{"title":"有隐藏账户的社交网络上恶意新闻传播的优化控制模型","authors":"Ankur Jain , Joydip Dhar","doi":"10.1016/j.rico.2024.100468","DOIUrl":null,"url":null,"abstract":"<div><p>Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.</p></div>","PeriodicalId":34733,"journal":{"name":"Results in Control and Optimization","volume":"17 ","pages":"Article 100468"},"PeriodicalIF":0.0000,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S2666720724000985/pdfft?md5=297cf7c209c0ab6b9b941e12a8ebe1ce&pid=1-s2.0-S2666720724000985-main.pdf","citationCount":"0","resultStr":"{\"title\":\"Optimum control model of Malicious news spread on Social networks having Hidden accounts\",\"authors\":\"Ankur Jain , Joydip Dhar\",\"doi\":\"10.1016/j.rico.2024.100468\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><p>Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.</p></div>\",\"PeriodicalId\":34733,\"journal\":{\"name\":\"Results in Control and Optimization\",\"volume\":\"17 \",\"pages\":\"Article 100468\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-09-20\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://www.sciencedirect.com/science/article/pii/S2666720724000985/pdfft?md5=297cf7c209c0ab6b9b941e12a8ebe1ce&pid=1-s2.0-S2666720724000985-main.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Results in Control and Optimization\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S2666720724000985\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q3\",\"JCRName\":\"Mathematics\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Results in Control and Optimization","FirstCategoryId":"1085","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S2666720724000985","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"Mathematics","Score":null,"Total":0}
Optimum control model of Malicious news spread on Social networks having Hidden accounts
Extremists are increasingly using social media to recruit and radicalize other users and increase their money. Terrorists can use popular social networks accounts and perform their activities in a hidden way. So, it is crucial to create a fruitful mechanism for controlling the spread of misinformation. Otherwise, a large number of people can mislead by this terrorist activity by joining them. Here, we propose malicious news spreading model incorporating hidden attackers of a social network. A threshold is defined for deciding the extinction of malicious news from a social network. Here, we show the importance of network alertness and activity of cybersecurity agencies in the modified model. Moreover, we obtained the optimal values of the control parameters for emergencies.