“…Examples include transportation logs (w cabs travel from location s to location d), network communication logs (w packets sent by IP address s to We consider the problem of near real-time anomaly detection in such settings. Due to the fluid nature of what is considered 'normal', prior works typically focus on detecting specific anomalous changes to the graph, e.g., bridge edges [22,26], hotspot nodes [31], changes to community structure [27,28], graph metrics [8,10], etc. In this work, we focus on detecting anomalies involving the sudden appearance or disappearance of a large dense directed subgraphs (near bicliques), which is useful in numerous applications: detecting attacks (port scan, denial of service) in network communication logs, interesting/fraudulent behavior creating spikes of activity in user-user communication logs (scammers who operate fast and in bulk), important events (holidays, large delays) creating abnormal traffic in/out flow to certain locations, etc.…”