Eikonal Blog

2013.08.06

Applied graph theory (“Social Networks Analysis”)

Concepts

Graph theory:

  • nodes and edges
  • degree = number of edges for a given node
  • isolated nodes
  • connected nodes
  • hub = well connected node
  • Scale-free networks = average number of nodes stays constant
  • preferential attachment:
    • the fraction of nodes with k edges: p(k) \sim k^{-\gamma}
    • a long tail distribution
  • Degree of distribution

SNAs on YouTube

Six degrees of separation, Small Worlds, Kevin Bacon metric, Erdos metric, etc

Books

Authors and Sites


Papers

  • “Power laws, Pareto distributions and Zipf’s law” by M.E.J. Newman (arXiv) – http://arxiv.org/abs/cond-mat/0412004
    • When the probability of measuring a particular value of some quantity varies inversely as a power of that value, the quantity is said to follow a power law, also known variously as Zipf’s law or the Pareto distribution. Power laws appear widely in physics, biology, earth and planetary sciences, economics and finance, computer science, demography and the social sciences. For instance, the distributions of the sizes of cities, earthquakes, solar flares, moon craters, wars and people’s personal fortunes all appear to follow power laws. The origin of power-law behaviour has been a topic of debate in the scientific community for more than a century. Here we review some of the empirical evidence for the existence of power-law forms and the theories proposed to explain them.
    • more papers by M.E.J. Newman at arXiv – arxiv.org/find/cond-mat/1/au:+Newman_M/0/1/0/all/0/1

2011.09.29

SNMP

Filed under: networking — Tags: , , — sandokan65 @ 12:37

2011.04.25

Cloud computing

Filed under: dev, networking — Tags: , , , — sandokan65 @ 11:09

Online storage


Related here: Cloud security – https://eikonal.wordpress.com/2010/08/09/cloud-security/ | Virtualization Tools – https://eikonal.wordpress.com/2010/12/02/virtualization-tools/ | Virtualization security – https://eikonal.wordpress.com/2010/08/09/virtualization-security/ | Threats of cloud computing – https://eikonal.wordpress.com/2010/02/03/threats-of-cloud-computing/.

2010.11.06

Security assessments for network infrastructure devices

2010.08.12

Network protocols stacks

Filed under: networking — sandokan65 @ 14:31

2010.02.22

Public network gateway sites

Filed under: networking — Tags: , , , — sandokan65 @ 14:31

Public gateways

2010.01.06

Network discovery tools

Filed under: infosec, networking, Penetration Testing, VA (Vulnerability Assessment) — Tags: — sandokan65 @ 16:18

Create a free website or blog at WordPress.com.