The search for anomalies or outliers in large-scale network data has important se-curity applications and can help to uncover interesting behavior. Four different types of anomalies can be discovered in static and dynamic network data: nodes, edges, small subgraphs, and/or larger (sub) networks. To date, most of the re-search in this area has focused on identifying anomalous nodes, links, or small subgraphs in static networks. In dynamic network data, research has focused on detecting outlier links and anomalous network evolution, where multiple, tempo-ral samples of the network provide sufficient data for analysis. However, to our knowledge, there are few algorithms that search for network-level anomalies in large-scale static networks. Th...
In the real world, various systems can be modeled using entity-relationship graphs. Given such a gra...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
Anomaly detection in dynamic communication networks has many important security applications. These ...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relation-sh...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
Outliers arise in networks due to different reasons such as fraudulent behavior of malicious users o...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
In the real world, various systems can be modeled using entity-relationship graphs. Given such a gra...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
Anomaly detection in dynamic communication networks has many important security applications. These ...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relation-sh...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
International audienceOutliers arise in networks due to different reasons such as fraudulent behavio...
Dynamic networks, also called network streams, are an im-portant data representation that applies to...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
The study of networks has emerged in diverse disciplines as a means of analyzing complex relationshi...
Outliers arise in networks due to different reasons such as fraudulent behavior of malicious users o...
The detection of outliers has gained considerable interest in data mining with the realization that ...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
In the real world, various systems can be modeled using entity-relationship graphs. Given such a gra...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
Anomaly detection in dynamic communication networks has many important security applications. These ...