Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Rumor Source Identification in Social Network with Time-Varying Topology


Affiliations
1 Adhiyamaan College of Engineering, Hosur, India
     

   Subscribe/Renew Journal


Identifying rumor source in social networks place a critical role in limiting the damage caused by them through the timely isolation of the source. The trouble of rumor source identification in time- varying social networks that can be minimized to a series of static networks by introducing a time-integrating window. First, reduce the time-varying networks to a series of static networks by introducing a time integrating window. Second, rather than of inspecting every individual in traditional techniques, adopt a reverse dissemination strategy to specify a set of suspects of the real rumor source. The Third is to determine the real source from the suspects. Information that spread through social networks can carry a lot of false claims.


Keywords

ML based Method, Rationale, Wavefront.
User
Subscription Login to verify subscription
Notifications
Font Size


  • Rumor Source Identification in Social Network with Time-Varying Topology

Abstract Views: 385  |  PDF Views: 0

Authors

Swetha
Adhiyamaan College of Engineering, Hosur, India
Tamilselvi
Adhiyamaan College of Engineering, Hosur, India
Vinitha
Adhiyamaan College of Engineering, Hosur, India
Gracy Theresa
Adhiyamaan College of Engineering, Hosur, India

Abstract


Identifying rumor source in social networks place a critical role in limiting the damage caused by them through the timely isolation of the source. The trouble of rumor source identification in time- varying social networks that can be minimized to a series of static networks by introducing a time-integrating window. First, reduce the time-varying networks to a series of static networks by introducing a time integrating window. Second, rather than of inspecting every individual in traditional techniques, adopt a reverse dissemination strategy to specify a set of suspects of the real rumor source. The Third is to determine the real source from the suspects. Information that spread through social networks can carry a lot of false claims.


Keywords


ML based Method, Rationale, Wavefront.

References