Anomaly and event detection has been studied widely for having many applications in fraud detection, network intrusion detection, detection of epidemic outbreaks, and so on. In this paper we propose an algorithm that operates on a time-varying network of agents with edges representing interactions between them and (1) spots "anomalous " points in time at which many agents "change " their behavior in a way it deviates from the norm; and (2) attributes the detected anomaly to those agents that contribute to the "change " the most. Experiments on a large mobile phone network (of 2 million anonymous customers with 50 million interactions over a period of 6 months) shows that the "change"-points detected b...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
We propose a method for detecting large events based on the structure of temporal communication netw...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
International audienceAnalysing mobile apps communications can unleash significant information on bo...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
The large-scale study of human mobility has been significantly enhanced over the last decade by the ...
Anomaly detection in dynamic communication networks has many important security applications. These ...
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolvin...
Recently, the automatic highlighting of anomalous changes in a sequence of social graph snapshots is...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
Abstract—This paper describes a methodology for finding and describing significant events in time ev...
The effect of the network structure on the dynamics of social and communication networks has been of...
Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subsc...
This article addresses the problem of network attacks using steganographic techniques based on the m...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
We propose a method for detecting large events based on the structure of temporal communication netw...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
International audienceAnalysing mobile apps communications can unleash significant information on bo...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
The large-scale study of human mobility has been significantly enhanced over the last decade by the ...
Anomaly detection in dynamic communication networks has many important security applications. These ...
In this work, we propose a new, fast and scalable method for anomaly detection in large time-evolvin...
Recently, the automatic highlighting of anomalous changes in a sequence of social graph snapshots is...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
Abstract—This paper describes a methodology for finding and describing significant events in time ev...
The effect of the network structure on the dynamics of social and communication networks has been of...
Anomaly detection in telecommunications data tries to discover deviant behaviour of individual subsc...
This article addresses the problem of network attacks using steganographic techniques based on the m...
Mobile communication networks produce massive amounts of data which may be useful in identifying the...
We propose a method for detecting large events based on the structure of temporal communication netw...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...