A CONTROL POLICY OF INFORMATION FLOW BEHAVIOUR MODEL BASED ON NODE HETEROGENEITY

被引:0
作者
Yu, Tao [1 ]
Zhang, Zhao-Wen [2 ]
Zhao, Wen-Bin [2 ]
Fan, Tong-Rang [2 ]
Wang, Jilong [1 ]
机构
[1] Tsinghua Univ, Inst Network Sci & Cyberspace, Beijing, Peoples R China
[2] Shijiazhuang Tiedao Univ, Sch Informat Sci & Technol, Shijiazhuang, Hebei, Peoples R China
基金
中国国家自然科学基金;
关键词
Information flow; complex network; heterogeneity; behaviour; control policy; SOCIAL NETWORKS; CENTRALITY;
D O I
10.2316/Journal.206.2018.5.206-0069
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The development and improvement of Internet technology has made network information richer and more attractive. Users can access networks more easily and enjoy greater network services. While the Internet provides rich and convenient service, Internet networks also provide greater conditions now for the breeding and spreading of harmful information. The user is subject to information dissemination on the network, and the user's behaviour in information flow has a tremendous impact on information dissemination. In this paper, based on the heterogeneity of the nodes in a network, an information flow model is established, wherein the factors influencing a node's information flow behaviour are researched and categorized as factors internal and external to the node. The internal factor entails the autonomy of a node, which contains the degree of interest and the subjective judgment of the node. The external factors comprise the network structure, the location of the node, and the relationships among the nodes. Considering the issue of the spread of harmful information, a complex network model is built based on the information flow behaviour of the nodes, and a control policy to address harmful information is established.
引用
收藏
页码:518 / 526
页数:9
相关论文
共 29 条
[1]  
[Anonymous], 2004, INFORM DIFFUSION BLO, DOI DOI 10.1145/988672.988739
[2]   A hybrid intrusion detection system design for computer network security [J].
Aydin, M. Ali ;
Zaim, A. Halim ;
Ceylan, K. Goekhan .
COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (03) :517-526
[3]  
Briscoe Gerard, 2009, 2009 3rd IEEE International Conference on Digital Ecosystems and Technologies (DEST), P103, DOI 10.1109/DEST.2009.5276725
[4]  
Chun-Nan Lin, 2011, Information Technology Journal, V10, P146, DOI 10.3923/itj.2011.146.151
[5]  
Cui P., 2014, SCI REPORTS, V4
[6]   SET OF MEASURES OF CENTRALITY BASED ON BETWEENNESS [J].
FREEMAN, LC .
SOCIOMETRY, 1977, 40 (01) :35-41
[7]   Temporal scaling in information propagation [J].
Huang, Junming ;
Li, Chao ;
Wang, Wen-Qiang ;
Shen, Hua-Wei ;
Li, Guojie ;
Cheng, Xue-Qi .
SCIENTIFIC REPORTS, 2014, 4
[8]   Viral Opinion Spreading in Social Networks [J].
Kanovsky, Igor ;
Yaari, Omer .
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, :971-974
[9]   User comments for news recommendation in forum-based social media [J].
Li, Qing ;
Wang, Jia ;
Chen, Yuanzhu Peter ;
Lin, Zhangxi .
INFORMATION SCIENCES, 2010, 180 (24) :4929-4939
[10]  
Liginlal D, 2010, LECT NOTES BUS INF P, V52, P166