Asset Details
MbrlCatalogueTitleDetail
Do you wish to reserve the book?
Graph based anomaly detection and description: a survey
by
Koutra, Danai
, Akoglu, Leman
, Tong, Hanghang
in
Algorithms
/ Anomalies
/ Artificial Intelligence
/ Chemistry and Earth Sciences
/ Computer Science
/ Correlation
/ Data mining
/ Data Mining and Knowledge Discovery
/ Datasets
/ Electronic mail systems
/ Excavation
/ Failure
/ Fraud
/ Graph representations
/ Graphs
/ Information Storage and Retrieval
/ Knowledge management
/ Law enforcement
/ Malware
/ Physics
/ Product reviews
/ Social networks
/ Statistics for Engineering
/ Traffic flow
2015
Hey, we have placed the reservation for you!
By the way, why not check out events that you can attend while you pick your title.
You are currently in the queue to collect this book. You will be notified once it is your turn to collect the book.
Oops! Something went wrong.
Looks like we were not able to place the reservation. Kindly try again later.
Are you sure you want to remove the book from the shelf?
Graph based anomaly detection and description: a survey
by
Koutra, Danai
, Akoglu, Leman
, Tong, Hanghang
in
Algorithms
/ Anomalies
/ Artificial Intelligence
/ Chemistry and Earth Sciences
/ Computer Science
/ Correlation
/ Data mining
/ Data Mining and Knowledge Discovery
/ Datasets
/ Electronic mail systems
/ Excavation
/ Failure
/ Fraud
/ Graph representations
/ Graphs
/ Information Storage and Retrieval
/ Knowledge management
/ Law enforcement
/ Malware
/ Physics
/ Product reviews
/ Social networks
/ Statistics for Engineering
/ Traffic flow
2015
Oops! Something went wrong.
While trying to remove the title from your shelf something went wrong :( Kindly try again later!
Do you wish to request the book?
Graph based anomaly detection and description: a survey
by
Koutra, Danai
, Akoglu, Leman
, Tong, Hanghang
in
Algorithms
/ Anomalies
/ Artificial Intelligence
/ Chemistry and Earth Sciences
/ Computer Science
/ Correlation
/ Data mining
/ Data Mining and Knowledge Discovery
/ Datasets
/ Electronic mail systems
/ Excavation
/ Failure
/ Fraud
/ Graph representations
/ Graphs
/ Information Storage and Retrieval
/ Knowledge management
/ Law enforcement
/ Malware
/ Physics
/ Product reviews
/ Social networks
/ Statistics for Engineering
/ Traffic flow
2015
Please be aware that the book you have requested cannot be checked out. If you would like to checkout this book, you can reserve another copy
We have requested the book for you!
Your request is successful and it will be processed during the Library working hours. Please check the status of your request in My Requests.
Oops! Something went wrong.
Looks like we were not able to place your request. Kindly try again later.
Journal Article
Graph based anomaly detection and description: a survey
2015
Request Book From Autostore
and Choose the Collection Method
Overview
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas such as security, finance, health care, and law enforcement. While numerous techniques have been developed in past years for spotting outliers and anomalies in unstructured collections of multi-dimensional points, with graph data becoming ubiquitous, techniques for structured
graph
data have been of focus recently. As objects in graphs have long-range correlations, a suite of novel technology has been developed for anomaly detection in graph data. This survey aims to provide a general, comprehensive, and structured overview of the state-of-the-art methods for anomaly detection in data represented as graphs. As a key contribution, we give a general framework for the algorithms categorized under various settings: unsupervised versus (semi-)supervised approaches, for static versus dynamic graphs, for attributed versus plain graphs. We highlight the effectiveness, scalability, generality, and robustness aspects of the methods. What is more, we stress the importance of anomaly
attribution
and highlight the major techniques that facilitate digging out the root cause, or the ‘why’, of the detected anomalies for further analysis and sense-making. Finally, we present several real-world applications of graph-based anomaly detection in diverse domains, including financial, auction, computer traffic, and social networks. We conclude our survey with a discussion on open theoretical and practical challenges in the field.
Publisher
Springer US,Springer Nature B.V
Subject
This website uses cookies to ensure you get the best experience on our website.