Graph summarization methods and applications: A survey
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
DeltaCon Principled Massive-Graph Similarity Function with Attribution
How much has a network changed since yesterday? How different is the wiring of Bob's
brain (a left-handed male) and Alice's brain (a right-handed female), and how is it different …
brain (a left-handed male) and Alice's brain (a right-handed female), and how is it different …
Summarizing and understanding large graphs
How can we succinctly describe a million‐node graph with a few simple sentences? Given a
large graph, how can we find its most “important” structures, so that we can summarize it and …
large graph, how can we find its most “important” structures, so that we can summarize it and …
Mapreduce triangle enumeration with guarantees
We describe an optimal randomized MapReduce algorithm for the problem of triangle
enumeration that requires O (E3/2/(M√ m) rounds, where m denotes the expected memory …
enumeration that requires O (E3/2/(M√ m) rounds, where m denotes the expected memory …
Anomaly detection module for network traffic monitoring in public institutions
It seems to be a truism to say that we should pay more and more attention to network traffic
safety. Such a goal may be achieved with many different approaches. In this paper, we put …
safety. Such a goal may be achieved with many different approaches. In this paper, we put …
Pte: Enumerating trillion triangles on distributed systems
How can we enumerate triangles from an enormous graph with billions of vertices and
edges? Triangle enumeration is an important task for graph data analysis with many …
edges? Triangle enumeration is an important task for graph data analysis with many …
Gawd: graph anomaly detection in weighted directed graph databases
Given a set of node-labeled directed weighted graphs, how to find the most anomalous
ones? How can we summarize the normal behavior in the database without losing …
ones? How can we summarize the normal behavior in the database without losing …
A novel graph-based descriptor for the detection of billing-related anomalies in cellular mobile networks
S Papadopoulos, A Drosou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Mobile devices are evolving and becoming increasingly popular over the last few years. This
growth, however, has exposed mobile devices to a large number of security threats …
growth, however, has exposed mobile devices to a large number of security threats …
Anomaly detection in multiplex networks
R Mittal, MPS Bhatia - Procedia Computer Science, 2018 - Elsevier
Detecting anomalies in social is a vital task, with numerous high impacted social networks
such as WWW, Facebook, Twitter and so on. There are multiple of techniques have been …
such as WWW, Facebook, Twitter and so on. There are multiple of techniques have been …