We describe a guilt-by-association system that can be used to rank networked entities by their suspiciousness. We demonstrate the algorithm on a suite of data sets generated by a terrorist-world simulator developed to support a DoD program. Each data set consists of thousands of entities and some known links between them. The system ranks truly malicious entities highly, even if only relatively few are known to be malicious ex ante. When used as a tool for identifying promising data-gathering opportunities, the system focuses on gathering more information about the most suspicious entities and thereby increases the density of linkage in appropriate parts of the network. We assess performance under conditions of noisy prior knowledge of mali...
In this paper, we address the problem of botnet detection by correlating information from trusted ho...
acaglayan [@] milcord [dot] com In this paper, we describe a Guilt-by-Association approach to determ...
Knowledge about the structure and organization of terrorist networks is important for both terrorism...
We describe a guilt-by-association system that can be used to rank entities by their suspiciousness....
An important part of maintaining network security is collecting and processing information about cyb...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
To investigate group deception and demote insider threats, this study leverages network analysis to ...
Abstract. This paper surveys work from the field of machine learning on the problem of within-networ...
noWhile criminals may start their activities at individual level, the same is in general not true fo...
This paper describes a rapid technique: communal analysis suspicion scoring (CASS), for generating n...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Using Social Network Analysis methodology, specifically the Network of Similarity and Response Time ...
The ICIJ Offshore Leaks Database represents a large set of relationships between people, companies, ...
In this paper, we present a collective classification approach for identifying untrustworthy individ...
Computational reputation-based trust models using statistical learning have been intensively studied...
In this paper, we address the problem of botnet detection by correlating information from trusted ho...
acaglayan [@] milcord [dot] com In this paper, we describe a Guilt-by-Association approach to determ...
Knowledge about the structure and organization of terrorist networks is important for both terrorism...
We describe a guilt-by-association system that can be used to rank entities by their suspiciousness....
An important part of maintaining network security is collecting and processing information about cyb...
All over the world intelligence services are collecting data concerning possible terrorist threats. ...
To investigate group deception and demote insider threats, this study leverages network analysis to ...
Abstract. This paper surveys work from the field of machine learning on the problem of within-networ...
noWhile criminals may start their activities at individual level, the same is in general not true fo...
This paper describes a rapid technique: communal analysis suspicion scoring (CASS), for generating n...
Intrusion Detection Systems (IDS), designed during the early era of the Internet to protect against ...
Using Social Network Analysis methodology, specifically the Network of Similarity and Response Time ...
The ICIJ Offshore Leaks Database represents a large set of relationships between people, companies, ...
In this paper, we present a collective classification approach for identifying untrustworthy individ...
Computational reputation-based trust models using statistical learning have been intensively studied...
In this paper, we address the problem of botnet detection by correlating information from trusted ho...
acaglayan [@] milcord [dot] com In this paper, we describe a Guilt-by-Association approach to determ...
Knowledge about the structure and organization of terrorist networks is important for both terrorism...