The ability to mine data represented as a graph has become important in several domains for detecting various structural patterns. One important area of data mining is anomaly detection, but little work has been done in terms of detecting anomalies in graph-based data. While there has been some work that has used statistical metrics and conditional entropy measurements, the results have been limited to certain types of anomalies. In this paper we present a graph-based approach to uncovering anomalies in applications containing information representing possible cybercrime activity: network activity and employee movements. We use three algorithms for the purpose of detecting anomalies in all three types of possible graph changes: label modi...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
International audienceIn this work, we propose a new approach to detect anomalous graphs in a stream...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
The ability to mine data represented as a graph has become important in several domains for detectin...
Abstract—The ability to mine data represented as a graph has become important in several domains for...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
The ability to mine relational data has become important in several domains (e.g., counter-terrorism...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
Abstract—Protecting and securing sensitive information are critical challenges for businesses. Delib...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
International audienceIn this work, we propose a new approach to detect anomalous graphs in a stream...
Abstract Detecting anomalies in data is a vital task, with numerous high-impact ap-plications in are...
The ability to mine data represented as a graph has become important in several domains for detectin...
Abstract—The ability to mine data represented as a graph has become important in several domains for...
Anomaly detection is an area that has received much attention in recent years. It has a wide variety...
Detecting anomalies and events in data is a vital task, with numerous applications in security, fina...
Anomaly detection is becoming an important problem in graph mining. This is because people are eager...
The ability to mine relational data has become important in several domains (e.g., counter-terrorism...
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
Abstract—Protecting and securing sensitive information are critical challenges for businesses. Delib...
National audienceIt is difficult to detect new types of attacks in heterogeneous and scalable networ...
Identifying anomalies in computer networks is a challenging and complex problem. Often, anomalies oc...
How can we detect fraudsters in large online review networks, or power grid failures using electrica...
International audienceIn this work, we propose a new approach to detect anomalous graphs in a stream...