. Shareef

DHCP is an important aspect in small and large networks, since it facilitates the IP configuration of computers. However, DHCP is vulnerable to different attacks; therefore, the essential objective of this paper is to propose solutions against DHCP attacks. The paper gives an explanation about how DHCP works and understand the handshake mechanism and give a brief summary about DHCP attack, how they occur and how they affect the security of the enterprise since a leakage of sensitive Information could happen, which threatens the enterprise's security or a denial of service that immobilizes the network. Three effective countermeasures are looked up and tested against DHCP attacks, and each one successfully prevented the attack.


2021 ◽  
Author(s):  
William Gasper ◽  
Kathryn Cooper ◽  
Nathan Cornelius ◽  
Hesham Ali

2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Shi Meng ◽  
Hao Yang ◽  
Xijuan Liu ◽  
Zhenyue Chen ◽  
Jingwen Xuan ◽  
...  

Graphs have been widely used to model the complex relationships among entities. Community search is a fundamental problem in graph analysis. It aims to identify cohesive subgraphs or communities that contain the given query vertices. In social networks, a user is usually associated with a weight denoting its influence. Recently, some research is conducted to detect influential communities. However, there is a lack of research that can support personalized requirement. In this study, we propose a novel problem, named personalized influential k -ECC (PIKE) search, which leverages the k -ECC model to measure the cohesiveness of subgraphs and tries to find the influential community for a set of query vertices. To solve the problem, a baseline method is first proposed. To scale for large networks, a dichotomy-based algorithm is developed. To further speed up the computation and meet the online requirement, we develop an index-based algorithm. Finally, extensive experiments are conducted on 6 real-world social networks to evaluate the performance of proposed techniques. Compared with the baseline method, the index-based approach can achieve up to 7 orders of magnitude speedup.


2021 ◽  
pp. 000312242110571
Author(s):  
Amir Goldberg

In their insightful comment, DellaPosta and Davoodi argue that our finding (Goldberg and Stein 2018) that segmented networks inhibit cultural differentiation does not generalize to large networks. However, their demonstration rests on an incorrect implementation of the preference updating process in the associative diffusion model. We show that once this discrepancy is corrected, cultural differentiation is more pronounced in fully connected networks, irrespective of network size and even under extreme assumptions about cognitive decay. We use this as an opportunity to discuss the associative diffusion model’s assumptions and scope conditions, as well as to critically reassess prevailing contagion-based diffusion models.


2021 ◽  
Vol 104 (5) ◽  
Author(s):  
G. Timár ◽  
R. A. da Costa ◽  
S. N. Dorogovtsev ◽  
J. F. F. Mendes
Keyword(s):  

2021 ◽  
Vol 13 (11) ◽  
pp. 283
Author(s):  
Michael Alicea ◽  
Izzat Alsmadi

Firewalls and network access controls play important roles in security control and protection. Those firewalls may create an incorrect sense or state of protection if they are improperly configured. One of the major configuration problems in firewalls is related to misconfiguration in the access control roles added to the firewall that will control network traffic. In this paper, we evaluated recent research trends and open challenges related to firewalls and access controls in general and misconfiguration problems in particular. With the recent advances in next-generation (NG) firewalls, firewall roles can be auto-generated based on networks and threats. Nonetheless, and due to the large number of roles in any medium to large networks, roles’ misconfiguration may occur for several reasons and will impact the performance of the firewall and overall network and protection efficiency.


Sign in / Sign up

Export Citation Format

Share Document