1. Trang chủ
  2. » Ngoại Ngữ

Anomaly detection in online social networks using data mining techniques and fuzzy logic

225 221 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Định dạng
Số trang 225
Dung lượng 5,36 MB

Nội dung

ANOMALY DETECTION IN ONLINE SOCIAL NETWORKS: USING DATAMINING TECHNIQUES AND FUZZY LOGIC Reza Hassanzadeh BEng., MSc Submitted in fulfilment of the requirements for the degree of Doctor of Philosophy School of Electrical Engineering and Computer Science Faculty of Science and Engineering Queensland University of Technology November 2014 Keywords Anomaly Detection Clustering-Based Model Distribution-Based Model Expectation Maximization Fuzzy Clustering Fuzzy Inference Engine Fuzzy Logic Gaussian Mixture Model Graph-Based Anomaly Detection Membership Function Online Social Networks Orthogonal Projection Power-Law Regression Model Predictive Model Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic i ii Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic Abstract The Online Social Networks (OSNs), which captures the structure and dynamics of person-to-person and person-to-technology interaction, is being used for various purposes such as business, education, telemarketing, medical, entertainment This technology also opens the door for unlawful activities Detecting anomalies, in this new perspective of social life that articulates and reflects the off-line relationships, is an important factor as they could be a sign of a significant problem or carrying useful information for the analyser Two types of data can be inferred from OSNs: (1) the behavioural data that considers the dynamic usage behaviour of users; and (2) the structural data that considers the structure of the networks These two types of data can be modelled by graph theory in order to extract meaningful features which can be analysed by appropriate techniques Existing anomaly detection techniques using graph modelling are limited due to issues such as time and computational complexity, low accuracy, missing value, privacy, and lack of labelled datasets To overcome the existing limitations, we present various hybrid methods that utilise different types of structural input features and techniques We present these approaches within a multi-layered framework which provides the full requirements needed for finding anomalies in online social networks data graph, including modelling, algorithms, labelling, and evaluation Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic iii In the first layer of the proposed framework, we model an online social network with graph theory and compute the various graph features for the nodes in the graph The second layer of the framework includes our methods which tackle the problem of anomaly detection in online social networks from different angles: distance-based, distribution-based, and clustering-based We use fuzzy logic to define the boundaries of the anomalies as they can be treated as a multiple-valued logic problem in which we have a degree of truth rather than as only two possible values (normal or abnormal) The third layer of our framework is for evaluating the proposed methods using three different and popular OSNs The experiment results show in general that (1) a combination of orthogonal projection and a clustering algorithm can improve the accuracy of the distance-based method, and (2) in terms of increasing accuracy, using fuzzy based clustering shows better results compared to using hard portioning ones The reason behind the outperformance of the proposed fuzzy-based clustering method is that instances can be members of more than one cluster, with different levels of certainty This contrasts with hard partitioning algorithms such as k-means in which any instances can belong to only a single cluster This means that the fuzzy nature of friendship relations is lost during clustering, which affects the quality of detecting anomalies within the OSNs data Moreover, experiments show the distribution-based method outperforms the accuracy among all other methods, because of the ability to find the natural relationship between instances with the expectation-maximization algorithm and describe the fuzziness of the instances with fuzzy logic The evaluation results are consistent among the three different real-life datasets iv Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic Table of Contents CHAPTER 1: 1.1 1.2 1.3 1.4 1.5 INTRODUCTION MOTIVATION PROBLEM STATEMENT RESEARCH QUESTIONS AND OBJECTIVE 11 CONTRIBUTION TO THE BODY OF KNOWLEDGE 12 OUTLINE OF THE THESIS 16 CHAPTER 2: LITERATURE REVIEW 19 2.1 ANOMALY DETECTION 19 2.1.1 Anomaly Detection Techniques 20 2.1.1.1 2.1.1.2 2.1.1.3 Supervised Anomaly Detection 22 Semi-supervised Anomaly Detection Techniques 26 Unsupervised Anomaly Detection Techniques 26 2.1.2 Reporting Anomaly Detection 28 2.1.3 Summary 28 2.2 ANOMALY DETECTION AND ONLINE SOCIAL NETWORKS 29 2.2.1 Online behaviours 30 2.2.2 Type Of Anomalies 34 2.2.3 OSNs Anomaly Detection Challenges 36 2.2.3.1 2.2.4 Labelled Dataset 37 Anomaly Detection In Graph-Based Data 38 2.2.4.1 2.2.4.2 Anomaly In Static Large Data Graph 40 Graph Mining Algorithms 42 2.2.5 Summary 48 2.3 CLUSTERING ALGORITHMS 49 2.3.1 Semi-Unsupervised Clustering 51 2.3.2 Unsupervised Clustering 52 2.3.3 Fuzzy Clustering 52 2.3.4 Summary 53 2.4 FUZZY LOGIC 54 2.5 RESEARCH GAP 56 2.6 SUMMARY 58 CHAPTER 3: MULTI-LAYER FRAMEWORK 61 3.1 FRAMEWORK OVERVIEW 62 3.2 LAYER-ONE: PRE-PROCESSING, MODELLING, IDENTIFYING EGONETS, AND SUPER-EGONETS 64 3.2.1 Modelling OSNs Using Graph Theory 65 3.2.2 Features Extraction 67 3.1.1.1 3.1.1.2 3.1.1.3 3.1.1.4 Online Social Network Characteristics 69 Centrality Metrics 72 Community Detection 77 Cliqueness and Starness 79 3.3 LAYER-TWO OVERVIEW: ANOMALY DETECTION ALGORITHMS 79 3.3.1 Layer-Two (a): Distance-Based Anomaly Detection Using Graph Metrics 81 3.3.2 Layer-Two (b): Distribution-Based (Statistical-Based) Anomaly Detection Using Graph Metrics 82 3.3.3 Layer-Two (c): Clustering-Based Approach Using Graph Metrics 83 Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic v 3.4 LAYER-THREE: EVALUATION 84 3.4.1 Datasets 84 3.4.2 Labelled Dataset 87 3.4.3 Evaluation Measures .90 3.1.1.5 Coefficient Of Determination 91 3.4.4 Benchmark Based On Structural Behaviours In OSNs 92 3.4.5 Find Threshold 93 3.5 SUMMARY .94 CHAPTER 4: ANOMALY DETECTION METHODS 97 4.1 INTRODUCTION 97 4.2 DISTANCE-BASED APPROACH USING GRAPH METRICS AND ORTHOGONAL PROJECTION 100 4.2.1 Method Overview 101 4.2.2 Input-Computing Graph Metrics 102 4.2.3 Compute Regression Model 104 4.2.4 Computing The Distance From Regression Model 106 4.2.5 Compute Orthogonal Projection 107 4.2.6 Fuzzy C-Means (FCM) Clustering 110 4.3 DISTRIBUTION-BASED (STATISTICAL-BASED) APPROACH USING GRAPH METRICS .112 4.3.1 Method Overview 113 4.3.2 Input–Local Graph Properties 115 4.3.3 Clustering Preliminary Anomaly Score With Unsupervised Learning 115 4.3.4 Classification Using Fuzzy Inference Engine 119 4.4 CLUSTERING-BASED ANOMALY DETECTION IN ONLINE-SOCIAL-NETWORK GRAPHS 124 4.4.1 Method Overview 126 4.4.2 Input To Algorithm 128 4.4.3 Finding Cluster Number Using GMM-EM 128 4.4.4 Clustering Using Fuzzy C-means (FCM) 129 4.4.5 Representing Clusters With Fuzzy Inference Engine 131 4.5 SUMMARY 133 CHAPTER 5: EXPERIMENTS AND DISCUSSIONS 137 5.1 FRAMEWORK .138 5.1.1 Distance-Based Approach 140 5.1.1.1 5.1.1.2 5.1.1.3 5.1.2 Distribution-Based Approach 145 5.1.2.1 5.1.2.2 5.1.3 Experiment Design 140 Power-Law Regression Method Results 143 Orthogonal Projection Method Results 144 Experiment Design 145 Distribution Method Results 148 Clustering-Based Approach 151 5.1.3.1 5.1.3.2 Experiment Design 152 Clustering Method Results 153 5.2 EXPERIMENT RESULTS DISCUSSION 155 5.2.1 Power-Law Degree And Normal Instances Distribution .156 5.2.2 Strengths and Shortcomings of EACH Method 161 5.2.2.1 5.2.2.2 5.2.2.3 5.2.2.4 5.2.3 Performance Comparisons .163 5.2.3.1 5.2.3.2 5.2.3.3 5.2.3.4 5.2.3.5 vi Power-Law Regression Method 161 Orthogonal Projection Method 161 Distribution Method 162 Clustering Method 163 Dealing With Anomaly Detection Challenges 164 Distance-Based Method vs Clustring-Based Method 165 Distribution-Base Method vs Clustring-Based Method 167 Proposed Methods vs Benchmarking 168 Effectiveness Of Clustering And Orthogonal Projection 168 Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic 5.2.3.6 5.3 CHAPTER 6: 6.1 6.2 6.3 6.4 Top Performance Comparisons 169 SUMMARY 172 CONCLUSIONS 175 RESEARCH CONTRIBUTIONS 176 MAIN FINDINGS 179 ANSWERS TO RESEARCH QUESTIONS 183 FUTURE WORK 186 BIBLIOGRAPHY 189 Anomaly Detection In Online Social Networks: Using data-mining Techniques and Fuzzy Logic vii Bibliography Abe, N., Zadrozny, B., & Langford, J (2006) Outlier Detection by Active Learning In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 504-509) ACM Aggarwal, C C (2013) Outlier Analysis Springer Aggarwal, C C., & Wang, H (2010) Graph Data Management and Mining: A Survey of Algorithms and Applications In Managing and Mining Graph Data (pp 13-68) Springer US Aggarwal, C C., & Yu, P S (2001) Outlier Detection for High Dimensional Data ACM SIGMOD Record, 30(2), 37-46 Agrawal, R., Gehrke, J., Gunopulos, D., & Raghavan, P (1998) Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications ACM SIGMOD Record, 27(2), 94-105 Agrawal, R., & Srikant, R (1995) Mining Sequential Patterns In Proceedings of the 11th International Conference on Data Engineering (pp 3-14) IEEE Ahmad, M A., Keegan, B., Roy, A., Williams, D., Srivastava, J., & Contractor, N (2013) Guilt by association? Network based propagation approaches for gold farmer detection In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 121-126) Akoglu, L., McGlohon, M., & Faloutsos, C (2010) OddBall: Spotting Anomalies in Weighted Graphs In Proceedings of the 14th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (pp 410-421) Springer Berlin Heidelberg Akoglu, L., Tong, H., Meeder, B., & Faloutsos, C (2012) PICS: Parameter-free Identification of Cohesive Subgroups in Large Attributed Graphs In Proceedings of the 2012 SIAM International Conference on Data Mining (pp 439-450) Akoglu, L., Tong, H., Vreeken, J., & Faloutsos, C (2012) Fast and Reliable Anomaly Detection in Categorical Data In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (pp 415-424) ACM Amelio, A., & Pizzuti, C (2013) Community mining in signed networks: a multiobjective approach Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Aral, S., & Walker, D (2012) Identifying Influential and Susceptible Members of Social Networks Science, 337(6092), 337-341 Awwad Shiekh Hasan, B., & Gan, J (2009) Sequential EM for Unsupervised Adaptive Gaussian Mixture Model Based Classifier In P Perner (Ed.), Chapter 5: Bibliography 189 Machine Learning and Data Mining in Pattern Recognition (Vol 5632, pp 96-106) Springer Berlin Heidelberg Baker, L D., Hofmann, T., McCallum, A K., & Yang, Y (1999) A Hierarchical Probabilistic Model for Novelty Detection in Text 1999 School of Computer Science Carnegie Mellon University Bandyopadhyay, S., & Maulik, U (2001) Nonparametric Genetic Clustering: Comparison of Validity Indices IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 31(1), 120-125 Bapna, R (2003) When Snipers Become Predators: Can Mechanism Design Save Online Auctions? Communications of the ACM, 46(12), 152-158 Barbara, D., Wu, N., & Jajodia, S (2001) Detecting Novel Network Intrusions using Bayes Estimators In Proceedings of the 1st SIAM International Conference on Data Mining (pp 24-29) Citeseer Barnett, V., & Lewis, T (1984) Outliers in Statistical Data (Vol 3) Wiley Basu, S., Bilenko, M., & Mooney, R J (2004) A Probabilistic Framework for Semi-supervised Clustering In Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 59-68) ACM Bay, S D., & Pazzani, M J (1999) Detecting Change in Categorical Data: Mining Contrast Sets In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 302-306) ACM Berson, I R (2003) Grooming Cybervictims Journal of School Violence, 2(1), 5-18 Bezdek, J C., & Pal, N R (1998) Some New Indexes of Cluster Validity IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics, 28(3), 301-315 Bhat, S Y., & Abulaish, M (2013) Community-based features for identifying spammers in online social networks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Bishop, C M (1995) Neural Networks for Pattern Recognition Oxford University Press Blanchard, G., Lee, G., & Scott, C (2010) Semi-supervised novelty detection The Journal of Machine Learning Research, 9999, 2973-3009 Bloedorn, E., Christiansen, A D., Hill, W., Skorupka, C., Talbot, L M., & Tivel, J (2001) Data mining for Network Intrusion Detection: How to Get Started MITRE Technical Report Blum, A L., & Langley, P (1997) Selection of relevant features and examples in machine learning Artificial intelligence, 97(1), 245-271 Bogdanov, P., Busch, M., Moehlis, J., Singh, A K., & Szymanski, B K (2013) The social media genome: Modeling individual topic-specific behavior in social media In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 236-242) Bolton, R J., & Hand, D J (2002) Statistical fraud detection: A review Statistical Science, 235-249 190 Bibliography Boriah, S., Chandola, V., & Kumar, V (2008) Similarity Measures for Categorical Data: A Comparative Evaluation In Proceedings of the 2008 SIAM International Conference on Data Mining (pp 243-254) Citeseer Bouguessa, M (2011) An Unsupervised Approach for Identifying Spammers in Social Networks In Proceedings of the 23rd IEEE International Conference on Tools with Artificial Intelligence (ICTAI) (pp 832-840) IEEE Boyd, D (2006) Friends, Friendsters, and Myspace Top 8: Writing Community into being on Social Network Sites Boyd, D M., & Ellison, N B (2007) Social Network Sites: Definition, History, and Scholarship Journal of Computer-Mediated Communication, 13(1), 210-230 Boyd, D M., & Ellison, N B (2008) Social Network Sites: Definition, History, and Scholarship Journal of Computer Mediated Communication, 13(1), 210-230 Brahmi, I., Yahia, S B., & Poncelet, P (2010) MAD-IDS: Novel Intrusion Detection System Using Mobile Agents and Data Mining Approaches In Intelligence and Security Informatics (pp 73-76) Springer Berlin Heidelberg Breunig, M M., Kriegel, H P., Ng, R T., & Sander, J (2000) LOF: Identifying Density-based Local Outliers ACM SIGMOD Record, 29(2), 93-104 Cao, B., Shen, D., Sun, J.-T., Yang, Q., & Chen, Z (2007) Feature Selection in a Kernel Space In Proceedings of the 24th International Conference on Machine learning (pp 121-128) ACM Centola, D (2010) The Spread of Behavior in an Online Social Network Experiment Science, 329(5996), 1194-1197 Cha, M., Mislove, A., Adams, B., & Gummadi, K (2008) Characterizing Social Cascades in Flickr In Proceedings of the 1st Workshop on Online Social Networks (pp 13-18) ACM Chakrabarti, D., Faloutsos, C., & McGlohon, M (2010) Graph Mining: Laws and Generators In Managing and Mining Graph Data (Vol 40, pp 69-123) Springer US Chan, P K., Mahoney, M V., & Arshad, M H (2003) A machine learning approach to anomaly detection Chandola, V., Banerjee, A., & Kumar, V (2009) Anomaly Detection: A Survey ACM Computer Survey, 41(3), 1-58 Chaudhary, A., Szalay, A S., & Moore, A W (2002) Very Fast Outlier Detection in Large Multidimensional Data Sets In Proceedings of the ACM SIGMOD Workshop in Research Issues in Data Mining and Knowledge Discovery (DMKD) Chawla, N V., Japkowicz, N., & Kotcz, A (2004) Editorial: Special Issue on Learning from Imbalanced Data Sets ACM SIGKDD Explorations Newsletter, 6(1), 1-6 Chen, C.-H (2009) Handbook of Pattern Recognition and Computer Vision World Scientific Chen, C., Wu, K., Srinivasan, V., & Zhang, X (2013) Battling the internet water army: detection of hidden paid posters Paper presented at Proceedings of Bibliography 191 the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Cherkassky, V., & Mulier, F M (2007) Learning from Data: Concepts, Theory, and Methods Wiley com Chimphlee, W., Abdullah, A H., Sap, M., & Noor, M (2005) Unsupervised Anomaly Detection with Unlabeled Data using Clustering In Proceedings of the Postgraduate Annual Research Seminar 2005 (pp 249-253) Choo, K.-K R (2009) Online Child Grooming: A Literature Review on the Misuse of Social Networking Sites for Grooming Children for Sexual Offences Retrieved 16 December 2010, URL: http://www.aic.gov.au/en/publications/current%20series/rpp/100120/rpp103.aspx Cornelis, C., Lu, J., Guo, X., & Zhang, G (2007) One-and-Only Item Recommendation with Fuzzy Logic Techniques Information Sciences, 177(22), 4906-4921 Dang, X., & Serfling, R (2010) Nonparametric Depth-based Multivariate Outlier Identifiers, and Masking Robustness Properties Journal of Statistical Planning and Inference, 140(1), 198-213 Das, K., & Schneider, J (2007) Detecting Anomalous Records in Categorical Datasets In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 220-229) ACM Dasgupta, D., & Majumdar, N S (2002) Anomaly Detection in Multidimensional Data using Negative Selection Algorithm In Proceedings of the Congress on Evolutionary Computation (CEC-2002) (pp 1039–1044) Davis, M., Liu, W., Miller, P., & Redpath, G (2011) Detecting Anomalies in Graphs with Numeric Labels In Proceedings of the 20th ACM International Conference on Information and Knowledge Management (pp 1197-1202) ACM De Stefano, C., Sansone, C., & Vento, M (2002) To reject or Not to Reject: That is the Question-an Answer in Case of Neural Classifiers IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews, 30(1), 84-94 Dempster, A P., Laird, N M., & Rubin, D B (1977) Maximum Likelihood from Incomplete Data via the EM Algorithm Journal of the Royal Statistical Society Series B (Methodological), 39(1), 1-38 Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., & Crovella, M (2012) Intrusion as (Anti) Social Communication: Characterization and Detection In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 886-894) ACM Duan, L., Xu, L., Liu, Y., & Lee, J (2009) Cluster-based Outlier Detection Annals of Operations Research, 168(1), 151-168 Duffield, N., Haffner, P., Krishnamurthy, B., & Ringberg, H (2009) Rule-based Anomaly Detection on IP Flows In IEEE INFOCOM 2009 (pp 424-432) IEEE 192 Bibliography Eberle, W., & Holder, L (2007) Discovering Structural Anomalies in GraphBased Data In Proceedings of the 7th IEEE International Conference on Data Mining Workshops (pp 393-398) Ester, M., Kriegel, H.-P., Sander, J., & Xu, X (1996) A Density-based Algorithm for Discovering Clusters in Large Spatial Databases with Noise In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining (pp 226-231) Faloutsos, C (2014) Large graph mining: patterns, cascades, fraud detection, and algorithms In Proceedings of Proceedings of the 23rd international conference on World wide web (pp 1-2) International World Wide Web Conferences Steering Committee Fawcett, T., & Provost, F (1999) Activity Monitoring: Noticing Interesting Changes in Behavior In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Ddiscovery and Data Mining (pp 53-62) ACM Fayyad, U., & Irani, K (1993) Multi-Interval Discretization of Continuousvalued Attributes for Classification Learning In Proceedings of the 13th International Joint Conference on Artificial Intelligence (IJCAI-93) (pp 1022-1027) Morgan Kaufmann Flake, G W., Tarjan, R E., & Tsioutsiouliklis, K (2004) Graph Clustering and Minimum Cut Trees Internet Mathematics, 1(4), 385-408 Fortunato, S (2010) Community Detection in Graphs Physics Reports, 486(3–5), 75-174 Fortunato, S., Latora, V., & Marchiori, M (2004) Method to Find Community Structures based on Information Centrality Physical Review E, 70(5), 056104 Freeman, L C (1979) Centrality in Social Networks Conceptual Clarification Social Networks, 1(3), 215-239 Friedkin, N E (1991) Theoretical Foundations for Centrality Measures American Journal of Sociology, 96(1991), 1478-1504 Fujimaki, R., Yairi, T., & Machida, K (2005) An Approach to Spacecraft Anomaly Detection Problem using Kernel Feature Space In Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining (pp 401-410) ACM Gama, J., Medas, P., Castillo, G., & Rodrigues, P (2004) Learning with Drift Detection In A C Bazzan & S Labidi (Eds.), Advances in Artificial Intelligence – SBIA 2004 (Vol 3171, pp 286-295) Springer Berlin Heidelberg Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., & Han, J (2010) On Community Outliers and Their Efficient Detection in Information Networks In Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 813-822) ACM Gath, I., & Geva, A B (1989) Unsupervised Optimal Fuzzy Clustering IEEE Transactions on Pattern Analysis and Machine Intelligence 11(7), 773780 Ghasemi, A., Rabiee, H R., Fadaee, M., Manzuri, M T., & Rohban, M H (2011) Active Learning from Positive and Unlabeled Data In Bibliography 193 Proceedings of the 11th IEEE International Conference on Data Mining Workshops (ICDMW) (pp 244-250) IEEE Ghoting, A., Parthasarathy, S., & Otey, M (2008) Fast Mining of Distance-based Outliers in High-dimensional Datasets Data Mining and Knowledge Discovery, 16(3), 349-364 Gjoka, M., Kurant, M., Butts, C T., & Markopoulou, A (2010) Walking in Facebook: A case study of unbiased sampling of OSNs In Proceedings of INFOCOM, 2010 Proceedings IEEE (pp 1-9) IEEE Gogoi, P., Borah, B., & Bhattacharyyac, D (2011) Supervised Anomaly Detection using Clustering-based Normal Behaviour Modeling International Journal of Advances in Engineering Sciences, 1(1), 12-17 Goudarzi, P., & Hassanzadeh, R (2006) A GA-based Fuzzy Rate Allocation Algorithm In Proceedings of IEEE International Conference on Communications (ICC '06) (pp 1-5) IEEE Grira, N., Crucianu, M., & Boujemaa, N (2004) Unsupervised and Semisupervised Clustering: A Brief Survey A review of machine learning techniques for processing multimedia content, Report of the MUSCLE European Network of Excellence (FP6) Gross, R., & Acquisti, A (2005) Information Revelation and Privacy in Online Social Networks In Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society (pp 71-80) ACM Grünwald, P D., Myung, I J., & Pitt, M A (2005) Advances in Minimum Description Length: Theory and Applications MIT press Gunasekara, R C., Mehrotra, K., & Mohan, C K (2013) Multi-objective restructuring in social networks In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 277-281) Guo, T., & Li, G Y (2008) Neural Data Mining for Credit Card Fraud Detection In Proceedings of the 2008 International Conference on Machine Learning and Cybernetics (pp 3630-3634) Gupta, A., Sycara, K P., Gordon, G J., & Hefny, A (2013) Exploring friend's influence in cultures in Twitter In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 584-591) Gupta, M., Jing, G., Xifeng, Y., Cam, H., & Jiawei, H (2013) On detecting Association-Based Clique Outliers in heterogeneous information networks In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 108-115) Guthrie, D., Guthrie, L., Allison, B., & Wilks, Y (2007) Unsupervised Anomaly Detection In Proceedings of the 20th International Joint Conference on Artifical Intelligence (pp 1624-1628) Morgan Kaufmann Publishers Inc Halkidi, M., Batistakis, Y., & Vazirgiannis, M (2002a) Cluster Validity Methods: Part I ACM SIGMOD Record, 31(2), 40-45 Halkidi, M., Batistakis, Y., & Vazirgiannis, M (2002b) Clustering Validity Checking Methods: Part II ACM SIGMOD Record, 31(3), 19-27 194 Bibliography Hampton, K., Goulet, L S., Marlow, C., & Rainie, L (2012) Why Most Facebook Users Get More Than They Give Pew Internet & American Life Project Hanneman, R A (2013) Introduction to Social Network Methods Retrieved July 2013, URL: http://faculty.ucr.edu/~hanneman/nettext/C9_Ego_networks.html Hartigan, J A., & Wong, M A (1979) Algorithm AS 136: A K-means Clustering Algorithm Journal of the Royal Statistical Society Series C (Applied Statistics), 28(1), 100-108 Hawkins, D M (1980) Identification of Outliers (Vol 11) Chapman and Hall Hawkins, S., He, H., Williams, G., & Baxter, R (2002) Outlier Detection using Replicator Neural Networks In Data Warehousing and Knowledge Discovery (pp 170-180) Springer Berlin Heidelberg Haythornthwaite, C (2005) Social Networks and Internet Connectivity Effects Information, Communication & Society, 8(2), 125-147 He, R., & Zheng, T (2013) Estimation of exponential random graph models for large social networks via graph limits Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada He, Z., Xu, X., & Deng, S (2003) Discovering Cluster-based Local Outliers Pattern Recognition Letters, 24(9–10), 1641-1650 Henderson, K., Gallagher, B., Li, L., Akoglu, L., Eliassi-Rad, T., Tong, H., & Faloutsos, C (2011) It's Who You Know: Graph Mining using Recursive Structural Features In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 663-671) ACM Hitchcock, J A (2007) Cyberbullies, Online Predators, and What to Do about Them Multimedia and Internet@Schools, 14(3), 13-15 Hodge, M J (2006) The Fourth Amendment and Privacy Issues on the New Internet: Facebook com and Myspace com S Ill ULJ, 31(2006), 95-123 Hodge, V J., & Austin, J (2004) A Survey of Outlier Detection Methodologies Artificial Intelligence Review, 22(2), 85-126 Holder, L B., & Cook, D J (2009) Graph-Based Data Mining Encyclopedia of Data Warehousing and Mining, 2(2009), 943-949 Hu, H., & Wang, X (2009) Evolution of a large online social network Physics Letters A, 373(12–13), 1105-1110 Hu, R., Mac Namee, B., & Delany, S J (2008) Sweetening the Dataset: Using Active Learning to Label Unlabelled Datasets In Proceedings of the 19th Irish Conference on Artificial Intelligence and Cognitive Science (AICS '08) Hu, W., Liao, Y., & Vemuri, V (2003) Robust Anomaly Detection using Support Vector Machines In Proceedings of the International Conference on Machine Learning (pp 592-597) Morgan Kaufmann Publishers Inc Huan, L., & Lei, Y (2005) Toward integrating feature selection algorithms for classification and clustering IEEE Transactions on Knowledge and Data Engineering, 17(4), 491-502 Bibliography 195 Idrsi, B S N B., & Shanmugam, B (2006) Anomaly Intrusion Detection based on Fuzzy Logic and Data Mining In Proceedings of Proceedings of the Postgraduate Annual Research Seminar (pp 147) Jain, A K., & Dubes, R C (1988) Algorithms for Clustering Data Prentice-Hall, Inc Jain, A K., Murty, M N., & Flynn, P J (1999) Data Clustering: A Review ACM Computing Surveys (CSUR), 31(3), 264-323 Janakiram, D., Reddy, A M., & Kumar, A V U P (2006) Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks In Proceedings of the 1st International Conference on Communication Systems Software and Middleware (pp 1-6) IEEE Jimeng, S., Huiming, Q., Chakrabarti, D., & Faloutsos, C (2005) Neighborhood Formation and Anomaly Detection in Bipartite Graphs In Proceedings of the 5th IEEE International Conference on Data Mining (pp 1-8) Johnson, R A., & Wichern, D W (2002) Applied Multivariate Statistical Analysis Prentice Hall Johnson, T., Kwok, I., & Ng, R (1998) Fast Computation of 2-dimensional Depth Contours In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining (KDD) (pp 224-228) AAAI Press Joshi, M V., Agarwal, R C., & Kumar, V (2001) Mining Needle in a Haystack: Classifying Rare Classes via Two-phase Rule Induction In Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data (pp 91-102) ACM Joshi, M V., Agarwal, R C., & Kumar, V (2002) Predicting Rare Classes: Can Boosting Make Any Weak Learner Strong? In Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 297-306) ACM Jyothsna, V., Prasad, V., & Prasad, K M (2011) A Review of Anomaly based Intrusion Detection Systems International Journal of Computer Applications, 28 Kadushin, C (2012) Understanding Social Networks: Theories, Concepts, and Findings Oxford University Press Karger, D R (1999) Random Sampling in Cut, Flow, and Network Design Problems Mathematics of Operations Research, 24(2), 383-413 Kas, M., Wachs, M., Carley, K M., & Carley, L R (2013) Incremental algorithm for updating betweenness centrality in dynamically growing networks In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 33-40) Kashima, H., & Inokuchi, A (2002) Kernels for Graph Classification In Proceedings of International Conference Data Mining Workshop on Active Mining (AM-2002) (pp 31-36) Citeseer Kleinberg, J (2003) An Impossibility Theorem for Clustering In Advances in Neural Information Processing Systems (pp 463-470) Knorr, E M., & Ng, R T (1997) A Unified Notion of Outliers: Properties and Computation In Proceedings of KDD-97 (pp 219-222) 196 Bibliography Knorr, E M., Ng, R T., & Tucakov, V (2000) Distance-based Outliers: Algorithms and Applications The VLDB Journal, 8(3-4), 237-253 Knox, E M., & Ng, R T (1998) Algorithms for Mining Distance-based Outliers in Large Datasets In Proceedings of the International Conference on Very Large Data Bases (pp 392-403) Citeseer Kondor, R I., & Lafferty, J (2002) Diffusion Kernels on Graphs and Other Discrete Input Spaces In Proceedings of the 19th International Conference on Machine Learning (ICML-02) (pp 315-322) Kontkanen, P., & Myllymäki, P (2007) MDL Histogram Density Estimation In Proceedings of International Conference on Artificial Intelligence and Statistics (pp 219-226) Kumar, M N., & Sheshadri, H S (2012) On the Classification of Imbalanced Datasets International Journal of Computer Applications, 44(8), 1-7 Kumar, R., Novak, J., & Tomkins, A (2010) Structure and evolution of online social networks In Link Mining: Models, Algorithms, and Applications (pp 337-357) Springer Kuramochi, M., & Karypis, G (2001) Frequent Subgraph Discovery In Proceedings of IEEE International Conference on Data Mining (pp 313320) IEEE Laleh, N., & Azgomi, M A (2009) A Taxonomy of Frauds and Fraud Detection Techniques In Information Systems, Technology and Management (pp 256-267) Springer Lee, W., & Stolfo, S J (2000) Data mining approaches for intrusion detection Defense Technical Information Center Leung, Y., Zhang, J.-S., & Xu, Z.-B (2000) Clustering by Scale-Space Filtering IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(12), 1396-1410 Levine, E., & Domany, E (2001) Resampling Method for Unsupervised Estimation of Cluster Validity Neural computation, 13(11), 2573-2593 Li, H., Nie, Z., Lee, W.-C., Giles, L., & Wen, J.-R (2008) Scalable Community Discovery on Textual Data with Relations In Proceedings of the 17th ACM Conference on Information and Knowledge Management (pp 12031212) ACM Limsaiprom, P., & Tantatsanawong, P (2010) Social Network Anomaly and Attack Patterns Analysis In Proceedings of the 6th International Conference on Networked Computing (INC) (pp 1-6) Ling, W., Zhi-Chun, M., & Dong-Mei, F (2008) Fuzzy Rule Modeling based on FCM and Support Vector Regression In Proceedings of the 7th International Conference on Machine Learning and Cybernetics (pp 1789-1794) Liu, B., Li, X., Lee, W S., & Yu, P S (2004) Text classification by labeling words In Proceedings of AAAI (pp 425-430) Liu, D., Lung, C.-H., Lambadaris, I., & Seddigh, N (2013) Network Traffic Anomaly Detection using Clustering Techniques and Performance Comparison In Proceedings of the 26th Annual IEEE Canadian Conference on Electrical and Computer Engineering (CCECE) (pp 1-4) Luo, M., Wang, L.-n., & Zhang, H.-g (2003) An Unsupervised Clustering-based Intrusion Detection Method Acta Electronica Sinica, 31(11), 1713-1716 Bibliography 197 Ma, J., & Perkins, S (2003) Online Novelty Detection on Temporal Sequences In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 613-618) ACM Mahadevan, V., Weixin, L., Bhalodia, V., & Vasconcelos, N (2010) Anomaly detection in crowded scenes In Proceedings of 2010 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), (pp 1975-1981) Mamdani, E H., & Assilian, S (1975) An Experiment in Linguistic Synthesis with A Fuzzy Logic Controller International Journal of Man-Machine Studies, 7(1), 1-13 McGloin, J., & Kirk, D (2010) An Overview of Social Network Analysis Journal of Criminal Justice Education, 21(2), 169-181 Mislove, A., Marcon, M., Gummadi, K., Druschel, P., & Bhattacharjee, B (2007) Measurement and Analysis of Online Social Networks In Proceedings of the 7th ACM SIGCOMM Conference on Internet Measurement (pp 2942) ACM Moon, T K (1996) The Expectation-Maximization Algorithm IEEE Signal processing magazine, 13(6), 47-60 Moonesignhe, H., & Tan, P.-N (2006) Outlier Detection using Random Walks In Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06) (pp 532-539) IEEE Müller, E., Assent, I., Iglesias, P., Mülle, Y., & Böhm, K (2012) Outlier Ranking via Subspace Analysis in Multiple Views of the Data In Proceedings of the 12th IEEE International Conference on Data Mining (pp 529-538) IEEE Müller, E., Schiffer, M., & Seidl, T (2010) Adaptive Outlierness for Subspace Outlier Ranking In Proceedings of the 19th ACM International Conference on Information and Knowledge Management (pp 1629-1632) ACM Natarajan, N., Sen, P., & Chaoji, V (2013) Community detection in contentsharing social networks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Newman, M E., Watts, D J., & Strogatz, S H (2002) Random Graph Models of Social Networks Proceedings of the National Academy of Sciences of the United States of America, 99(Suppl 1), 2566-2572 Newman, M E J (2003) The Structure and Function of Complex Networks SIAM review, 45(2), 167-256 Newman, M E J (2006) Modularity and Community Structure in Networks Proceedings of the National Academy of Sciences, 103(23), 8577-8582 Ng, A (2012, 12 July 2012) Lecture of Artificial Intelligence Machine Learning Retrieved 12 July 2012, URL: http://see.stanford.edu/see/lecturelist.aspx?coll=348ca38a-3a6d-4052937d-cb017338d7b1 Nguyen, N P., Alim, M A., Yilin, S., & Thai, M T (2013) Assessing network vulnerability in a community structure point of view In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 231-235) 198 Bibliography Noble, C C., & Cook, D J (2003) Graph-based anomaly detection In Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 631-636) ACM Noto, K., Brodley, C., & Slonim, D (2010) Anomaly Detection using an Ensemble of Feature Models In Proceedings of the 10th IEEE International Conference on Data Mining (pp 953-958) IEEE O'Banion, S., & Birnbaum, L (2013) Using explicit linguistic expressions of preference in social media to predict voting behavior In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 207-214) O'Madadhain, J., Hutchins, J., & Smyth, P (2005) Prediction and ranking algorithms for event-based network data SIGKDD Explor Newsl., 7(2), 23-30 Ovelgonne, M (2013) Distributed community detection in web-scale networks In Proceedings of Advances in Social Networks Analysis and Mining (ASONAM), 2013 IEEE/ACM International Conference on (pp 66-73) Pal, N R., & Bezdek, J C (1995) On cluster validity for the fuzzy c-means model Fuzzy Systems, IEEE Transactions on, 3(3), 370-379 Papacharissi, Z (2010) A Networked Self: Identity, Community, and Culture on Social Network Sites Taylor and Francis Papadimitriou, S., Kitagawa, H., Gibbons, P B., & Faloutsos, C (2003) LOCI: Fast Outlier Detection using the Local Correlation Integral In Proceedings of the 19th International Conference on Data Engineering (pp 315-326) Patcha, A., & Park, J.-M (2007) An overview of anomaly detection techniques: Existing solutions and latest technological trends Computer Networks, 51(12), 3448-3470 Pfeiffer III, J J., & Neville, J (2011) Methods to Determine Node Centrality and Clustering in Graphs with Uncertain Structure In Proceedings of the 5th International AAAI Conference on Weblogs and Social Media (ICWSM) (pp 590-593) Phua, C., Lee, V., Smith, K., & Gayler, R (2010) A Comprehensive Survey of Data Mining-based Fraud Detection Research arXiv preprint arXiv:1009.6119 Qayyum, A., Islam, M H., & Jamil, M (2005) Taxonomy of Statistical based Anomaly Detection Techniques for Intrusion Detection In Proceedings of the IEEE Symposium on Emerging Technologies (pp 270-276) IEEE Qin, M., & Hwang, K (2004) Frequent Episode Rules for Internet Anomaly Detection In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications (pp 161-168) IEEE Ratsch, G., Mika, S., Scholkopf, B., & Muller, K R (2002) Constructing Boosting Algorithms from SVMs: An Application to One-class Classification IEEE Transactions on Pattern Analysis and Machine Intelligence, 24(9), 1184-1199 Riketta, M., & Nienaber, S (2007) Multiple Identities and Work Motivation: The Role of Perceived Compatibility between Nested Organizational Units British Journal of Management, 18(s1), S61-S77 Rissanen, J (1989) Stochastic Complexity in Statistical Inquiry Theory World Scientific Publishing Co., Inc Bibliography 199 Rossi, R A., McDowell, L K., Aha, D W., & Neville, J (2012) Transforming Graph Data for Statistical Relational Learning Journal of Artificial Intelligence Research, 45(1), 363-441 Roth, V (2005) Outlier Detection with One-class Kernel Fisher Discriminants In Advances in Neural Information Processing Systems (pp 1169-1176) Roth, V (2006) Kernel Fisher Discriminants for Outlier Detection Neural computation, 18(4), 942-960 Rozen, D., Askalani, M., & Senn, T (2012 ) Identifying, Understanding and Influencing Social Media Users Retrieved 21 June 2013, URL: http://socialmediatoday.com/pamdyer/564409/6-types-social-media-users Salvador, S., Chan, P., & Brodie, J (2004) Learning States and Rules for Time Series Anomaly Detection In Proceedings of the 17th International FLAIRS Conference (pp 300-305) Schölkopf, B., Platt, J C., Shawe-Taylor, J., Smola, A J., & Williamson, R C (2001) Estimating the Support of a High-dimensional Distribution Neural computation, 13(7), 1443-1471 Sebyala, A A., Olukemi, T., & Sacks, L (2002) Active Platform Security through Intrusion Detection using Naive Bayesian Network for Anomaly Detection In Proceedings of London Communications Symposium Citeseer Shanbhag, S., & Wolf, T (2009) AnomBench: A Benchmark for Volume-Based Internet Anomaly Detection In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM) (pp 1-6) IEEE Sharma, K G., Ram, A., & Singh, Y (2011) Efficient Density Based Outlier Handling Technique in Data Mining In Advances in Computer Science and Information Technology (pp 542-550) Springer Shekhar, S., Lu, C.-T., & Zhang, P (2001) Detecting Graph-based Spatial Outliers: Algorithms and Applications (A Summary of Results) In Proceedings of the 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining ACM Shrivastava, N., Majumder, A., & Rastogi, R (2008) Mining (Social) Network Graphs to Detect Random Link Attacks In Proceedings of the 24th IEEE International Conference on Data Engineering (pp 486-495) IEEE Silva, J., & Willett, R (2008) Detection of anomalous meetings in a social network In Proceedings of the 42nd Annual Conference on Information Sciences and Systems (pp 636-641) Sims, B H., Sinitsyn, N., & Eidenbenz, S J (2013) Visualization and modeling of structural features of a large organizational email network Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Singh, K., & Upadhyaya, S (2012) Outlier Detection: Applications And Techniques International Journal of Computer Science Issues (IJCSI), 9(1) Snijders, T A B (2011) Statistical Models for Social Networks Annual Review of Sociology, 37(1), 131-153 200 Bibliography Solberg, H E., & Lahti, A (2005) Detection of Outliers in Reference Distributions: Performance of Horn’s Algorithm Clinical chemistry, 51(12), 2326-2332 Song, Q., Hu, W J., & Xie, W F (2002) Robust Support Vector Machine with Bullet Hole Image Classification IEEE Transactions on Systems Man and Cybernetics, Part C: Applications and Reviews, 32(4), 440-448 Song, X., Wu, M., Jermaine, C., & Ranka, S (2007) Conditional Anomaly Detection IEEE Transactions on Knowledge and Data Engineering, 19(5), 631-645 Stibor, T., Timmis, J., & Eckert, C (2005) A Comparative Study of Real-Valued Negative Selection to Statistical Anomaly Detection Techniques In Artificial Immune Systems (Vol 3627, pp 262-275) Springer Berlin Heidelberg Strogatz, S H (2001) Exploring Complex Networks Nature, 410(6825), 268276 Su, X., & Tsai, C L (2011) Outlier Detection Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 1(3), 261-268 Subbian, K., Sharma, D., Wen, Z., & Srivastava, J (2013) Finding influencers in networks using social capital Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Subrahmanyam, K., Reich, S M., Waechter, N., & Espinoza, G (2008) Online and offline social networks: Use of social networking sites by emerging adults Journal of Applied Developmental Psychology, 29(6), 420-433 Sundén, J (2003) Material Virtualities: Approaching Online Textual Embodiment (Vol 13) Peter Lang Publishing Takaffoli, M., Rabbany, R., Za, O R., #239, & ane (2013) Incremental local community identification in dynamic social networks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Tan, P N., Steinbach, M., & Kumar, V (2005) Introduction to data mining Pearson Addison Wesley Tandon, G., & Chan, P K (2007) Weighting versus Pruning in Rule Validation for Detecting Network and Host Anomalies In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 697-706) ACM Tang, L (2012) Online Friendship In Encyclopedia of Cyber Behavior (pp 412421) Thelwall, M (2008) Social Networks, Gender, and Friending: An Analysis of MySpace Member Profiles Journal of the American Society for Information Science and Technology, 59(8), 1321-1330 Tong, H., & Lin, C.-Y (2011) Non-negative Residual Matrix Factorization with Application to Graph Anomaly Detection In Proceedings of the 11th SIAM International Conference on Data Mining (pp 143-153) Ugander, J., Karrer, B., Backstrom, L., & Marlow, C (2011) The Anatomy of the Facebook Social Graph arXiv preprint arXiv:1111.4503 Bibliography 201 Vapnik, V N (2000) The Nature of Statistical Learning Theory (2 ed.) Springer Verlag Viswanath, B., Mislove, A., Cha, M., & Gummadi, K P (2009) On the Evolution of User Interaction in Facebook In Proceedings of the 2nd ACM Workshop on Online Social Networks (pp 37-42) ACM Wang, G., Hao, J., Ma, J., & Huang, L (2010) A New Approach to Intrusion Detection using Artificial Neural Networks and Fuzzy Clustering Expert Systems with Applications, 37(9), 6225-6232 Wang, H., & Lu, J (2013) Detect inflated follower numbers in OSN using star sampling Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Wang, W., Yang, J., & Muntz, R (1997) STING: A Statistical Information Grid Approach to Spatial Data Mining In Proceedings of the International Conference on Very Large Data Bases (pp 186-195) IEEE Wang, X., Mohanty, N., & McCallum, A (2006) Group and Topic Discovery from Relations and Their Attributes In Advances in Neural Information Processing Systems (Vol 18, pp 1449-1456) MIT Press Wasserman, S., & Faust, K (1994) Social Network Analysis in the Social and Behavioral Sciences [B] In Social Network Analysis: Methods and Applications (pp 1-27) Cambridge University Press Webb, A R (2003) Statistical pattern recognition Wiley com Wolak, J., Finkelhor, D., Mitchell, K J., & Ybarra, M L (2010) Online “Predators” and Their Victims Psychology of Violence, 1(2010), 13-35 Wong, W.-K., Moore, A., Cooper, G., & Wagner, M (2002) Rule-based Anomaly Pattern Detection for Detecting Disease Outbreaks In Proceedings of the 18th National Conference on Artificial Intelligence (AAAI 2002) (pp 217-223) Xia, P., Ribeiro, B., Chen, C., Liu, B., & Towsley, D (2013) A study of user behavior on an online dating site Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Xiang, R., Neville, J., & Rogati, M (2010) Modeling Relationship Strength in Online Social Networks In Proceedings of the 19th International Conference on World Wide Web (pp 981-990) ACM Xu, R., & Wunsch, D (2005) Survey of Clustering Algorithms IEEE Transactions on Neural Networks, 16(3), 645-678 Xu, X., Yuruk, N., Feng, Z., & Schweiger, T A (2007) SCAN: A Structural Clustering Algorithm for Networks In Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 824-833) ACM Xue, Z., Shang, Y., & Feng, A (2010) Semi-Supervised Outlier Detection based on Fuzzy Rough C-Means Clustering Mathematics and Computers in Simulation, 80(9), 1911-1921 Yairi, T., Kato, Y., & Hori, K (2001) Fault Detection by Mining Association Rules from House-keeping Data In Proceedings of International Symposium on Artificial Intelligence, Robotics and Automation in Space Citeseer 202 Bibliography Yalamanchili, H K., Jain, R., & Parekh, N (2009) Identifying Structural Repeats in Proteins using Graph Centrality Measures In Proceedings of World Congress on Nature & Biologically Inspired Computing (NaBIC 2009) (pp 110-115) Yang, J., & Leskovec, J (2012) Defining and evaluating network communities based on ground-truth Paper presented at Proceedings of the ACM SIGKDD Workshop on Mining Data Semantics, Beijing, China Yang, T., Comar, P M., & Xu, L (2013) Community detection by popularity based models for authored networked data Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Yang, T., Jin, R., Chi, Y., & Zhu, S (2009) Combining Link and Content for Community Detection: A Discriminative Approach In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (pp 927-936) ACM Yang, Y., Guo, Y C., & Ma, Y N (2010) Characterization of Communities in Online Social Network In Proceedings of Cross-Strait Conference on Information Science and Technology (pp 600-605) Ye, W., Parthasarathy, S., & Tatikonda, S (2011) Locality Sensitive Outlier Detection: A Ranking Driven Approach In Proceedings of the 27th IEEE International Conference onData Engineering (ICDE) (pp 410-421) IEEE Zadeh, L A (1965) Fuzzy Sets Information and Control, 8(3), 338-353 Zellag, K., & Kemme, B Consistency anomalies in multi-tier architectures: automatic detection and prevention The VLDB Journal, 1-26 Zellag, K., & Kemme, B (2014) Consistency Anomalies in Multi-tier Architectures: Automatic Detection and Prevention The VLDB Journal, 23(1), 147-172 Zhang, K., Downey, D., Chen, Z., Xie, Y., Cheng, Y., Agrawal, A., Choudhary, A (2013) A probabilistic graphical model for brand reputation assessment in social networks Paper presented at Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, Canada Zhang, X., Zhu, J., Wang, Q., & Zhao, H (2013) Identifying Influential Nodes in Complex Networks with Community Structure Knowledge-Based Systems, 42(2013), 74-84 Zhong, S., Khoshgoftaar, T M., & Seliya, N (2007) Clustering-based Network Intrusion Detection International Journal of Reliability, Quality and safety Engineering, 14(2), 169-187 Zhu, C., Kitagawa, H., Papadimitriou, S., & Faloutsos, C (2011) Outlier Detection by Example Journal of Intelligent Information Systems, 36(2), 217-247 Zuckerman, E W., & Jost, J T (2001) What Makes You Think You're so Popular? Self-Evaluation Maintenance and the Subjective Side of the" Friendship Paradox" Social Psychology Quarterly, 64(3), 207-223 Bibliography 203 ... networks data graph, including modelling, algorithms, labelling, and evaluation Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic iii In the first layer... Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic Abstract The Online Social Networks (OSNs), which captures the structure and dynamics of person-to-person and. .. Function Online Social Networks Orthogonal Projection Power-Law Regression Model Predictive Model Anomaly Detection In Online Social Networks: Using data- mining Techniques and Fuzzy Logic i ii Anomaly

Ngày đăng: 07/08/2017, 15:46

TỪ KHÓA LIÊN QUAN