Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống
1
/ 225 trang
THÔNG TIN TÀI LIỆU
Thông tin cơ bản
Định dạng
Số trang
225
Dung lượng
5,36 MB
Nội dung
ANOMALYDETECTIONINONLINESOCIAL NETWORKS: USING DATAMINING TECHNIQUESANDFUZZYLOGIC Reza Hassanzadeh BEng., MSc Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Electrical Engineering and Computer Science Faculty of Science and Engineering Queensland University of Technology November 2014 Keywords AnomalyDetection Clustering-Based Model Distribution-Based Model Expectation Maximization Fuzzy Clustering Fuzzy Inference Engine FuzzyLogic Gaussian Mixture Model Graph-Based AnomalyDetection Membership Function OnlineSocialNetworks Orthogonal Projection Power-Law Regression Model Predictive Model AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic i ii AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic Abstract The OnlineSocialNetworks (OSNs), which captures the structure and dynamics of person-to-person and person-to-technology interaction, is being used for various purposes such as business, education, telemarketing, medical, entertainment This technology also opens the door for unlawful activities Detecting anomalies, in this new perspective of social life that articulates and reflects the off-line relationships, is an important factor as they could be a sign of a significant problem or carrying useful information for the analyser Two types of data can be inferred from OSNs: (1) the behavioural data that considers the dynamic usage behaviour of users; and (2) the structural data that considers the structure of the networks These two types of data can be modelled by graph theory in order to extract meaningful features which can be analysed by appropriate techniques Existing anomalydetectiontechniquesusing graph modelling are limited due to issues such as time and computational complexity, low accuracy, missing value, privacy, and lack of labelled datasets To overcome the existing limitations, we present various hybrid methods that utilise different types of structural input features andtechniques We present these approaches within a multi-layered framework which provides the full requirements needed for finding anomalies inonlinesocialnetworksdata graph, including modelling, algorithms, labelling, and evaluation AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic iii In the first layer of the proposed framework, we model an onlinesocial network with graph theory and compute the various graph features for the nodes in the graph The second layer of the framework includes our methods which tackle the problem of anomalydetectioninonlinesocialnetworks from different angles: distance-based, distribution-based, and clustering-based We use fuzzylogic to define the boundaries of the anomalies as they can be treated as a multiple-valued logic problem in which we have a degree of truth rather than as only two possible values (normal or abnormal) The third layer of our framework is for evaluating the proposed methods using three different and popular OSNs The experiment results show in general that (1) a combination of orthogonal projection and a clustering algorithm can improve the accuracy of the distance-based method, and (2) in terms of increasing accuracy, usingfuzzy based clustering shows better results compared to using hard portioning ones The reason behind the outperformance of the proposed fuzzy-based clustering method is that instances can be members of more than one cluster, with different levels of certainty This contrasts with hard partitioning algorithms such as k-means in which any instances can belong to only a single cluster This means that the fuzzy nature of friendship relations is lost during clustering, which affects the quality of detecting anomalies within the OSNs data Moreover, experiments show the distribution-based method outperforms the accuracy among all other methods, because of the ability to find the natural relationship between instances with the expectation-maximization algorithm and describe the fuzziness of the instances with fuzzylogic The evaluation results are consistent among the three different real-life datasets iv AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic Table of Contents CHAPTER 1: 1.1 1.2 1.3 1.4 1.5 INTRODUCTION MOTIVATION PROBLEM STATEMENT RESEARCH QUESTIONS AND OBJECTIVE 11 CONTRIBUTION TO THE BODY OF KNOWLEDGE 12 OUTLINE OF THE THESIS 16 CHAPTER 2: LITERATURE REVIEW 19 2.1 ANOMALYDETECTION 19 2.1.1 AnomalyDetectionTechniques 20 2.1.1.1 2.1.1.2 2.1.1.3 Supervised AnomalyDetection 22 Semi-supervised AnomalyDetectionTechniques 26 Unsupervised AnomalyDetectionTechniques 26 2.1.2 Reporting AnomalyDetection 28 2.1.3 Summary 28 2.2 ANOMALYDETECTIONANDONLINESOCIALNETWORKS 29 2.2.1 Online behaviours 30 2.2.2 Type Of Anomalies 34 2.2.3 OSNs AnomalyDetection Challenges 36 2.2.3.1 2.2.4 Labelled Dataset 37 AnomalyDetectionIn Graph-Based Data 38 2.2.4.1 2.2.4.2 AnomalyIn Static Large Data Graph 40 Graph Mining Algorithms 42 2.2.5 Summary 48 2.3 CLUSTERING ALGORITHMS 49 2.3.1 Semi-Unsupervised Clustering 51 2.3.2 Unsupervised Clustering 52 2.3.3 Fuzzy Clustering 52 2.3.4 Summary 53 2.4 FUZZYLOGIC 54 2.5 RESEARCH GAP 56 2.6 SUMMARY 58 CHAPTER 3: MULTI-LAYER FRAMEWORK 61 3.1 FRAMEWORK OVERVIEW 62 3.2 LAYER-ONE: PRE-PROCESSING, MODELLING, IDENTIFYING EGONETS, AND SUPER-EGONETS 64 3.2.1 Modelling OSNs Using Graph Theory 65 3.2.2 Features Extraction 67 3.1.1.1 3.1.1.2 3.1.1.3 3.1.1.4 OnlineSocial Network Characteristics 69 Centrality Metrics 72 Community Detection 77 Cliqueness and Starness 79 3.3 LAYER-TWO OVERVIEW: ANOMALYDETECTION ALGORITHMS 79 3.3.1 Layer-Two (a): Distance-Based AnomalyDetectionUsing Graph Metrics 81 3.3.2 Layer-Two (b): Distribution-Based (Statistical-Based) AnomalyDetectionUsing Graph Metrics 82 3.3.3 Layer-Two (c): Clustering-Based Approach Using Graph Metrics 83 AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic v 3.4 LAYER-THREE: EVALUATION 84 3.4.1 Datasets 84 3.4.2 Labelled Dataset 87 3.4.3 Evaluation Measures .90 3.1.1.5 Coefficient Of Determination 91 3.4.4 Benchmark Based On Structural Behaviours In OSNs 92 3.4.5 Find Threshold 93 3.5 SUMMARY .94 CHAPTER 4: ANOMALYDETECTION METHODS 97 4.1 INTRODUCTION 97 4.2 DISTANCE-BASED APPROACH USING GRAPH METRICS AND ORTHOGONAL PROJECTION 100 4.2.1 Method Overview 101 4.2.2 Input-Computing Graph Metrics 102 4.2.3 Compute Regression Model 104 4.2.4 Computing The Distance From Regression Model 106 4.2.5 Compute Orthogonal Projection 107 4.2.6 Fuzzy C-Means (FCM) Clustering 110 4.3 DISTRIBUTION-BASED (STATISTICAL-BASED) APPROACH USING GRAPH METRICS .112 4.3.1 Method Overview 113 4.3.2 Input–Local Graph Properties 115 4.3.3 Clustering Preliminary Anomaly Score With Unsupervised Learning 115 4.3.4 Classification UsingFuzzy Inference Engine 119 4.4 CLUSTERING-BASED ANOMALYDETECTIONIN ONLINE-SOCIAL-NETWORK GRAPHS 124 4.4.1 Method Overview 126 4.4.2 Input To Algorithm 128 4.4.3 Finding Cluster Number Using GMM-EM 128 4.4.4 Clustering UsingFuzzy C-means (FCM) 129 4.4.5 Representing Clusters With Fuzzy Inference Engine 131 4.5 SUMMARY 133 CHAPTER 5: EXPERIMENTS AND DISCUSSIONS 137 5.1 FRAMEWORK .138 5.1.1 Distance-Based Approach 140 5.1.1.1 5.1.1.2 5.1.1.3 5.1.2 Distribution-Based Approach 145 5.1.2.1 5.1.2.2 5.1.3 Experiment Design 140 Power-Law Regression Method Results 143 Orthogonal Projection Method Results 144 Experiment Design 145 Distribution Method Results 148 Clustering-Based Approach 151 5.1.3.1 5.1.3.2 Experiment Design 152 Clustering Method Results 153 5.2 EXPERIMENT RESULTS DISCUSSION 155 5.2.1 Power-Law Degree And Normal Instances Distribution .156 5.2.2 Strengths and Shortcomings of EACH Method 161 5.2.2.1 5.2.2.2 5.2.2.3 5.2.2.4 5.2.3 Performance Comparisons .163 5.2.3.1 5.2.3.2 5.2.3.3 5.2.3.4 5.2.3.5 vi Power-Law Regression Method 161 Orthogonal Projection Method 161 Distribution Method 162 Clustering Method 163 Dealing With AnomalyDetection Challenges 164 Distance-Based Method vs Clustring-Based Method 165 Distribution-Base Method vs Clustring-Based Method 167 Proposed Methods vs Benchmarking 168 Effectiveness Of Clustering And Orthogonal Projection 168 AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic 5.2.3.6 5.3 CHAPTER 6: 6.1 6.2 6.3 6.4 Top Performance Comparisons 169 SUMMARY 172 CONCLUSIONS 175 RESEARCH CONTRIBUTIONS 176 MAIN FINDINGS 179 ANSWERS TO RESEARCH QUESTIONS 183 FUTURE WORK 186 BIBLIOGRAPHY 189 AnomalyDetectionInOnlineSocial Networks: Using data-mining TechniquesandFuzzyLogic vii Bibliography Abe, N., Zadrozny, B., & Langford, J (2006) Outlier Detection by Active Learning In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 504-509) ACM Aggarwal, C C (2013) Outlier Analysis Springer Aggarwal, C C., & Wang, H (2010) Graph Data Management and Mining: A Survey of Algorithms and Applications In Managing andMining Graph Data (pp 13-68) Springer US Aggarwal, C C., & Yu, P S (2001) Outlier Detection for High Dimensional Data ACM SIGMOD Record, 30(2), 37-46 Agrawal, R., Gehrke, J., Gunopulos, D., & Raghavan, P (1998) Automatic Subspace Clustering of High Dimensional Data for DataMining Applications ACM SIGMOD Record, 27(2), 94-105 Agrawal, R., & Srikant, R (1995) Mining Sequential Patterns In Proceedings of the 11th International Conference on Data Engineering (pp 3-14) IEEE Ahmad, M A., Keegan, B., Roy, A., Williams, D., Srivastava, J., & Contractor, N (2013) Guilt by association? Network based propagation approaches for gold farmer detectionIn Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 121-126) Akoglu, L., McGlohon, M., & Faloutsos, C (2010) OddBall: Spotting Anomalies in Weighted Graphs In Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery andDataMining (pp 410-421) Springer Berlin Heidelberg Akoglu, L., Tong, H., Meeder, B., & Faloutsos, C (2012) PICS: Parameter-free Identification of Cohesive Subgroups in Large Attributed Graphs In Proceedings of the 2012 SIAM International Conference on DataMining (pp 439-450) Akoglu, L., Tong, H., Vreeken, J., & Faloutsos, C (2012) Fast and Reliable AnomalyDetectionin Categorical DataIn Proceedings of the 21st ACM International Conference on Information and Knowledge Management (pp 415-424) ACM Amelio, A., & Pizzuti, C (2013) Community miningin signed networks: a multiobjective approach Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Aral, S., & Walker, D (2012) Identifying Influential and Susceptible Members of SocialNetworks Science, 337(6092), 337-341 Awwad Shiekh Hasan, B., & Gan, J (2009) Sequential EM for Unsupervised Adaptive Gaussian Mixture Model Based Classifier In P Perner (Ed.), Chapter 5: Bibliography 189 Machine Learning andDataMiningin Pattern Recognition (Vol 5632, pp 96-106) Springer Berlin Heidelberg Baker, L D., Hofmann, T., McCallum, A K., & Yang, Y (1999) A Hierarchical Probabilistic Model for Novelty Detectionin Text 1999 School of Computer Science Carnegie Mellon University Bandyopadhyay, S., & Maulik, U (2001) Nonparametric Genetic Clustering: Comparison of Validity Indices IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 31(1), 120-125 Bapna, R (2003) When Snipers Become Predators: Can Mechanism Design Save Online Auctions? Communications of the ACM, 46(12), 152-158 Barbara, D., Wu, N., & Jajodia, S (2001) Detecting Novel Network Intrusions using Bayes Estimators In Proceedings of the 1st SIAM International Conference on DataMining (pp 24-29) Citeseer Barnett, V., & Lewis, T (1984) Outliers in Statistical Data (Vol 3) Wiley Basu, S., Bilenko, M., & Mooney, R J (2004) A Probabilistic Framework for Semi-supervised Clustering In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 59-68) ACM Bay, S D., & Pazzani, M J (1999) Detecting Change in Categorical Data: Mining Contrast Sets In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 302-306) ACM Berson, I R (2003) Grooming Cybervictims Journal of School Violence, 2(1), 5-18 Bezdek, J C., & Pal, N R (1998) Some New Indexes of Cluster Validity IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 28(3), 301-315 Bhat, S Y., & Abulaish, M (2013) Community-based features for identifying spammers inonlinesocialnetworks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Bishop, C M (1995) Neural Networks for Pattern Recognition Oxford University Press Blanchard, G., Lee, G., & Scott, C (2010) Semi-supervised novelty detection The Journal of Machine Learning Research, 9999, 2973-3009 Bloedorn, E., Christiansen, A D., Hill, W., Skorupka, C., Talbot, L M., & Tivel, J (2001) Datamining for Network Intrusion Detection: How to Get Started MITRE Technical Report Blum, A L., & Langley, P (1997) Selection of relevant features and examples in machine learning Artificial intelligence, 97(1), 245-271 Bogdanov, P., Busch, M., Moehlis, J., Singh, A K., & Szymanski, B K (2013) The social media genome: Modeling individual topic-specific behavior insocial media In Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 236-242) Bolton, R J., & Hand, D J (2002) Statistical fraud detection: A review Statistical Science, 235-249 190 Bibliography Boriah, S., Chandola, V., & Kumar, V (2008) Similarity Measures for Categorical Data: A Comparative Evaluation In Proceedings of the 2008 SIAM International Conference on DataMining (pp 243-254) Citeseer Bouguessa, M (2011) An Unsupervised Approach for Identifying Spammers inSocialNetworksIn Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI) (pp 832-840) IEEE Boyd, D (2006) Friends, Friendsters, and Myspace Top 8: Writing Community into being on Social Network Sites Boyd, D M., & Ellison, N B (2007) Social Network Sites: Definition, History, and Scholarship Journal of Computer-Mediated Communication, 13(1), 210-230 Boyd, D M., & Ellison, N B (2008) Social Network Sites: Definition, History, and Scholarship Journal of Computer Mediated Communication, 13(1), 210-230 Brahmi, I., Yahia, S B., & Poncelet, P (2010) MAD-IDS: Novel Intrusion Detection System Using Mobile Agents andDataMining Approaches In Intelligence and Security Informatics (pp 73-76) Springer Berlin Heidelberg Breunig, M M., Kriegel, H P., Ng, R T., & Sander, J (2000) LOF: Identifying Density-based Local Outliers ACM SIGMOD Record, 29(2), 93-104 Cao, B., Shen, D., Sun, J.-T., Yang, Q., & Chen, Z (2007) Feature Selection in a Kernel Space In Proceedings of the 24th International Conference on Machine learning (pp 121-128) ACM Centola, D (2010) The Spread of Behavior in an OnlineSocial Network Experiment Science, 329(5996), 1194-1197 Cha, M., Mislove, A., Adams, B., & Gummadi, K (2008) Characterizing Social Cascades in Flickr In Proceedings of the 1st Workshop on OnlineSocialNetworks (pp 13-18) ACM Chakrabarti, D., Faloutsos, C., & McGlohon, M (2010) Graph Mining: Laws and Generators In Managing andMining Graph Data (Vol 40, pp 69-123) Springer US Chan, P K., Mahoney, M V., & Arshad, M H (2003) A machine learning approach to anomalydetection Chandola, V., Banerjee, A., & Kumar, V (2009) Anomaly Detection: A Survey ACM Computer Survey, 41(3), 1-58 Chaudhary, A., Szalay, A S., & Moore, A W (2002) Very Fast Outlier Detectionin Large Multidimensional Data Sets In Proceedings of the ACM SIGMOD Workshop in Research Issues inDataMiningand Knowledge Discovery (DMKD) Chawla, N V., Japkowicz, N., & Kotcz, A (2004) Editorial: Special Issue on Learning from Imbalanced Data Sets ACM SIGKDD Explorations Newsletter, 6(1), 1-6 Chen, C.-H (2009) Handbook of Pattern Recognition and Computer Vision World Scientific Chen, C., Wu, K., Srinivasan, V., & Zhang, X (2013) Battling the internet water army: detection of hidden paid posters Paper presented at Proceedings of Bibliography 191 the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Cherkassky, V., & Mulier, F M (2007) Learning from Data: Concepts, Theory, and Methods Wiley com Chimphlee, W., Abdullah, A H., Sap, M., & Noor, M (2005) Unsupervised AnomalyDetection with Unlabeled Datausing Clustering In Proceedings of the Postgraduate Annual Research Seminar 2005 (pp 249-253) Choo, K.-K R (2009) Online Child Grooming: A Literature Review on the Misuse of Social Networking Sites for Grooming Children for Sexual Offences Retrieved 16 December 2010, URL: http://www.aic.gov.au/en/publications/current%20series/rpp/100120/rpp103.aspx Cornelis, C., Lu, J., Guo, X., & Zhang, G (2007) One-and-Only Item Recommendation with FuzzyLogicTechniques Information Sciences, 177(22), 4906-4921 Dang, X., & Serfling, R (2010) Nonparametric Depth-based Multivariate Outlier Identifiers, and Masking Robustness Properties Journal of Statistical Planning and Inference, 140(1), 198-213 Das, K., & Schneider, J (2007) Detecting Anomalous Records in Categorical Datasets In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 220-229) ACM Dasgupta, D., & Majumdar, N S (2002) AnomalyDetectionin Multidimensional Datausing Negative Selection Algorithm In Proceedings of the Congress on Evolutionary Computation (CEC-2002) (pp 1039–1044) Davis, M., Liu, W., Miller, P., & Redpath, G (2011) Detecting Anomalies in Graphs with Numeric Labels In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (pp 1197-1202) ACM De Stefano, C., Sansone, C., & Vento, M (2002) To reject or Not to Reject: That is the Question-an Answer in Case of Neural Classifiers IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 30(1), 84-94 Dempster, A P., Laird, N M., & Rubin, D B (1977) Maximum Likelihood from Incomplete Data via the EM Algorithm Journal of the Royal Statistical Society Series B (Methodological), 39(1), 1-38 Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., & Crovella, M (2012) Intrusion as (Anti) Social Communication: Characterization andDetectionIn Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 886-894) ACM Duan, L., Xu, L., Liu, Y., & Lee, J (2009) Cluster-based Outlier Detection Annals of Operations Research, 168(1), 151-168 Duffield, N., Haffner, P., Krishnamurthy, B., & Ringberg, H (2009) Rule-based AnomalyDetection on IP Flows In IEEE INFOCOM 2009 (pp 424-432) IEEE 192 Bibliography Eberle, W., & Holder, L (2007) Discovering Structural Anomalies in GraphBased DataIn Proceedings of the 7th IEEE International Conference on DataMining Workshops (pp 393-398) Ester, M., Kriegel, H.-P., Sander, J., & Xu, X (1996) A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise In Proceedings of the 2nd International Conference on Knowledge Discovery andDataMining (pp 226-231) Faloutsos, C (2014) Large graph mining: patterns, cascades, fraud detection, and algorithms In Proceedings of Proceedings of the 23rd international conference on World wide web (pp 1-2) International World Wide Web Conferences Steering Committee Fawcett, T., & Provost, F (1999) Activity Monitoring: Noticing Interesting Changes in Behavior In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Ddiscovery andDataMining (pp 53-62) ACM Fayyad, U., & Irani, K (1993) Multi-Interval Discretization of Continuousvalued Attributes for Classification Learning In Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI-93) (pp 1022-1027) Morgan Kaufmann Flake, G W., Tarjan, R E., & Tsioutsiouliklis, K (2004) Graph Clustering and Minimum Cut Trees Internet Mathematics, 1(4), 385-408 Fortunato, S (2010) Community Detectionin Graphs Physics Reports, 486(3–5), 75-174 Fortunato, S., Latora, V., & Marchiori, M (2004) Method to Find Community Structures based on Information Centrality Physical Review E, 70(5), 056104 Freeman, L C (1979) Centrality inSocialNetworks Conceptual Clarification Social Networks, 1(3), 215-239 Friedkin, N E (1991) Theoretical Foundations for Centrality Measures American Journal of Sociology, 96(1991), 1478-1504 Fujimaki, R., Yairi, T., & Machida, K (2005) An Approach to Spacecraft AnomalyDetection Problem using Kernel Feature Space In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery inDataMining (pp 401-410) ACM Gama, J., Medas, P., Castillo, G., & Rodrigues, P (2004) Learning with Drift DetectionIn A C Bazzan & S Labidi (Eds.), Advances in Artificial Intelligence – SBIA 2004 (Vol 3171, pp 286-295) Springer Berlin Heidelberg Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., & Han, J (2010) On Community Outliers and Their Efficient Detectionin Information NetworksIn Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 813-822) ACM Gath, I., & Geva, A B (1989) Unsupervised Optimal Fuzzy Clustering IEEE Transactions on Pattern Analysis and Machine Intelligence 11(7), 773780 Ghasemi, A., Rabiee, H R., Fadaee, M., Manzuri, M T., & Rohban, M H (2011) Active Learning from Positive and Unlabeled DataIn Bibliography 193 Proceedings of the 11th IEEE International Conference on DataMining Workshops (ICDMW) (pp 244-250) IEEE Ghoting, A., Parthasarathy, S., & Otey, M (2008) Fast Mining of Distance-based Outliers in High-dimensional Datasets DataMiningand Knowledge Discovery, 16(3), 349-364 Gjoka, M., Kurant, M., Butts, C T., & Markopoulou, A (2010) Walking in Facebook: A case study of unbiased sampling of OSNs In Proceedings of INFOCOM, 2010 Proceedings IEEE (pp 1-9) IEEE Gogoi, P., Borah, B., & Bhattacharyyac, D (2011) Supervised AnomalyDetectionusing Clustering-based Normal Behaviour Modeling International Journal of Advances in Engineering Sciences, 1(1), 12-17 Goudarzi, P., & Hassanzadeh, R (2006) A GA-based Fuzzy Rate Allocation Algorithm In Proceedings of IEEE International Conference on Communications (ICC '06) (pp 1-5) IEEE Grira, N., Crucianu, M., & Boujemaa, N (2004) Unsupervised and Semisupervised Clustering: A Brief Survey A review of machine learning techniques for processing multimedia content, Report of the MUSCLE European Network of Excellence (FP6) Gross, R., & Acquisti, A (2005) Information Revelation and Privacy inOnlineSocialNetworksIn Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (pp 71-80) ACM Grünwald, P D., Myung, I J., & Pitt, M A (2005) Advances in Minimum Description Length: Theory and Applications MIT press Gunasekara, R C., Mehrotra, K., & Mohan, C K (2013) Multi-objective restructuring insocialnetworksIn Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 277-281) Guo, T., & Li, G Y (2008) Neural DataMining for Credit Card Fraud DetectionIn Proceedings of the 2008 International Conference on Machine Learning and Cybernetics (pp 3630-3634) Gupta, A., Sycara, K P., Gordon, G J., & Hefny, A (2013) Exploring friend's influence in cultures in Twitter In Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 584-591) Gupta, M., Jing, G., Xifeng, Y., Cam, H., & Jiawei, H (2013) On detecting Association-Based Clique Outliers in heterogeneous information networksIn Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 108-115) Guthrie, D., Guthrie, L., Allison, B., & Wilks, Y (2007) Unsupervised AnomalyDetectionIn Proceedings of the 20th International Joint Conference on Artifical Intelligence (pp 1624-1628) Morgan Kaufmann Publishers Inc Halkidi, M., Batistakis, Y., & Vazirgiannis, M (2002a) Cluster Validity Methods: Part I ACM SIGMOD Record, 31(2), 40-45 Halkidi, M., Batistakis, Y., & Vazirgiannis, M (2002b) Clustering Validity Checking Methods: Part II ACM SIGMOD Record, 31(3), 19-27 194 Bibliography Hampton, K., Goulet, L S., Marlow, C., & Rainie, L (2012) Why Most Facebook Users Get More Than They Give Pew Internet & American Life Project Hanneman, R A (2013) Introduction to Social Network Methods Retrieved July 2013, URL: http://faculty.ucr.edu/~hanneman/nettext/C9_Ego_networks.html Hartigan, J A., & Wong, M A (1979) Algorithm AS 136: A K-means Clustering Algorithm Journal of the Royal Statistical Society Series C (Applied Statistics), 28(1), 100-108 Hawkins, D M (1980) Identification of Outliers (Vol 11) Chapman and Hall Hawkins, S., He, H., Williams, G., & Baxter, R (2002) Outlier Detectionusing Replicator Neural NetworksInData Warehousing and Knowledge Discovery (pp 170-180) Springer Berlin Heidelberg Haythornthwaite, C (2005) SocialNetworksand Internet Connectivity Effects Information, Communication & Society, 8(2), 125-147 He, R., & Zheng, T (2013) Estimation of exponential random graph models for large socialnetworks via graph limits Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada He, Z., Xu, X., & Deng, S (2003) Discovering Cluster-based Local Outliers Pattern Recognition Letters, 24(9–10), 1641-1650 Henderson, K., Gallagher, B., Li, L., Akoglu, L., Eliassi-Rad, T., Tong, H., & Faloutsos, C (2011) It's Who You Know: Graph Miningusing Recursive Structural Features In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 663-671) ACM Hitchcock, J A (2007) Cyberbullies, Online Predators, and What to Do about Them Multimedia and Internet@Schools, 14(3), 13-15 Hodge, M J (2006) The Fourth Amendment and Privacy Issues on the New Internet: Facebook com and Myspace com S Ill ULJ, 31(2006), 95-123 Hodge, V J., & Austin, J (2004) A Survey of Outlier Detection Methodologies Artificial Intelligence Review, 22(2), 85-126 Holder, L B., & Cook, D J (2009) Graph-Based DataMining Encyclopedia of Data Warehousing and Mining, 2(2009), 943-949 Hu, H., & Wang, X (2009) Evolution of a large onlinesocial network Physics Letters A, 373(12–13), 1105-1110 Hu, R., Mac Namee, B., & Delany, S J (2008) Sweetening the Dataset: Using Active Learning to Label Unlabelled Datasets In Proceedings of the 19th Irish Conference on Artificial Intelligence and Cognitive Science (AICS '08) Hu, W., Liao, Y., & Vemuri, V (2003) Robust AnomalyDetectionusing Support Vector Machines In Proceedings of the International Conference on Machine Learning (pp 592-597) Morgan Kaufmann Publishers Inc Huan, L., & Lei, Y (2005) Toward integrating feature selection algorithms for classification and clustering IEEE Transactions on Knowledge andData Engineering, 17(4), 491-502 Bibliography 195 Idrsi, B S N B., & Shanmugam, B (2006) Anomaly Intrusion Detection based on FuzzyLogicandDataMiningIn Proceedings of Proceedings of the Postgraduate Annual Research Seminar (pp 147) Jain, A K., & Dubes, R C (1988) Algorithms for Clustering Data Prentice-Hall, Inc Jain, A K., Murty, M N., & Flynn, P J (1999) Data Clustering: A Review ACM Computing Surveys (CSUR), 31(3), 264-323 Janakiram, D., Reddy, A M., & Kumar, A V U P (2006) Outlier Detectionin Wireless Sensor Networksusing Bayesian Belief NetworksIn Proceedings of the 1st International Conference on Communication Systems Software and Middleware (pp 1-6) IEEE Jimeng, S., Huiming, Q., Chakrabarti, D., & Faloutsos, C (2005) Neighborhood Formation andAnomalyDetectionin Bipartite Graphs In Proceedings of the 5th IEEE International Conference on DataMining (pp 1-8) Johnson, R A., & Wichern, D W (2002) Applied Multivariate Statistical Analysis Prentice Hall Johnson, T., Kwok, I., & Ng, R (1998) Fast Computation of 2-dimensional Depth Contours In Proceedings of the 4th International Conference on Knowledge Discovery andDataMining (KDD) (pp 224-228) AAAI Press Joshi, M V., Agarwal, R C., & Kumar, V (2001) Mining Needle in a Haystack: Classifying Rare Classes via Two-phase Rule Induction In Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data (pp 91-102) ACM Joshi, M V., Agarwal, R C., & Kumar, V (2002) Predicting Rare Classes: Can Boosting Make Any Weak Learner Strong? In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 297-306) ACM Jyothsna, V., Prasad, V., & Prasad, K M (2011) A Review of Anomaly based Intrusion Detection Systems International Journal of Computer Applications, 28 Kadushin, C (2012) Understanding Social Networks: Theories, Concepts, and Findings Oxford University Press Karger, D R (1999) Random Sampling in Cut, Flow, and Network Design Problems Mathematics of Operations Research, 24(2), 383-413 Kas, M., Wachs, M., Carley, K M., & Carley, L R (2013) Incremental algorithm for updating betweenness centrality in dynamically growing networksIn Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 33-40) Kashima, H., & Inokuchi, A (2002) Kernels for Graph Classification In Proceedings of International Conference DataMining Workshop on Active Mining (AM-2002) (pp 31-36) Citeseer Kleinberg, J (2003) An Impossibility Theorem for Clustering In Advances in Neural Information Processing Systems (pp 463-470) Knorr, E M., & Ng, R T (1997) A Unified Notion of Outliers: Properties and Computation In Proceedings of KDD-97 (pp 219-222) 196 Bibliography Knorr, E M., Ng, R T., & Tucakov, V (2000) Distance-based Outliers: Algorithms and Applications The VLDB Journal, 8(3-4), 237-253 Knox, E M., & Ng, R T (1998) Algorithms for Mining Distance-based Outliers in Large Datasets In Proceedings of the International Conference on Very Large Data Bases (pp 392-403) Citeseer Kondor, R I., & Lafferty, J (2002) Diffusion Kernels on Graphs and Other Discrete Input Spaces In Proceedings of the 19th International Conference on Machine Learning (ICML-02) (pp 315-322) Kontkanen, P., & Myllymäki, P (2007) MDL Histogram Density Estimation In Proceedings of International Conference on Artificial Intelligence and Statistics (pp 219-226) Kumar, M N., & Sheshadri, H S (2012) On the Classification of Imbalanced Datasets International Journal of Computer Applications, 44(8), 1-7 Kumar, R., Novak, J., & Tomkins, A (2010) Structure and evolution of onlinesocialnetworksIn Link Mining: Models, Algorithms, and Applications (pp 337-357) Springer Kuramochi, M., & Karypis, G (2001) Frequent Subgraph Discovery In Proceedings of IEEE International Conference on DataMining (pp 313320) IEEE Laleh, N., & Azgomi, M A (2009) A Taxonomy of Frauds and Fraud DetectionTechniquesIn Information Systems, Technology and Management (pp 256-267) Springer Lee, W., & Stolfo, S J (2000) Datamining approaches for intrusion detection Defense Technical Information Center Leung, Y., Zhang, J.-S., & Xu, Z.-B (2000) Clustering by Scale-Space Filtering IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(12), 1396-1410 Levine, E., & Domany, E (2001) Resampling Method for Unsupervised Estimation of Cluster Validity Neural computation, 13(11), 2573-2593 Li, H., Nie, Z., Lee, W.-C., Giles, L., & Wen, J.-R (2008) Scalable Community Discovery on Textual Data with Relations In Proceedings of the 17th ACM Conference on Information and Knowledge Management (pp 12031212) ACM Limsaiprom, P., & Tantatsanawong, P (2010) Social Network Anomalyand Attack Patterns Analysis In Proceedings of the 6th International Conference on Networked Computing (INC) (pp 1-6) Ling, W., Zhi-Chun, M., & Dong-Mei, F (2008) Fuzzy Rule Modeling based on FCM and Support Vector Regression In Proceedings of the 7th International Conference on Machine Learning and Cybernetics (pp 1789-1794) Liu, B., Li, X., Lee, W S., & Yu, P S (2004) Text classification by labeling words In Proceedings of AAAI (pp 425-430) Liu, D., Lung, C.-H., Lambadaris, I., & Seddigh, N (2013) Network Traffic AnomalyDetectionusing Clustering Techniquesand Performance Comparison In Proceedings of the 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (pp 1-4) Luo, M., Wang, L.-n., & Zhang, H.-g (2003) An Unsupervised Clustering-based Intrusion Detection Method Acta Electronica Sinica, 31(11), 1713-1716 Bibliography 197 Ma, J., & Perkins, S (2003) Online Novelty Detection on Temporal Sequences In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 613-618) ACM Mahadevan, V., Weixin, L., Bhalodia, V., & Vasconcelos, N (2010) Anomalydetectionin crowded scenes In Proceedings of 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (pp 1975-1981) Mamdani, E H., & Assilian, S (1975) An Experiment in Linguistic Synthesis with A FuzzyLogic Controller International Journal of Man-Machine Studies, 7(1), 1-13 McGloin, J., & Kirk, D (2010) An Overview of Social Network Analysis Journal of Criminal Justice Education, 21(2), 169-181 Mislove, A., Marcon, M., Gummadi, K., Druschel, P., & Bhattacharjee, B (2007) Measurement and Analysis of OnlineSocialNetworksIn Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (pp 2942) ACM Moon, T K (1996) The Expectation-Maximization Algorithm IEEE Signal processing magazine, 13(6), 47-60 Moonesignhe, H., & Tan, P.-N (2006) Outlier Detectionusing Random Walks In Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06) (pp 532-539) IEEE Müller, E., Assent, I., Iglesias, P., Mülle, Y., & Böhm, K (2012) Outlier Ranking via Subspace Analysis in Multiple Views of the DataIn Proceedings of the 12th IEEE International Conference on DataMining (pp 529-538) IEEE Müller, E., Schiffer, M., & Seidl, T (2010) Adaptive Outlierness for Subspace Outlier Ranking In Proceedings of the 19th ACM International Conference on Information and Knowledge Management (pp 1629-1632) ACM Natarajan, N., Sen, P., & Chaoji, V (2013) Community detectionin contentsharing socialnetworks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Newman, M E., Watts, D J., & Strogatz, S H (2002) Random Graph Models of SocialNetworks Proceedings of the National Academy of Sciences of the United States of America, 99(Suppl 1), 2566-2572 Newman, M E J (2003) The Structure and Function of Complex Networks SIAM review, 45(2), 167-256 Newman, M E J (2006) Modularity and Community Structure inNetworks Proceedings of the National Academy of Sciences, 103(23), 8577-8582 Ng, A (2012, 12 July 2012) Lecture of Artificial Intelligence Machine Learning Retrieved 12 July 2012, URL: http://see.stanford.edu/see/lecturelist.aspx?coll=348ca38a-3a6d-4052937d-cb017338d7b1 Nguyen, N P., Alim, M A., Yilin, S., & Thai, M T (2013) Assessing network vulnerability in a community structure point of view In Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 231-235) 198 Bibliography Noble, C C., & Cook, D J (2003) Graph-based anomalydetectionIn Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 631-636) ACM Noto, K., Brodley, C., & Slonim, D (2010) AnomalyDetectionusing an Ensemble of Feature Models In Proceedings of the 10th IEEE International Conference on DataMining (pp 953-958) IEEE O'Banion, S., & Birnbaum, L (2013) Using explicit linguistic expressions of preference insocial media to predict voting behavior In Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 207-214) O'Madadhain, J., Hutchins, J., & Smyth, P (2005) Prediction and ranking algorithms for event-based network data SIGKDD Explor Newsl., 7(2), 23-30 Ovelgonne, M (2013) Distributed community detectionin web-scale networksIn Proceedings of Advances inSocialNetworks Analysis andMining (ASONAM), 2013 IEEE/ACM International Conference on (pp 66-73) Pal, N R., & Bezdek, J C (1995) On cluster validity for the fuzzy c-means model Fuzzy Systems, IEEE Transactions on, 3(3), 370-379 Papacharissi, Z (2010) A Networked Self: Identity, Community, and Culture on Social Network Sites Taylor and Francis Papadimitriou, S., Kitagawa, H., Gibbons, P B., & Faloutsos, C (2003) LOCI: Fast Outlier Detectionusing the Local Correlation Integral In Proceedings of the 19th International Conference on Data Engineering (pp 315-326) Patcha, A., & Park, J.-M (2007) An overview of anomalydetection techniques: Existing solutions and latest technological trends Computer Networks, 51(12), 3448-3470 Pfeiffer III, J J., & Neville, J (2011) Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure In Proceedings of the 5th International AAAI Conference on Weblogs andSocial Media (ICWSM) (pp 590-593) Phua, C., Lee, V., Smith, K., & Gayler, R (2010) A Comprehensive Survey of Data Mining-based Fraud Detection Research arXiv preprint arXiv:1009.6119 Qayyum, A., Islam, M H., & Jamil, M (2005) Taxonomy of Statistical based AnomalyDetectionTechniques for Intrusion DetectionIn Proceedings of the IEEE Symposium on Emerging Technologies (pp 270-276) IEEE Qin, M., & Hwang, K (2004) Frequent Episode Rules for Internet AnomalyDetectionIn Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (pp 161-168) IEEE Ratsch, G., Mika, S., Scholkopf, B., & Muller, K R (2002) Constructing Boosting Algorithms from SVMs: An Application to One-class Classification IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(9), 1184-1199 Riketta, M., & Nienaber, S (2007) Multiple Identities and Work Motivation: The Role of Perceived Compatibility between Nested Organizational Units British Journal of Management, 18(s1), S61-S77 Rissanen, J (1989) Stochastic Complexity in Statistical Inquiry Theory World Scientific Publishing Co., Inc Bibliography 199 Rossi, R A., McDowell, L K., Aha, D W., & Neville, J (2012) Transforming Graph Data for Statistical Relational Learning Journal of Artificial Intelligence Research, 45(1), 363-441 Roth, V (2005) Outlier Detection with One-class Kernel Fisher Discriminants In Advances in Neural Information Processing Systems (pp 1169-1176) Roth, V (2006) Kernel Fisher Discriminants for Outlier Detection Neural computation, 18(4), 942-960 Rozen, D., Askalani, M., & Senn, T (2012 ) Identifying, Understanding and Influencing Social Media Users Retrieved 21 June 2013, URL: http://socialmediatoday.com/pamdyer/564409/6-types-social-media-users Salvador, S., Chan, P., & Brodie, J (2004) Learning States and Rules for Time Series AnomalyDetectionIn Proceedings of the 17th International FLAIRS Conference (pp 300-305) Schölkopf, B., Platt, J C., Shawe-Taylor, J., Smola, A J., & Williamson, R C (2001) Estimating the Support of a High-dimensional Distribution Neural computation, 13(7), 1443-1471 Sebyala, A A., Olukemi, T., & Sacks, L (2002) Active Platform Security through Intrusion Detectionusing Naive Bayesian Network for AnomalyDetectionIn Proceedings of London Communications Symposium Citeseer Shanbhag, S., & Wolf, T (2009) AnomBench: A Benchmark for Volume-Based Internet AnomalyDetectionIn Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp 1-6) IEEE Sharma, K G., Ram, A., & Singh, Y (2011) Efficient Density Based Outlier Handling Technique inDataMiningIn Advances in Computer Science and Information Technology (pp 542-550) Springer Shekhar, S., Lu, C.-T., & Zhang, P (2001) Detecting Graph-based Spatial Outliers: Algorithms and Applications (A Summary of Results) In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery andDataMining ACM Shrivastava, N., Majumder, A., & Rastogi, R (2008) Mining (Social) Network Graphs to Detect Random Link Attacks In Proceedings of the 24th IEEE International Conference on Data Engineering (pp 486-495) IEEE Silva, J., & Willett, R (2008) Detection of anomalous meetings in a social network In Proceedings of the 42nd Annual Conference on Information Sciences and Systems (pp 636-641) Sims, B H., Sinitsyn, N., & Eidenbenz, S J (2013) Visualization and modeling of structural features of a large organizational email network Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Singh, K., & Upadhyaya, S (2012) Outlier Detection: Applications AndTechniques International Journal of Computer Science Issues (IJCSI), 9(1) Snijders, T A B (2011) Statistical Models for SocialNetworks Annual Review of Sociology, 37(1), 131-153 200 Bibliography Solberg, H E., & Lahti, A (2005) Detection of Outliers in Reference Distributions: Performance of Horn’s Algorithm Clinical chemistry, 51(12), 2326-2332 Song, Q., Hu, W J., & Xie, W F (2002) Robust Support Vector Machine with Bullet Hole Image Classification IEEE Transactions on Systems Man and Cybernetics, Part C: Applications and Reviews, 32(4), 440-448 Song, X., Wu, M., Jermaine, C., & Ranka, S (2007) Conditional AnomalyDetection IEEE Transactions on Knowledge andData Engineering, 19(5), 631-645 Stibor, T., Timmis, J., & Eckert, C (2005) A Comparative Study of Real-Valued Negative Selection to Statistical AnomalyDetectionTechniquesIn Artificial Immune Systems (Vol 3627, pp 262-275) Springer Berlin Heidelberg Strogatz, S H (2001) Exploring Complex Networks Nature, 410(6825), 268276 Su, X., & Tsai, C L (2011) Outlier Detection Wiley Interdisciplinary Reviews: DataMiningand Knowledge Discovery, 1(3), 261-268 Subbian, K., Sharma, D., Wen, Z., & Srivastava, J (2013) Finding influencers innetworksusingsocial capital Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Subrahmanyam, K., Reich, S M., Waechter, N., & Espinoza, G (2008) Onlineand offline social networks: Use of social networking sites by emerging adults Journal of Applied Developmental Psychology, 29(6), 420-433 Sundén, J (2003) Material Virtualities: Approaching Online Textual Embodiment (Vol 13) Peter Lang Publishing Takaffoli, M., Rabbany, R., Za, O R., #239, & ane (2013) Incremental local community identification in dynamic socialnetworks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Tan, P N., Steinbach, M., & Kumar, V (2005) Introduction to datamining Pearson Addison Wesley Tandon, G., & Chan, P K (2007) Weighting versus Pruning in Rule Validation for Detecting Network and Host Anomalies In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 697-706) ACM Tang, L (2012) Online Friendship In Encyclopedia of Cyber Behavior (pp 412421) Thelwall, M (2008) Social Networks, Gender, and Friending: An Analysis of MySpace Member Profiles Journal of the American Society for Information Science and Technology, 59(8), 1321-1330 Tong, H., & Lin, C.-Y (2011) Non-negative Residual Matrix Factorization with Application to Graph AnomalyDetectionIn Proceedings of the 11th SIAM International Conference on DataMining (pp 143-153) Ugander, J., Karrer, B., Backstrom, L., & Marlow, C (2011) The Anatomy of the Facebook Social Graph arXiv preprint arXiv:1111.4503 Bibliography 201 Vapnik, V N (2000) The Nature of Statistical Learning Theory (2 ed.) Springer Verlag Viswanath, B., Mislove, A., Cha, M., & Gummadi, K P (2009) On the Evolution of User Interaction in Facebook In Proceedings of the 2nd ACM Workshop on OnlineSocialNetworks (pp 37-42) ACM Wang, G., Hao, J., Ma, J., & Huang, L (2010) A New Approach to Intrusion Detectionusing Artificial Neural NetworksandFuzzy Clustering Expert Systems with Applications, 37(9), 6225-6232 Wang, H., & Lu, J (2013) Detect inflated follower numbers in OSN using star sampling Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Wang, W., Yang, J., & Muntz, R (1997) STING: A Statistical Information Grid Approach to Spatial DataMiningIn Proceedings of the International Conference on Very Large Data Bases (pp 186-195) IEEE Wang, X., Mohanty, N., & McCallum, A (2006) Group and Topic Discovery from Relations and Their Attributes In Advances in Neural Information Processing Systems (Vol 18, pp 1449-1456) MIT Press Wasserman, S., & Faust, K (1994) Social Network Analysis in the Socialand Behavioral Sciences [B] InSocial Network Analysis: Methods and Applications (pp 1-27) Cambridge University Press Webb, A R (2003) Statistical pattern recognition Wiley com Wolak, J., Finkelhor, D., Mitchell, K J., & Ybarra, M L (2010) Online “Predators” and Their Victims Psychology of Violence, 1(2010), 13-35 Wong, W.-K., Moore, A., Cooper, G., & Wagner, M (2002) Rule-based Anomaly Pattern Detection for Detecting Disease Outbreaks In Proceedings of the 18th National Conference on Artificial Intelligence (AAAI 2002) (pp 217-223) Xia, P., Ribeiro, B., Chen, C., Liu, B., & Towsley, D (2013) A study of user behavior on an online dating site Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Xiang, R., Neville, J., & Rogati, M (2010) Modeling Relationship Strength inOnlineSocialNetworksIn Proceedings of the 19th International Conference on World Wide Web (pp 981-990) ACM Xu, R., & Wunsch, D (2005) Survey of Clustering Algorithms IEEE Transactions on Neural Networks, 16(3), 645-678 Xu, X., Yuruk, N., Feng, Z., & Schweiger, T A (2007) SCAN: A Structural Clustering Algorithm for NetworksIn Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 824-833) ACM Xue, Z., Shang, Y., & Feng, A (2010) Semi-Supervised Outlier Detection based on Fuzzy Rough C-Means Clustering Mathematics and Computers in Simulation, 80(9), 1911-1921 Yairi, T., Kato, Y., & Hori, K (2001) Fault Detection by Mining Association Rules from House-keeping DataIn Proceedings of International Symposium on Artificial Intelligence, Robotics and Automation in Space Citeseer 202 Bibliography Yalamanchili, H K., Jain, R., & Parekh, N (2009) Identifying Structural Repeats in Proteins using Graph Centrality Measures In Proceedings of World Congress on Nature & Biologically Inspired Computing (NaBIC 2009) (pp 110-115) Yang, J., & Leskovec, J (2012) Defining and evaluating network communities based on ground-truth Paper presented at Proceedings of the ACM SIGKDD Workshop on MiningData Semantics, Beijing, China Yang, T., Comar, P M., & Xu, L (2013) Community detection by popularity based models for authored networked data Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Yang, T., Jin, R., Chi, Y., & Zhu, S (2009) Combining Link and Content for Community Detection: A Discriminative Approach In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery andDataMining (pp 927-936) ACM Yang, Y., Guo, Y C., & Ma, Y N (2010) Characterization of Communities inOnlineSocial Network In Proceedings of Cross-Strait Conference on Information Science and Technology (pp 600-605) Ye, W., Parthasarathy, S., & Tatikonda, S (2011) Locality Sensitive Outlier Detection: A Ranking Driven Approach In Proceedings of the 27th IEEE International Conference onData Engineering (ICDE) (pp 410-421) IEEE Zadeh, L A (1965) Fuzzy Sets Information and Control, 8(3), 338-353 Zellag, K., & Kemme, B Consistency anomalies in multi-tier architectures: automatic detectionand prevention The VLDB Journal, 1-26 Zellag, K., & Kemme, B (2014) Consistency Anomalies in Multi-tier Architectures: Automatic Detectionand Prevention The VLDB Journal, 23(1), 147-172 Zhang, K., Downey, D., Chen, Z., Xie, Y., Cheng, Y., Agrawal, A., Choudhary, A (2013) A probabilistic graphical model for brand reputation assessment insocialnetworks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances inSocialNetworks Analysis and Mining, Niagara, Ontario, Canada Zhang, X., Zhu, J., Wang, Q., & Zhao, H (2013) Identifying Influential Nodes in Complex Networks with Community Structure Knowledge-Based Systems, 42(2013), 74-84 Zhong, S., Khoshgoftaar, T M., & Seliya, N (2007) Clustering-based Network Intrusion Detection International Journal of Reliability, Quality and safety Engineering, 14(2), 169-187 Zhu, C., Kitagawa, H., Papadimitriou, S., & Faloutsos, C (2011) Outlier Detection by Example Journal of Intelligent Information Systems, 36(2), 217-247 Zuckerman, E W., & Jost, J T (2001) What Makes You Think You're so Popular? Self-Evaluation Maintenance and the Subjective Side of the" Friendship Paradox" Social Psychology Quarterly, 64(3), 207-223 Bibliography 203 ... networks data graph, including modelling, algorithms, labelling, and evaluation Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic iii In the first layer... Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic Abstract The Online Social Networks (OSNs), which captures the structure and dynamics of person-to-person and. .. Function Online Social Networks Orthogonal Projection Power-Law Regression Model Predictive Model Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic i ii Anomaly