2016
DOI: 10.1016/j.jnca.2016.02.021
|View full text |Cite
|
Sign up to set email alerts
|

Mining social networks for anomalies: Methods and challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
29
0
1

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 66 publications
(30 citation statements)
references
References 113 publications
0
29
0
1
Order By: Relevance
“…Carley, McCulloh and Carley, and Wei and Carley studied temporal pattern recognition and anomaly detection in social networks with some business and military applications. Savage et al, Bindu and Thilagam, Woodall et al, and Noorossana et al reviewed numerous methods that have been developed for monitoring social network data.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Carley, McCulloh and Carley, and Wei and Carley studied temporal pattern recognition and anomaly detection in social networks with some business and military applications. Savage et al, Bindu and Thilagam, Woodall et al, and Noorossana et al reviewed numerous methods that have been developed for monitoring social network data.…”
Section: Introductionmentioning
confidence: 99%
“…A fixed amount of dynamic network data is used (in a retrospective analysis) to detect anomalies in some applications. For example, Bindu et al, Ranshous et al, and Akoglu et al reviewed methods where the main task is to identify anomalous network activities given the network history.…”
Section: Introductionmentioning
confidence: 99%
“…In this section, we review a handful of network surveillance methodologies that were chosen specifically to exemplify different areas of emphasis in network surveillance applications. For a more comprehensive review of this topic, see the works of Savage et al, Ranshous et al, Bindu and Thilagam, and Woodall et al…”
Section: Monitoring For Change In Dynamic Networkmentioning
confidence: 99%
“…Reflecting the growing interest in the problem, several survey papers have also appeared recently. Savage et al [40] and Bindu and Thilagam [6] review the main methods for detecting anomalies in online social networks, whereas Woodall et al [48] give an overview of the available tools for social network monitoring, together with a discussion of some performance metrics.…”
Section: Dynamic Network Structure and Change Detectionmentioning
confidence: 99%
“…We performed an adaptive model selection over the census-tract-based snapshots restricted to the Manhattan area (N = 288). Using time windows of 8 h per snapshot, we examined how the optimal value forK changes over time, per day segment, by allowing K ∈ [6,14]. We then used the average ofK ′ over all the snapshots, and re-ran the WSBM with the fixed optimized value, which turns out to beK ′ = 10 for the analyzed month.…”
Section: Model Selectionmentioning
confidence: 99%