Graph summarization methods and applications: A survey

Y Liu, T Safavi, A Dighe, D Koutra - ACM computing surveys (CSUR), 2018 - dl.acm.org
While advances in computing resources have made processing enormous amounts of data
possible, human ability to identify patterns in such data has not scaled accordingly. Efficient …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

DeltaCon Principled Massive-Graph Similarity Function with Attribution

D Koutra, N Shah, JT Vogelstein, B Gallagher… - ACM Transactions on …, 2016 - dl.acm.org
How much has a network changed since yesterday? How different is the wiring of Bob's
brain (a left-handed male) and Alice's brain (a right-handed female), and how is it different …

Summarizing and understanding large graphs

D Koutra, U Kang, J Vreeken… - Statistical Analysis and …, 2015 - Wiley Online Library
How can we succinctly describe a million‐node graph with a few simple sentences? Given a
large graph, how can we find its most “important” structures, so that we can summarize it and …

Mapreduce triangle enumeration with guarantees

HM Park, F Silvestri, U Kang, R Pagh - Proceedings of the 23rd ACM …, 2014 - dl.acm.org
We describe an optimal randomized MapReduce algorithm for the problem of triangle
enumeration that requires O (E3/2/(M√ m) rounds, where m denotes the expected memory …

Anomaly detection module for network traffic monitoring in public institutions

Ł Wawrowski, A Białas, A Kajzer, A Kozłowski… - Sensors, 2023 - mdpi.com
It seems to be a truism to say that we should pay more and more attention to network traffic
safety. Such a goal may be achieved with many different approaches. In this paper, we put …

Pte: Enumerating trillion triangles on distributed systems

HM Park, SH Myaeng, U Kang - Proceedings of the 22nd ACM SIGKDD …, 2016 - dl.acm.org
How can we enumerate triangles from an enormous graph with billions of vertices and
edges? Triangle enumeration is an important task for graph data analysis with many …

Gawd: graph anomaly detection in weighted directed graph databases

MC Lee, HT Nguyen, D Berberidis, VS Tseng… - Proceedings of the …, 2021 - dl.acm.org
Given a set of node-labeled directed weighted graphs, how to find the most anomalous
ones? How can we summarize the normal behavior in the database without losing …

A novel graph-based descriptor for the detection of billing-related anomalies in cellular mobile networks

S Papadopoulos, A Drosou… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Mobile devices are evolving and becoming increasingly popular over the last few years. This
growth, however, has exposed mobile devices to a large number of security threats …

Anomaly detection in multiplex networks

R Mittal, MPS Bhatia - Procedia Computer Science, 2018 - Elsevier
Detecting anomalies in social is a vital task, with numerous high impacted social networks
such as WWW, Facebook, Twitter and so on. There are multiple of techniques have been …