Tag

network analysis

1 views collected around this technical thread.

DataFunSummit
DataFunSummit
Feb 11, 2025 · Information Security

War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence

The article examines the growing threat of black‑market malicious websites, outlines a five‑part war‑themed framework for comprehensive opponent analysis, detection strategies across traffic, channel, content and relationship dimensions, and advanced detection models—including fingerprint, text, image, graph, and multimodal approaches—while highlighting the supporting operational and intelligence systems.

fraud detectioninformation securitymachine learning
0 likes · 14 min read
War‑Like Strategies for URL Anti‑Fraud: Threat Analysis, Detection Techniques, and Operational Intelligence
Java Tech Enthusiast
Java Tech Enthusiast
Jul 14, 2024 · Information Security

Wireshark Filtering Guide: Display and Capture Filters

Wireshark, the open‑source network protocol analyzer, lets users capture traffic and then refine what they see using two distinct filter types—display filters applied after capture and capture filters applied during capture—each with its own syntax, common examples (IP, port, protocol) and advanced expressions to isolate relevant packets.

Capture FiltersDisplay FiltersNetwork Security
0 likes · 14 min read
Wireshark Filtering Guide: Display and Capture Filters
Python Programming Learning Circle
Python Programming Learning Circle
Jun 28, 2024 · Artificial Intelligence

Python 'communities' Library: Implementing Louvain, Girvan‑Newman, Hierarchical, Spectral, and Bron‑Kerbosch Community Detection Algorithms

This article introduces the open‑source Python library communities, which provides implementations of several community‑detection algorithms—including Louvain, Girvan‑Newman, hierarchical clustering, spectral clustering, and Bron‑Kerbosch—along with installation instructions, usage examples, and visualization tools for network analysis.

PythonVisualizationcommunity-detection
0 likes · 6 min read
Python 'communities' Library: Implementing Louvain, Girvan‑Newman, Hierarchical, Spectral, and Bron‑Kerbosch Community Detection Algorithms
Model Perspective
Model Perspective
May 18, 2024 · Fundamentals

How Graph Theory Reveals Hidden Criminal Networks: Centrality Measures Explained

By modeling crime relationships as graphs and applying centrality metrics such as degree, betweenness, and closeness, investigators can mathematically identify key suspects, trace financial flows, and prioritize targets, demonstrating how graph theory transforms complex criminal networks into actionable intelligence.

centralitycrime investigationgraph theory
0 likes · 10 min read
How Graph Theory Reveals Hidden Criminal Networks: Centrality Measures Explained
Model Perspective
Model Perspective
Oct 22, 2023 · Fundamentals

How Graph Theory and Complex Networks Shape Everyday Life

Graph theory and complex network principles help model everyday systems—from friendships and city roads to power grids and ecosystems—by representing entities as nodes and relationships as edges, enabling analysis of properties like small‑world effects, clustering, and path lengths to optimize traffic, social insights, and stability.

Power Gridcomplex networksecosystem modeling
0 likes · 8 min read
How Graph Theory and Complex Networks Shape Everyday Life
Model Perspective
Model Perspective
Oct 8, 2023 · Fundamentals

How Do Information Cascades Spread in Social Networks? Models & Simulations

This article examines information diffusion in social networks by introducing the Independent Cascade and Linear Threshold models, discussing network structures, the influence maximization problem, and presenting a simulation experiment that quantifies spread under varying probabilities.

independent cascadeinfluence maximizationinformation diffusion
0 likes · 9 min read
How Do Information Cascades Spread in Social Networks? Models & Simulations
JD Tech
JD Tech
Jul 24, 2023 · Artificial Intelligence

An Introduction to Graph Computing: Concepts, History, and Real‑World Applications

This article provides a comprehensive overview of graph computing, covering its fundamental concepts, historical development from Euler's bridges to modern graph neural networks, various algorithmic techniques, and practical applications in search, recommendation, finance, fraud detection, and many other AI‑driven domains.

Artificial IntelligenceBig DataGraph Neural Networks
0 likes · 12 min read
An Introduction to Graph Computing: Concepts, History, and Real‑World Applications
Laravel Tech Community
Laravel Tech Community
Oct 9, 2022 · Information Security

New Features and Changes in Wireshark 4.0

Wireshark 4.0 introduces a revamped default layout with adjacent detail and byte views, enhanced Conversations and Endpoints dialogs, consistent hex‑dump import tools, drops 32‑bit Windows support, and plans future dark‑mode and Arm64 features, offering a more modern and powerful network analysis experience.

Hex DumpProtocol AnalyzerVersion 4.0
0 likes · 4 min read
New Features and Changes in Wireshark 4.0
Baidu Geek Talk
Baidu Geek Talk
Aug 16, 2022 · Artificial Intelligence

Louvain Algorithm for Community Detection in Anti‑Fraud Systems

The Louvain algorithm, a fast modularity‑maximizing community‑detection method, iteratively merges nodes into hierarchical super‑nodes, enabling anti‑fraud systems to uncover hidden collusive groups in weighted transaction graphs, thereby improving detection of fake orders, coupon abuse, and other illicit behaviors despite its iterative nature and streaming limitations.

Louvainanti-fraudcommunity-detection
0 likes · 10 min read
Louvain Algorithm for Community Detection in Anti‑Fraud Systems
Efficient Ops
Efficient Ops
Jul 5, 2022 · Operations

Master tcpdump & Wireshark: Capture and Analyze HTTP/TCP Traffic in Docker

This guide walks you through setting up a Docker container, installing tcpdump, capturing HTTP/TCP traffic with tcpdump, dissecting the three‑way handshake and data exchange, saving packets to a pcap file, and using Wireshark for deeper analysis and filtering.

DockerHTTPTCP handshake
0 likes · 17 min read
Master tcpdump & Wireshark: Capture and Analyze HTTP/TCP Traffic in Docker
Python Programming Learning Circle
Python Programming Learning Circle
Dec 1, 2021 · Fundamentals

Introduction to NetworkX: Installation, Basic Usage, and Graph Operations in Python

This article introduces the Python NetworkX library, covering its installation via Anaconda, fundamental graph creation, node and edge manipulation, attribute handling, directed and multigraph features, built‑in generators, analysis functions, and visualization with Matplotlib, all illustrated with concrete code examples.

Data StructuresNetworkXPython
0 likes · 13 min read
Introduction to NetworkX: Installation, Basic Usage, and Graph Operations in Python
Efficient Ops
Efficient Ops
Sep 13, 2021 · Operations

Mastering tcpdump: Essential Commands for Network Traffic Analysis

This guide explains how to use tcpdump for capturing and filtering network packets, covering basic and advanced command options, logical filters, saving captures, and a real‑world troubleshooting scenario involving a Node.js server behind Nginx.

Troubleshootingcommand linenetwork analysis
0 likes · 7 min read
Mastering tcpdump: Essential Commands for Network Traffic Analysis
DataFunTalk
DataFunTalk
Jan 18, 2021 · Artificial Intelligence

Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks

This article presents a comprehensive overview of using graph representation learning and clustering, particularly GraphSAGE and its optimizations, to identify and mitigate black‑market (malicious) accounts in virtual networks, discussing background, objectives, challenges such as isolation and heterogeneity, and evaluation results.

GraphSAGEblack market detectiongraph algorithms
0 likes · 13 min read
Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks
php中文网 Courses
php中文网 Courses
Dec 11, 2020 · Operations

Using Wireshark Display Filters: Methods and Common Expressions

This article explains Wireshark display filters, covering the dialog and text‑expression methods, and provides common filter examples for protocols, IP addresses, ports, packet size, comparison and logical operators, with code snippets for each case.

Wiresharkdisplay filternetwork analysis
0 likes · 4 min read
Using Wireshark Display Filters: Methods and Common Expressions
DataFunTalk
DataFunTalk
Oct 8, 2020 · Artificial Intelligence

Community Detection in Graphs: Granovetter's Theory, Louvain Algorithm, and Overlapping Communities with BigCLAM

This article explains the concept of communities in graphs, illustrates Granovetter's weak tie theory, introduces the Louvain algorithm for modularity‑based community detection, and presents the overlapping‑community detection method BigCLAM built on the Community Affiliation Graph Model.

BigCLAMLouvain Algorithmcommunity-detection
0 likes · 8 min read
Community Detection in Graphs: Granovetter's Theory, Louvain Algorithm, and Overlapping Communities with BigCLAM
Efficient Ops
Efficient Ops
May 13, 2020 · Backend Development

Unlock Real-Time Web Communication: A Deep Dive into WebSocket Handshake and Frame Structure

This article explains the origins, definition, basic frame format, masking purpose, and handshake process of the WebSocket protocol, and demonstrates packet capture analysis with a simple demo to illustrate how full‑duplex communication works over a single TCP connection.

Real-time CommunicationWebSocketframe structure
0 likes · 10 min read
Unlock Real-Time Web Communication: A Deep Dive into WebSocket Handshake and Frame Structure
Efficient Ops
Efficient Ops
Oct 21, 2019 · Operations

Master tcpdump: Capture, Filter, and Analyze Network Traffic Like a Pro

Learn how to effectively use tcpdump for network packet capture, understand its syntax and expression filters, explore common parameters, and see practical examples of analyzing MySQL traffic and packet details, empowering you to troubleshoot network issues and perform deep packet analysis.

LinuxWiresharknetwork analysis
0 likes · 9 min read
Master tcpdump: Capture, Filter, and Analyze Network Traffic Like a Pro
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 20, 2019 · Mobile Development

Lens System: An Integrated Debugging Toolkit for iOS Mobile Development

Lens is an integrated iOS debugging toolkit that adds a floating window with plug‑in modules—such as view inspection, real‑time network error alerts, simulated memory warnings, DNS spoofing, FPS monitoring, measurement tools, and configurable switches—to streamline development, testing, design, and product management, boosting team efficiency and reducing production incidents.

Performance MonitoringUI inspectiondebugging
0 likes · 10 min read
Lens System: An Integrated Debugging Toolkit for iOS Mobile Development
Ctrip Technology
Ctrip Technology
Oct 17, 2018 · Databases

Root Cause Analysis and Resolution of Intermittent Redis Connection Failures

This article presents a detailed investigation of occasional Redis connection errors in a large‑scale production environment, analyzing network packets, TCP backlog behavior, Redis internal client‑cron logic, jemalloc memory reclamation, and ultimately resolving the issue by adjusting query‑buffer handling and upgrading Redis to a newer version.

Connection TimeoutPerformance TuningRedis
0 likes · 19 min read
Root Cause Analysis and Resolution of Intermittent Redis Connection Failures