The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.
The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.
There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.
The graph is directed.
The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Author Description

Vertices : 4662
Unique Edges : 3441
Edges With Duplicates : 7546
Total Edges : 10987
Number of Edge Types : 8
Mentions : 1296
Retweet : 2317
MentionsInRetweet : 2917
Replies to : 665
MentionsInReplyTo : 1154
Tweet : 1988
Quote : 523
MentionsInQuote : 127
Self-Loops : 2427
Reciprocated Vertex Pair Ratio : 0.015245158632056
Reciprocated Edge Ratio : 0.0300324675324675
Connected Components : 1019
Single-Vertex Connected Components : 552
Maximum Vertices in a Connected Component : 2601
Maximum Edges in a Connected Component : 7994
Maximum Geodesic Distance (Diameter) : 17
Average Geodesic Distance : 6.402902
Graph Density : 0.00022678761146901
Modularity : 0.465329
NodeXL Version : 1.0.1.508
Data Import : The graph represents a network of 4,662 Twitter users whose recent tweets contained "(Cyber Security) OR Cybersecurity", or who were replied to, mentioned, retweeted or quoted in those tweets, taken from a data set limited to a maximum of 5,000 tweets, tweeted between 3/26/2006 12:00:00 AM and 1/16/2023 5:00:34 PM. The network was obtained from Twitter on Tuesday, 17 January 2023 at 07:36 UTC.
The tweets in the network were tweeted over the 3234-day, 16-hour, 28-minute period from Monday, 10 March 2014 at 08:31 UTC to Tuesday, 17 January 2023 at 01:00 UTC.
There is an edge for each "replies-to" relationship in a tweet, an edge for each "mentions" relationship in a tweet, an edge for each "retweet" relationship in a tweet, an edge for each "quote" relationship in a tweet, an edge for each "mention in retweet" relationship in a tweet, an edge for each "mention in reply-to" relationship in a tweet, an edge for each "mention in quote" relationship in a tweet, an edge for each "mention in quote reply-to" relationship in a tweet, and a self-loop edge for each tweet that is not from above.
Layout Algorithm : The graph was laid out using the Harel-Koren Fast Multiscale layout algorithm.
Graph Source : TwitterSearch2
Graph Term : (Cyber Security) OR Cybersecurity
Groups : The graph's vertices were grouped by cluster using the Clauset-Newman-Moore cluster algorithm.
Edge Color : Edge Weight
Edge Width : Edge Weight
Edge Alpha : Edge Weight
Vertex Radius : Betweenness Centrality
Top Domains
Top Word Pairs in Tweet in Entire Graph:
[965] cyber,security [532] security,expert [506] professional,cyber [500] account,professional [334] send,dm [321] #infosec,#cybersecurity [292] retrieve,reactivate [292] brian,j5 [292] instagram,retrieve [292] simply,contact Top Word Pairs in Tweet in G1:
[63] cyber,security [24] learn,more [22] iot,ot [21] addressing,vulnerabilities [21] ot,environment [21] proactively,addressing [21] customer,story [21] learn,vital [21] vulnerabilities,iot [21] read,mfstsecurity Top Word Pairs in Tweet in G2:
[243] #infosec,#cybersecurity [149] #pentesting,#oscp [122] #cybersecurity,#cybersecuritytips [117] #cybersecuritytips,#pentesting [102] #datasecurity,#privacy [99] #cybersecurity,#infosec [97] #oscp,#redteam [95] #privacy,#100daysofcode [84] #datascience,#datascientists [81] #100daysofcode,#cloudsecurity Top Word Pairs in Tweet in G3:
[296] cyber,security [295] security,expert [292] retrieve,reactivate [292] brian,j5 [292] contact,brian [292] simply,contact [292] j5,instagram [292] dm,ig [292] expert,send [292] professional,cyber Top Word Pairs in Tweet in G4:
[221] cyber,security [211] security,expert [208] seek,help [208] advise,seek [208] reach,whatsapp [207] professional,cyber [207] reactivating,account [207] good,recovering [207] account,professional [207] expert,hit Top Word Pairs in Tweet in G5:
[58] cyber,security [47] recover,account [35] security,hacker [35] sure,help [32] help,recover [32] fully,sure [32] hacker,fully [32] cozy_j7,ig [25] support,team [23] haven't,gotten Top Word Pairs in Tweet in G6:
[163] data,science [104] bowtiedcyber,cybersecurity [81] science,cybersecurity [80] science,data [80] cybersecurity,data [18] data,analytics [16] cybersecurity,defense [16] blue,team [15] know,read [15] read,data Top Word Pairs in Tweet in G7:
[46] cyber,security [31] whatsapp,639 [31] 639,854 [31] 854,1167 [31] recovered,reach [31] assist,hit [31] account,recovered [31] hit,cyber [31] reach,whatsapp [31] won,assist Top Word Pairs in Tweet in G8:
[38] #infosec,#cybersecurity [33] #pentesting,#oscp [30] intro,series [30] #cybersecurity,#pentesting [28] series,windows [26] #malware,#windows [26] cyberarklabs,#malware [26] #rootkit,#infosec [26] rootkits,internals [26] internals,cyberarklabs Top Word Pairs in Tweet in G9:
[43] #iot,#iiot [34] #iiot,#iotpl [33] #ai,#ml [29] #bigdata,#analytics [21] #analytics,#ai [19] #ai,#machinelearning [18] #programming,#coding [16] #ml,#machinelearning [16] #datascience,#bigdata [15] #iot,#100daysofmlcode Top Word Pairs in Tweet in G10:
[43] #hacked,#hacking [18] #cybersecurity,#cyberattack [18] #cyber,#security [18] #tech,#infosec [18] #infosec,#hacked [18] vectors,#cybersecurity [18] attack,vectors [18] #hacking,#cyber [18] cybersecurity,attack [18] securitytrybe,cybersecurity Top Replied-To in Entire Graph:
Top Replied-To in G1:
Top Replied-To in G2:
Top Replied-To in G3:
Top Replied-To in G4:
Top Replied-To in G5:
Top Replied-To in G6:
Top Replied-To in G7:
Top Replied-To in G9:
Top Replied-To in G10:
Top Mentioned in Entire Graph:
Top Mentioned in G1:
Top Mentioned in G2:
Top Mentioned in G3:
Top Mentioned in G4:
Top Mentioned in G5:
Top Mentioned in G6:
Top Mentioned in G7:
Top Mentioned in G8:
Top Mentioned in G9:
Top Mentioned in G10:
Top Tweeters in Entire Graph:
Top Tweeters in G1:
Top Tweeters in G2:
Top Tweeters in G3:
Top Tweeters in G4:
Top Tweeters in G5:
Top Tweeters in G6:
Top Tweeters in G7:
Top Tweeters in G8:
Top Tweeters in G9:
Top Tweeters in G10: