R. Angelova and G. Weikum, Graph-based text classification: learn from your neighbors, Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval, pp.485-492, 2006.

. Avalance-online-software,

M. Bostock,

V. Boyer, D. E. Baz, and M. Elkihel, Solving knapsack problems on GPU, Computers & Operations Research, vol.39, issue.1, pp.42-47, 2012.
URL : https://hal.archives-ouvertes.fr/hal-01152223

, Ulrik Brandes. A faster algorithm for betweenness centrality, Journal of mathematical sociology, vol.25, issue.2, pp.163-177, 2001.

A. Branitskiy, D. Levshun, N. Krasilnikova, E. Doynikova, I. Kotenko et al., Determination of young generation's sensitivity to the destructive stimuli based on the information in social networks, Journal of Internet Services and Information Security (JISIS), vol.9, issue.3, pp.1-20, 2019.

J. Chen, Y. Tao, H. Wang, and T. Chen, Big data based fraud risk management at Alibaba, The Journal of Finance and Data Science, vol.1, issue.1, pp.1-10, 2015.

A. Dabah, A. Bendjoudi, A. Aitzai, D. El-baz, and N. N. Taboudjemat, Hybrid multi-core CPU and GPU-based b&b approaches for the blocking job shop scheduling problem, Journal of Parallel and Distributed Computing, vol.117, pp.73-86, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02076871

G. D. Battista, V. D. Donato, M. Patrignani, M. Pizzonia, V. Roselli et al., Bitconeview: visualization of flows in the bitcoin transaction graph, 2015 IEEE Symposium on Visualization for Cyber Security (VizSec), pp.1-8, 2015.

D. Dominguez, O. Pantoja, and M. González, Mapping the global offshoring network through the panama papers, International Conference on Information Theoretic Security, pp.407-416, 2018.

E. Elahi and Y. Raimond, Mlconf seattle 2015, Spark and GraphX in the Netflix recommender system

Y. Hu, Algorithms for visualizing large networks, Combinatorial Scientific Computing, vol.5, issue.3, pp.180-186, 2011.

M. Kalameyets, A. Chechulin, and I. Kotenko, The technique of structuring social network graphs for visual analysis of user groups to counter inappropriate, dubious and harmful information, Proceedings of the II International Scientific and Practical Conference "Fuzzy Technologies in the Industry -FTI 2018, pp.116-125, 2018.

M. Kolomeets, A. Chechulin, and I. Kotenko, Social networks analysis by graph algorithms on the example of the VKontakte social network, Journal of Wireless Mobile Networks, Ubiquitous Computing, and Dependable Applications (JoWUA), vol.10, pp.55-75, 2019.

I. Kotenko, I. Saenko, A. Chechulin, V. Desnitsky, L. Vitkova et al., Monitoring and counteraction to malicious influences in the information space of social networks, International Conference on Social Informatics, pp.159-167, 2018.

Y. Li, J. Bridge-qiao-zhao, and . Lui, On modeling product advertisement in large-scale online social networks, IEEE/ACM Transactions on Networking (TON), vol.20, issue.5, pp.1412-1425, 2012.

J. Luo, S. Fujimura, D. E. Baz, and B. Plazolles, GPU based parallel genetic algorithm for solving an energy efficient dynamic flexible flow shop scheduling problem, Journal of Parallel and Distributed Computing, vol.133, pp.244-257, 2019.
URL : https://hal.archives-ouvertes.fr/hal-02076604

, Orientdb -graph database -multi-model database

D. E. Bastien-plazolles, M. Baz, V. Spel, P. Rivola, and . Gegout, Simd monte-carlo numerical simulations accelerated on GPU and xeon phi, International Journal of Parallel Programming, vol.46, issue.3, pp.584-606, 2018.

M. Rathore, A. Ahmad, A. Paul, and U. Thikshaja, Exploiting real-time big data to empower smart transportation using big graphs, 2016 IEEE Region 10 Symposium (TENSYMP), pp.135-139, 2016.

G. Sadowski and P. Rathle, Fraud detection: Discovering connections with graph databases. White Paper-Neo Technology-Graphs are Everywhere, 2014.

, Go slackline team community in vk

, Vkontakte -api methods -developers

, He junior researcher at the Laboratory of Computer Security Problems of St.Petersburg Institute for Informatics and Automation of the Russian Academy of Sciences (SPIIRAS)

, She is presently pursuing her Ph.D. degree at the Laboratory of Analysis and Systems Architecture (LAAS-CNRS) Toulouse France and University of Sciences and Technology Houari Boumedienne, Amira Benachour received the Master degree in software engineering from University of Blida 1, 2017.

, He received the HDR from INP Toulouse in 1998. He is the founder and head of the Distributed Computing and Asynchronism team at the Laboratory of Analysis and Systems Architecture of CNRS (LAAS-CNRS), Toulouse. Dr. El Baz is the author of 40 papers in referred international journals and 70 papers in referred international conferences. His fields of interest are in HPC, parallel and distributed computing, applied mathematics and cyber-physical systems. Dr. Eng. Didier El Baz is presently co-head of the international laboratory Information Security of Cyber-Physical Systems, Toulouse France in 1981 and the Doctor Engineer degree in Control Theory from INSA Toulouse in, 1984.

, he was awarded the medal of the Russian Academy of Science in area of computer science, computer engineering and automation. At the moment he holds a position of leading researcher at the Laboratory of Computer Security Problems of SPIIRAS. He is the author of more than 70 refereed publications and has a high experience in the research on computer network security. His primary research interests include computer network security, 2015.

M. Martin-strecker, He then worked as teaching and research associate at the University of Ulm, where he earned a PhD degree on the topic of program and proof development in Type Theory. After a post-doc at the TU München, he joined the University of Toulouse as Associate Professor. Martin's main interests are in verified program development, semantics of programming languages, Strecker obtained a diploma in computer science from the Technical University of Darmstadt and the INP Grenoble

, He obtained the Ph.D. degree in 1990 and the National degree of Doctor of Engineering Science in 1999. He is Professor of computer science and Head of the Laboratory of Computer Security Problems of St. Petersburg Institute for Informatics and Automation. He is the author of more than 350 refereed publications

, several projects on developing new security technologies. For example, he was a project leader in the research projects from the US Air Force research department, via its EOARD

H. P. Projects, F. Intel, and . -secure, The research results of Igor Kotenko were tested and implemented in more than fifty Russian research and development projects