Open Access Open Access  Restricted Access Subscription Access

Entropy of Network Analysis and Cluster Detection Using Markov Theory

N Siranjeevi, P. Priya, S. Thangavelu

Abstract


Networks square measure an important part of nature and society; nonetheless several aspects of networks operate square measure still mostly unknown. from understanding the networks play a task; however even a small number of the foremost basic questions about networks will be troublesome to answer. Nevertheless, square measure two networks alike or different? However, do networks within networks type and the way will clusters be detected? As networks have amendment with time, nevertheless will we have a tendency to monitor those changes? The answers to those queries square measure vitally necessary to humans’ understanding of the planet. Higher understanding of networks permits for things like a lot of economical electrical distribution grids and a lot of reliable period of time network intrusion detection systems. It conjointly permits for a more robust understanding of nevertheless nature type’s networks just like the bonds that form molecules and therefore the networks that carry water from the mountains to the ocean and back once more.

Cite this Article

Siranjeevi N, Priya P, Thangavelu S. Entropy of Network Analysis and Cluster Detection Using Markov Theory. Journal of Network Security. 2018; 6(3): 1–4p


Keywords


Markov matrix, entropy network

Full Text:

PDF

References


Vladimir Estivill-Castro. Why So Many Clustering Algorithms: A Position Paper. ACM SIGKDD Explorations Newsletter. Jun 2002; 4: 65–75p.

Emily Singer. Natural Networks, Strength in Loops. Quanta Magazine; Aug 2013.

Brett Meador. A Survey of Computer Network Topology and Analysis Examples. Nov 2008.

Sitabhra Sinha. Physics of Complex Networks. Proceedings of the DAE Solid State Physics Symposium. 2007.

Suratna Budalakoti. Anomaly Detection Using Hierarchical Hidden Markov Models. University of California, Santa Cruz.

Santo Fortunato. Community Detection in Graphs. Complex Networks and Systems Lagrange Laboratory.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2019 Journal of Network Security

  • eISSN: 2395–6739
  • ISSN: 2321–8517