The ability to mine relational data has become important in several domains (e.g., counter-terrorism), and a graph-based representation of this data has proven useful in detecting various relational, structural patterns [1]. Here, we analyze the use of graph properties as a method for uncovering anomalies in data represented as a graph. Graph Properties. While our initial research examined many of the basic graph properties, only a few of them proved to be insightful as to the structure of a graph for anomaly detection purposes. For the average shortest path length L, we used the Floyd-Warshall all-pairs algorithm. For a measurement of density, we chose to use a definition that is commonly used when defining social networks [4]. For connect...
As a natural structure for representing entities and in-teractions, graphs are commonly used in many...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
The ability to mine data represented as a graph has become important in several domains for detectin...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
The ability to mine data represented as a graph has become important in several domains for detectin...
One of the primary issues with traditional anomaly detection approaches is their inability to handle...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
What does the Web look like? How can we find patterns, communities, outliers, in a social network? W...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
Most graph-based anomaly detection work uses structural graph connectivity or node information for d...
How does the Web look? How could we tell an abnormal social network from a normal one? These and sim...
As a natural structure for representing entities and in-teractions, graphs are commonly used in many...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
The ability to mine data represented as a graph has become important in several domains for detectin...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
The ability to mine data represented as a graph has become important in several domains for detectin...
One of the primary issues with traditional anomaly detection approaches is their inability to handle...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
Knowledge discovery from disparate data sources can be very useful for gaining a better understandin...
What does the Web look like? How can we find patterns, communities, outliers, in a social network? W...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
Most graph-based anomaly detection work uses structural graph connectivity or node information for d...
How does the Web look? How could we tell an abnormal social network from a normal one? These and sim...
As a natural structure for representing entities and in-teractions, graphs are commonly used in many...
Learning the network structure of a large graph is computationally demanding, and dynamically monito...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...