2018
DOI: 10.1109/tkde.2018.2818163
|View full text |Cite
|
Sign up to set email alerts
|

NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection In Online Social Networks

Abstract: Use of social network is the basic functionality of today's life. With the advent of more and more online social media, the information available and its utilization have come under the threat of several anomalies. Anomalies are the major cause of online frauds which allow information access by unauthorized users as well as information forging. One of the anomalies that act as a silent attacker is the horizontal anomaly. These are the anomalies caused by a user because of his/her variable behaviour towards dif… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
26
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 25 publications
(26 citation statements)
references
References 38 publications
0
26
0
Order By: Relevance
“…e previous methods based on manual processing such as auditing were cumbersome and ineffective due to large-size data or its attributes. Data mining techniques are considered effective in assessing small outliers in large datasets [9,11,12]. Frauds lead to heavy business losses.…”
Section: Credit Card Payment Processingmentioning
confidence: 99%
“…e previous methods based on manual processing such as auditing were cumbersome and ineffective due to large-size data or its attributes. Data mining techniques are considered effective in assessing small outliers in large datasets [9,11,12]. Frauds lead to heavy business losses.…”
Section: Credit Card Payment Processingmentioning
confidence: 99%
“…A self-healing neuro-fuzzy anomaly detection approach was proposed to achieve the detection, recovery, and removal of horizontal anomalies in social networks [36]. This scheme was implemented on multiple paradigms and datasets with high detection accuracy and abnormal filtering rate.…”
Section: Security Monitoring and Surveillance Technologymentioning
confidence: 99%
“…The security should be considered in different do-mains to handle attacks and security threats. Various secure architectures have been suggested to support the domain-specific application with the facilities of reliability and efficiency [132]- [134]. But from the research perspective, the adopted architecture should be enabled to follow generalized implementation mechanism within the application domains and sustain the security within the architecture.…”
Section: Secure and Flexible Architecturementioning
confidence: 99%