Social network analysis | Social network analysis software | Comparisons of mathematical software

Social network analysis software

Social network analysis software (SNA software) is software which facilitates quantitative or qualitative analysis of social networks, by describing features of a network either through numerical or visual representation. (Wikipedia).

Social network analysis software
Video thumbnail

Network Analysis. Course introduction.

Introduction to the Social Network Analysis course.

From playlist Structural Analysis and Visualization of Networks.

Video thumbnail

Welcome - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Social Network Analysis

Mathematica provides state-of-the-art functionality for analyzing and synthesizing graphs and networks. One application of the new functionality is social network analysis. In this talk from the Wolfram Technology Conference 2011, Charles Pooh, a Senior Kernel Developer at Wolfram Research

From playlist Wolfram Technology Conference 2011

Video thumbnail

24C3: I know who you clicked last summer

Speaker: Svenja Schröder A swiss army knife for automatic social investigation This talk introduces some techniques of social network analysis and graph theory. It aims at using simple approaches for getting interesting facts about networks. I will use the data of a popular community t

From playlist 24C3: Full steam ahead

Video thumbnail

Social network analysis - Introduction to structural thinking: Dr Bernie Hogan, University of Oxford

Social networks are a means to understand social structures. This has become increasingly relevant with the shift towards mediated interaction. Now we can observe and often analyse links at a scale that far outpaces what was possible only decades ago. While this prompts new methodologies,

From playlist Data science classes

Video thumbnail

Network Analysis. Lecture 6. Link Analysis

Directed graphs. PageRank, Perron-Frobenius theorem and algorithm convergence. Power iterations. Hubs and Authorites. HITS algorithm. Lecture slides: http://www.leonidzhukov.net/hse/2015/networks/lectures/lecture6.pdf

From playlist Structural Analysis and Visualization of Networks.

Video thumbnail

Ethical Hacking | How To Perform Network Analysis | Introduction | #cybersecurity

Don’t forget to subscribe! This ethical hacking tutorial series is about how to perform network analysis using Wireshark, Snort & SO Performing Network Analysis is imperative to best secure networks, production systems, or even at home. Using common analytics tools such as the ELK sta

From playlist Perform Network Analysis

Video thumbnail

NOTACON 4: "Open Source Intelligence" -- Data and Patterns on the WWW

Speaker: Valdis Krebs Valdis will present his work in "open source intelligence" -- finding interesting data and patterns on the WWW and making sense of them. He will explain how he used the web to create various network analyses with purely public information. 9/11 hijackers, their supp

From playlist Notacon 4

Video thumbnail

Ethical Hacking | How To Perform Network Analysis | Session 07 | #cybersecurity

Don’t forget to subscribe! This ethical hacking tutorial series is about how to perform network analysis using Wireshark, Snort & SO Performing Network Analysis is imperative to best secure networks, production systems, or even at home. Using common analytics tools such as the ELK sta

From playlist Perform Network Analysis

Video thumbnail

Ethical Hacking Tutorial For Beginners | Ethical Hacking Course | Ethical Hacking Training | Edureka

🔥Edureka Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training 🔵 Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN This Edureka "Ethical Hacking Tutorial" video will give you an introduction to Ethical Hacking. This video will give you an exhaustiv

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

Vint Cerf: Big Data and Social Media 🗃 CERN

This CERN Academic Training Lecture gives a critical analysis of the "keep everything" Big Data era, the impact on our lives of the information, at first glance "convenient for future use" that we make known about ourselves on the network. Find out more: https://home.cern/about/updates/20

From playlist CERN Academic Lectures

Video thumbnail

The Computer Chronicles - Investment Software (1995)

Special thanks to archive.org for hosting these episodes. Downloads of all these episodes and more can be found at: http://archive.org/details/computerchronicles

From playlist The Computer Chronicles 1995 Episodes

Video thumbnail

Ethical Hacking Tutorial Basics-Why, what, how? | Ethical Hacking Training | Edureka Ethical Hacking

🔥Edureka Online Training: https://www.edureka.co/cybersecurity-certification-training This Edureka "Ethical Hacking Tutorial" LIVE session will give you an introduction to Ethical Hacking. This video will give you an exhaustive video on key topics of Ethical Hacking for beginners! 🔵 PGP

From playlist Edureka Live Classes 2020

Video thumbnail

Protection Of Information Assets | CISA Training Videos

Certified Information System Auditor (CISA) Protection of Information Assets Objectives: • Understand and provide assurance that the enterprise’s security policies, standards, procedures and controls ensure the confidentiality, integrity and availability of information assets • Detail the

From playlist CISA Training Videos

Video thumbnail

NIPS 2011 Sparse Representation & Low-rank Approximation Workshop: Fast & Memory...

Sparse Representation and Low-rank Approximation Workshop at NIPS 2011 Invited Talk: Fast and Memory-efficient Low Rank Approximation of Massive Graphs by Inderjit Dhillon, University of Texas at Austin Abstract: Social network analysis requires us to perform a variety of analysis ta

From playlist NIPS 2011 Sparse Representation & Low-rank Approx Workshop

Video thumbnail

Black Hat USA 2010: Social Networking Special OpsOps: Extending Data Visualization 1/5

Speaker: Chris Sumner If you're ever in a position when you need to pwn criminals via social networks or see where Tony Hawk likes to hide skateboards around the world, this talk is for you. The talk is delivered in two parts, both of which are intended to shine a fun light on visual soc

From playlist Black Hat USA 2010

Video thumbnail

Peer to PCAST: Open Video and Open Government

(November 11, 2011) Warren Sack critiques the current web-based approach to open government using the PCAST website as a case study, and discusses new approaches to open government such as Metavid, Peer-to-Patent, and his own Peer-to-PCAST prototype. Stanford University: http://www.stanfo

From playlist Lecture Collection | Human-Computer Interaction Seminar (2011-2012)

Video thumbnail

Ethical Hacking | How To Perform Network Analysis | Session 05 | #cybersecurity

Don’t forget to subscribe! This ethical hacking tutorial series is about how to perform network analysis using Wireshark, Snort & SO Performing Network Analysis is imperative to best secure networks, production systems, or even at home. Using common analytics tools such as the ELK sta

From playlist Perform Network Analysis

Video thumbnail

Network Analysis. Lecture 1. Introduction to Network Science

Introduction to network science. Complex networks. Examples. Main properties. Scale-free networks. Small world. Six degrees of separation. Milgram study. Lecture slides: http://www.leonidzhukov.net/hse/2015/networks/lectures/lecture1.pdf

From playlist Structural Analysis and Visualization of Networks.

Related pages

Betweenness centrality | AllegroGraph | GraphML | NetMiner | Social network | Social network analysis | NodeXL | Centrality | Igraph | Complex network | Pajek | Template metaprogramming | Graph-tool | Graph theory | InfiniteGraph | Adjacency matrix | R (programming language) | Predictive analytics | Gephi | NetworkX | International Network for Social Network Analysis | Graph Modelling Language