Generic anomalous vertices detection utilizing a link prediction algorithm
In the past decade, graph-based structures have penetrated nearly every aspect of our lives. The detection of anomalies in these networks has become increasingly important, such as in exposing infected endpoints in computer networks or identifying socialbots. In this study, we present a novel unsupe...
Saved in:
| Published in | Social network analysis and mining Vol. 8; no. 1; p. 27 |
|---|---|
| Main Authors | , , |
| Format | Journal Article |
| Language | English |
| Published |
Vienna
Springer Vienna
01.12.2018
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1869-5450 1869-5469 |
| DOI | 10.1007/s13278-018-0503-4 |
Cover
| Abstract | In the past decade, graph-based structures have penetrated nearly every aspect of our lives. The detection of anomalies in these networks has become increasingly important, such as in exposing infected endpoints in computer networks or identifying socialbots. In this study, we present a novel unsupervised two-layered meta-classifier that can detect irregular vertices in complex networks solely by utilizing topology-based features. Following the reasoning that a vertex with many improbable links has a higher likelihood of being anomalous, we applied our method on 10 networks of various scales, from a network of several dozen students to online networks with millions of vertices. In every scenario, we succeeded in identifying anomalous vertices with lower false positive rates and higher AUCs compared to other prevalent methods. Moreover, we demonstrated that the presented algorithm is generic, and efficient both in revealing fake users and in disclosing the influential people in social networks. |
|---|---|
| AbstractList | In the past decade, graph-based structures have penetrated nearly every aspect of our lives. The detection of anomalies in these networks has become increasingly important, such as in exposing infected endpoints in computer networks or identifying socialbots. In this study, we present a novel unsupervised two-layered meta-classifier that can detect irregular vertices in complex networks solely by utilizing topology-based features. Following the reasoning that a vertex with many improbable links has a higher likelihood of being anomalous, we applied our method on 10 networks of various scales, from a network of several dozen students to online networks with millions of vertices. In every scenario, we succeeded in identifying anomalous vertices with lower false positive rates and higher AUCs compared to other prevalent methods. Moreover, we demonstrated that the presented algorithm is generic, and efficient both in revealing fake users and in disclosing the influential people in social networks. |
| ArticleNumber | 27 |
| Author | Elovichi, Yuval Fire, Michael Kagan, Dima |
| Author_xml | – sequence: 1 givenname: Dima orcidid: 0000-0002-8216-8776 surname: Kagan fullname: Kagan, Dima email: kagandi@post.bgu.ac.il organization: Ben-Gurion University of the Negev – sequence: 2 givenname: Yuval surname: Elovichi fullname: Elovichi, Yuval organization: Ben-Gurion University of the Negev – sequence: 3 givenname: Michael surname: Fire fullname: Fire, Michael organization: University of Washington |
| BookMark | eNp9kEFLAzEQhYNUsNb-AG8LnlcnTTbbHKVoVQpe9BxiMltTt0lNsoL-eresKAh6GGZg3jfzeMdk5INHQk4pnFOA-iJRNqvnJdC-KmAlPyBjOheyrLiQo--5giMyTWkDABQYkyDG5G6JHqMzhfZhq9vQpeINY3YGU2Exo8ku-KLLrnUfzq8LXbTOvxS7iNYNO92uQ3T5eXtCDhvdJpx-9Ql5vL56WNyUq_vl7eJyVRomeC5NY6msxVway1kjseaVtRVj9glog0i5NVoawRpRWya1oFIj1Uw2lhvgiGxCzoa7uxheO0xZbUIXff9SzSSVvD8OslfVg8rEkFLERhmX9d5xjtq1ioLaZ6eG7FSfndpnp3hP0l_kLrqtju__MrOBSb3WrzH-ePob-gRjqoQa |
| CitedBy_id | crossref_primary_10_1140_epjds_s13688_022_00336_8 crossref_primary_10_1016_j_jnca_2020_102716 crossref_primary_10_1016_j_knosys_2022_108821 crossref_primary_10_1016_j_ins_2023_119576 crossref_primary_10_1080_17460441_2023_2267020 crossref_primary_10_3390_math13050807 crossref_primary_10_1038_s41598_023_29610_z crossref_primary_10_1016_j_procs_2022_09_463 crossref_primary_10_32604_iasc_2022_022720 crossref_primary_10_1007_s11063_022_11103_1 crossref_primary_10_3233_JIFS_211821 crossref_primary_10_1155_2022_5443655 crossref_primary_10_3390_math9243195 crossref_primary_10_1142_S0129183123500985 crossref_primary_10_1016_j_socnet_2020_09_001 crossref_primary_10_1016_j_mlwa_2021_100086 crossref_primary_10_1016_j_asoc_2021_107159 |
| Cites_doi | 10.1137/S003614450342480 10.1126/science.286.5439.509 10.1002/asi.20591 10.1007/s13174-010-0003-x 10.1214/ss/1042727940 10.1016/j.socnet.2013.11.001 10.1103/RevModPhys.74.47 10.1016/j.comnet.2012.10.007 10.1145/2818717 10.3233/IDA-2007-11606 10.1016/j.physrep.2005.10.009 10.1145/1541880.1541882 10.1007/s10618-014-0365-y 10.1126/science.1095845 10.3233/AIC-140650 10.3233/JCS-980109 10.1007/978-3-642-13672-6_40 10.1023/A:1009700419189 10.1038/35065725 10.1109/MCAS.2003.1228503 10.1109/IJCNN.2011.6033365 10.1145/2076732.2076746 10.1145/1920261.1920263 10.1145/2068816.2068840 10.1109/PASSAT/SocialCom.2011.20 10.1007/3-540-45748-8_24 10.1145/2939672.2939747 |
| ContentType | Journal Article |
| Copyright | Springer-Verlag GmbH Austria, part of Springer Nature 2018 Springer-Verlag GmbH Austria, part of Springer Nature 2018. |
| Copyright_xml | – notice: Springer-Verlag GmbH Austria, part of Springer Nature 2018 – notice: Springer-Verlag GmbH Austria, part of Springer Nature 2018. |
| DBID | AAYXX CITATION 0-V 3V. 7XB 88J 8BJ 8FE 8FG 8FK ABUWG AFKRA ALSLI ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO FQK GNUQQ HCIFZ JBE JQ2 K7- M2R P5Z P62 PHGZM PHGZT PKEHL POGQB PQEST PQGLB PQQKQ PQUKI PRQQA Q9U |
| DOI | 10.1007/s13278-018-0503-4 |
| DatabaseName | CrossRef ProQuest Social Sciences Premium Collection ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) Social Science Database (Alumni Edition) International Bibliography of the Social Sciences (IBSS) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ProQuest Central (Alumni) ProQuest Central UK/Ireland Social Science Premium Collection Advanced Technologies & Computer Science Collection ProQuest Central Essentials - QC ProQuest Central ProQuest Technology Collection ProQuest One ProQuest Central International Bibliography of the Social Sciences ProQuest Central Student SciTech Premium Collection International Bibliography of the Social Sciences ProQuest Computer Science Collection Computer Science Database Social Science Database Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection Proquest Central Premium ProQuest One Academic (New) ProQuest One Academic Middle East (New) ProQuest Sociology & Social Sciences Collection ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest One Social Sciences ProQuest Central Basic |
| DatabaseTitle | CrossRef Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Social Science Journals (Alumni Edition) ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Sociology & Social Sciences Collection ProQuest Central ProQuest One Applied & Life Sciences International Bibliography of the Social Sciences (IBSS) ProQuest Central Korea ProQuest Central (New) Advanced Technologies & Aerospace Collection Social Science Premium Collection ProQuest One Social Sciences ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest Social Science Journals ProQuest Social Sciences Premium Collection ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Computer Science Database |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Economics Law Computer Science |
| EISSN | 1869-5469 |
| ExternalDocumentID | 10_1007_s13278_018_0503_4 |
| GrantInformation_xml | – fundername: Alfred P. Sloan Foundation funderid: http://dx.doi.org/10.13039/100000879 – fundername: Washington Research Foundation funderid: http://dx.doi.org/10.13039/100001906 – fundername: Gordon and Betty Moore Foundation funderid: http://dx.doi.org/10.13039/100000936 |
| GroupedDBID | -EM 0R~ 0VY 203 2VQ 30V 4.4 406 408 409 96X AAAVM AACDK AAHNG AAIAL AAJBT AAJKR AAJSJ AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYQN AAYTO AAYZH AAZMS ABAKF ABBXA ABDZT ABECU ABFTD ABFTV ABJNI ABJOX ABKCH ABMQK ABQBU ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABXPI ACAOD ACGFS ACHSB ACKNC ACMLO ACOKC ACPIV ACULB ACZOJ ADHHG ADHIR ADINQ ADKNI ADKPE ADRFC ADTPH ADURQ ADYFF ADZKW AEBTG AEFQL AEGNC AEJHL AEJRE AEMSY AEOHA AEPYU AESKC AETCA AEVLU AEXYK AFBBN AFKRA AFLOW AFQWF AFWTZ AFZKB AGAYW AGDGC AGMZJ AGQEE AGQMX AGRTI AGWZB AGYKE AHAVH AHBYD AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ AKLTO ALFXC ALMA_UNASSIGNED_HOLDINGS ALSLI AMKLP AMXSW AMYLF AMYQR ANMIH ARAPS ASPBG AUKKA AVWKF AXYYD AYJHY AZFZN AZQEC BENPR BGLVJ BGNMA C6C CCPQU CSCUP DNIVK DPUIP DWQXO EBLON EBS EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRRFC FSGXE FYJPI GGCAI GGRSB GJIRD GNUQQ GQ6 GQ8 HCIFZ HF~ HG6 HMJXF HQYDN HRMNR HVGLF HZ~ I0C IKXTQ ITM IWAJR IZIGR J-C JBSCW JCJTX JZLTJ K7- KOV LLZTM M2R M4Y NPVJJ NQJWS NU0 O9- O93 O9J PT4 RIG RLLFE ROL RSV S1Z S27 SCO SHX SISQX SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE T13 TSG U2A UG4 UOJIU UTJUX UZXMN VFIZW W48 WK8 Z7Z Z83 Z88 ZMTXR ~A9 AAYXX ABBRH ABDBE ABEEZ ABFSG ACSTC AEZWR AFDZB AFGXO AFHIU AFOHR AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PRQQA PUEGO 0-V 3V. 7XB 8BJ 8FE 8FG 8FK FQK JBE JQ2 P62 PKEHL POGQB PQEST PQQKQ PQUKI Q9U |
| ID | FETCH-LOGICAL-c364t-cfd197689cd43f9e745dd533db01fee14dca9c63f67d39a619ae1a39fd4c04ee3 |
| IEDL.DBID | U2A |
| ISSN | 1869-5450 |
| IngestDate | Fri Jul 25 23:25:34 EDT 2025 Wed Oct 01 03:26:01 EDT 2025 Thu Apr 24 22:58:45 EDT 2025 Fri Feb 21 02:33:19 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 1 |
| Keywords | Anomaly Detection Transit Friendly Classical Link Prediction Fake Profiles Anomalous Vertex |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c364t-cfd197689cd43f9e745dd533db01fee14dca9c63f67d39a619ae1a39fd4c04ee3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-8216-8776 |
| PQID | 2919497609 |
| PQPubID | 2044166 |
| ParticipantIDs | proquest_journals_2919497609 crossref_citationtrail_10_1007_s13278_018_0503_4 crossref_primary_10_1007_s13278_018_0503_4 springer_journals_10_1007_s13278_018_0503_4 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20181200 |
| PublicationDateYYYYMMDD | 2018-12-01 |
| PublicationDate_xml | – month: 12 year: 2018 text: 20181200 |
| PublicationDecade | 2010 |
| PublicationPlace | Vienna |
| PublicationPlace_xml | – name: Vienna – name: Heidelberg |
| PublicationTitle | Social network analysis and mining |
| PublicationTitleAbbrev | Soc. Netw. Anal. Min |
| PublicationYear | 2018 |
| Publisher | Springer Vienna Springer Nature B.V |
| Publisher_xml | – name: Springer Vienna – name: Springer Nature B.V |
| References | Barabási, Albert (CR6) 1999; 286 Boccaletti, Latora, Moreno, Chavez, Hwang (CR7) 2006; 424 Papadimitriou, Dasdan, Garcia-Molina (CR31) 2010; 1 Chandola, Banerjee, Kumar (CR12) 2009; 41 Bolton, Hand (CR8) 2002; 17 CR17 CR37 CR14 CR36 Albert, Barabási (CR4) 2002; 74 CR13 CR35 CR11 CR33 Fawcett, Provost (CR18) 1997; 1 Fire, Tenenboim-Chekina, Puzis, Lesser, Rokach, Elovici (CR23) 2013; 5 CR32 Strogatz (CR34) 2001; 410 CR30 Balthrop, Forrest, Newman, Williamson (CR5) 2004; 304 Akoglu, Tong, Koutra (CR2) 2015; 29 Heidler, Gamper, Herz, Eßer (CR24) 2014; 37 Liben-Nowell, Kleinberg (CR28) 2007; 58 Brin, Page (CR10) 2012; 56 Akoglu, McGlohon, Faloutsos, Zaki, Yu, Ravindran, Pudi (CR1) 2010 CR3 Wang, Chen (CR38) 2003; 3 Newman (CR29) 2003; 45 CR9 CR27 CR25 CR21 CR20 Elyashar, Fire, Kagan, Elovici (CR16) 2014; 29 Ferrara, Varol, Davis, Menczer, Flammini (CR19) 2016; 59 Hofmeyr, Forrest, Somayaji (CR26) 1998; 6 Fire, Katz, Elovici (CR22) 2012; 1 Eberle, Holder (CR15) 2007; 11 R Heidler (503_CR24) 2014; 37 P Papadimitriou (503_CR31) 2010; 1 RJ Bolton (503_CR8) 2002; 17 T Fawcett (503_CR18) 1997; 1 503_CR3 E Ferrara (503_CR19) 2016; 59 503_CR37 S Brin (503_CR10) 2012; 56 503_CR13 503_CR35 503_CR14 503_CR36 SH Strogatz (503_CR34) 2001; 410 503_CR17 503_CR30 503_CR11 503_CR33 503_CR32 SA Hofmeyr (503_CR26) 1998; 6 AL Barabási (503_CR6) 1999; 286 A Elyashar (503_CR16) 2014; 29 M Fire (503_CR23) 2013; 5 503_CR9 L Akoglu (503_CR2) 2015; 29 R Albert (503_CR4) 2002; 74 J Balthrop (503_CR5) 2004; 304 503_CR27 V Chandola (503_CR12) 2009; 41 503_CR25 ME Newman (503_CR29) 2003; 45 S Boccaletti (503_CR7) 2006; 424 W Eberle (503_CR15) 2007; 11 L Akoglu (503_CR1) 2010 M Fire (503_CR22) 2012; 1 XF Wang (503_CR38) 2003; 3 503_CR20 D Liben-Nowell (503_CR28) 2007; 58 503_CR21 |
| References_xml | – volume: 45 start-page: 167 issue: 2 year: 2003 end-page: 256 ident: CR29 article-title: The structure and function of complex networks publication-title: SIAM Rev doi: 10.1137/S003614450342480 – ident: CR14 – ident: CR37 – ident: CR30 – volume: 286 start-page: 509 issue: 5439 year: 1999 end-page: 512 ident: CR6 article-title: Emergence of scaling in random networks publication-title: Science doi: 10.1126/science.286.5439.509 – ident: CR33 – volume: 58 start-page: 1019 issue: 7 year: 2007 end-page: 1031 ident: CR28 article-title: The link-prediction problem for social networks publication-title: J Am Soc Inf Sci Technol doi: 10.1002/asi.20591 – volume: 1 start-page: 19 issue: 1 year: 2010 end-page: 30 ident: CR31 article-title: Web graph similarity for anomaly detection publication-title: J Internet Serv Appl doi: 10.1007/s13174-010-0003-x – ident: CR35 – volume: 17 start-page: 235 year: 2002 end-page: 249 ident: CR8 article-title: Statistical fraud detection: a review publication-title: Stat sci doi: 10.1214/ss/1042727940 – volume: 37 start-page: 1 year: 2014 end-page: 13 ident: CR24 article-title: Relationship patterns in the 19th century: the friendship network in a German boys’ school class from 1880 to 1881 revisited publication-title: Soc Netw doi: 10.1016/j.socnet.2013.11.001 – volume: 74 start-page: 47 issue: 1 year: 2002 ident: CR4 article-title: Statistical mechanics of complex networks publication-title: Rev Mod Phys doi: 10.1103/RevModPhys.74.47 – ident: CR25 – volume: 56 start-page: 3825 issue: 18 year: 2012 end-page: 3833 ident: CR10 article-title: Reprint of: the anatomy of a large-scale hypertextual web search engine publication-title: Comput Netw doi: 10.1016/j.comnet.2012.10.007 – ident: CR27 – volume: 59 start-page: 96 issue: 7 year: 2016 end-page: 104 ident: CR19 article-title: The rise of social bots publication-title: Commun ACM doi: 10.1145/2818717 – volume: 11 start-page: 663 issue: 6 year: 2007 end-page: 689 ident: CR15 article-title: Anomaly detection in data represented as graphs publication-title: Intell Data Anal doi: 10.3233/IDA-2007-11606 – volume: 424 start-page: 175 issue: 4 year: 2006 end-page: 308 ident: CR7 article-title: Complex networks: structure and dynamics publication-title: Phys Rep doi: 10.1016/j.physrep.2005.10.009 – ident: CR21 – volume: 41 start-page: 15 issue: 3 year: 2009 ident: CR12 article-title: Anomaly detection: a survey publication-title: ACM Comput Surv (CSUR) doi: 10.1145/1541880.1541882 – ident: CR3 – volume: 29 start-page: 626 issue: 3 year: 2015 end-page: 688 ident: CR2 article-title: Graph based anomaly detection and description: a survey publication-title: Data Min Knowl Discov doi: 10.1007/s10618-014-0365-y – volume: 304 start-page: 527 issue: 5670 year: 2004 end-page: 529 ident: CR5 article-title: Technological networks and the spread of computer viruses publication-title: Science doi: 10.1126/science.1095845 – ident: CR17 – volume: 29 start-page: 87 issue: 1 year: 2014 end-page: 106 ident: CR16 article-title: Guided socialbots: infiltrating the social networks of specific organizations’ employees publication-title: AI Commun doi: 10.3233/AIC-140650 – ident: CR13 – volume: 5 start-page: 10 issue: 1 year: 2013 ident: CR23 article-title: Computationally efficient link prediction in a variety of social networks publication-title: ACM Trans Intell Syst Technol (TIST) – ident: CR11 – ident: CR9 – volume: 6 start-page: 151 issue: 3 year: 1998 end-page: 180 ident: CR26 article-title: Intrusion detection using sequences of system calls publication-title: J Comput Secur doi: 10.3233/JCS-980109 – ident: CR32 – volume: 1 start-page: 26 issue: 1 year: 2012 end-page: 39 ident: CR22 article-title: Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies publication-title: Hum J – ident: CR36 – year: 2010 ident: CR1 article-title: Oddball: spotting anomalies in weighted graphs publication-title: Advances in Knowledge Discovery and Data Mining doi: 10.1007/978-3-642-13672-6_40 – volume: 1 start-page: 291 issue: 3 year: 1997 end-page: 316 ident: CR18 article-title: Adaptive fraud detection publication-title: Data Min Knowl Discov doi: 10.1023/A:1009700419189 – volume: 410 start-page: 268 issue: 6825 year: 2001 end-page: 276 ident: CR34 article-title: Exploring complex networks publication-title: Nature doi: 10.1038/35065725 – volume: 3 start-page: 6 issue: 1 year: 2003 end-page: 20 ident: CR38 article-title: Complex networks: small-world, scale-free and beyond publication-title: IEEE Circuits Syst Mag doi: 10.1109/MCAS.2003.1228503 – ident: CR20 – volume: 29 start-page: 87 issue: 1 year: 2014 ident: 503_CR16 publication-title: AI Commun doi: 10.3233/AIC-140650 – ident: 503_CR37 – volume: 3 start-page: 6 issue: 1 year: 2003 ident: 503_CR38 publication-title: IEEE Circuits Syst Mag doi: 10.1109/MCAS.2003.1228503 – ident: 503_CR13 doi: 10.1109/IJCNN.2011.6033365 – volume: 410 start-page: 268 issue: 6825 year: 2001 ident: 503_CR34 publication-title: Nature doi: 10.1038/35065725 – ident: 503_CR35 – volume: 58 start-page: 1019 issue: 7 year: 2007 ident: 503_CR28 publication-title: J Am Soc Inf Sci Technol doi: 10.1002/asi.20591 – volume: 1 start-page: 19 issue: 1 year: 2010 ident: 503_CR31 publication-title: J Internet Serv Appl doi: 10.1007/s13174-010-0003-x – volume: 41 start-page: 15 issue: 3 year: 2009 ident: 503_CR12 publication-title: ACM Comput Surv (CSUR) doi: 10.1145/1541880.1541882 – volume: 56 start-page: 3825 issue: 18 year: 2012 ident: 503_CR10 publication-title: Comput Netw doi: 10.1016/j.comnet.2012.10.007 – volume-title: Advances in Knowledge Discovery and Data Mining year: 2010 ident: 503_CR1 doi: 10.1007/978-3-642-13672-6_40 – ident: 503_CR9 doi: 10.1145/2076732.2076746 – ident: 503_CR3 – volume: 45 start-page: 167 issue: 2 year: 2003 ident: 503_CR29 publication-title: SIAM Rev doi: 10.1137/S003614450342480 – volume: 5 start-page: 10 issue: 1 year: 2013 ident: 503_CR23 publication-title: ACM Trans Intell Syst Technol (TIST) – ident: 503_CR25 – volume: 37 start-page: 1 year: 2014 ident: 503_CR24 publication-title: Soc Netw doi: 10.1016/j.socnet.2013.11.001 – volume: 29 start-page: 626 issue: 3 year: 2015 ident: 503_CR2 publication-title: Data Min Knowl Discov doi: 10.1007/s10618-014-0365-y – volume: 6 start-page: 151 issue: 3 year: 1998 ident: 503_CR26 publication-title: J Comput Secur doi: 10.3233/JCS-980109 – volume: 286 start-page: 509 issue: 5439 year: 1999 ident: 503_CR6 publication-title: Science doi: 10.1126/science.286.5439.509 – volume: 1 start-page: 26 issue: 1 year: 2012 ident: 503_CR22 publication-title: Hum J – ident: 503_CR33 doi: 10.1145/1920261.1920263 – volume: 74 start-page: 47 issue: 1 year: 2002 ident: 503_CR4 publication-title: Rev Mod Phys doi: 10.1103/RevModPhys.74.47 – volume: 304 start-page: 527 issue: 5670 year: 2004 ident: 503_CR5 publication-title: Science doi: 10.1126/science.1095845 – ident: 503_CR36 doi: 10.1145/2068816.2068840 – ident: 503_CR17 – ident: 503_CR11 – volume: 17 start-page: 235 year: 2002 ident: 503_CR8 publication-title: Stat sci doi: 10.1214/ss/1042727940 – ident: 503_CR21 doi: 10.1109/PASSAT/SocialCom.2011.20 – ident: 503_CR14 doi: 10.1007/3-540-45748-8_24 – ident: 503_CR30 – ident: 503_CR27 doi: 10.1145/2939672.2939747 – ident: 503_CR32 – volume: 1 start-page: 291 issue: 3 year: 1997 ident: 503_CR18 publication-title: Data Min Knowl Discov doi: 10.1023/A:1009700419189 – volume: 11 start-page: 663 issue: 6 year: 2007 ident: 503_CR15 publication-title: Intell Data Anal doi: 10.3233/IDA-2007-11606 – ident: 503_CR20 – volume: 424 start-page: 175 issue: 4 year: 2006 ident: 503_CR7 publication-title: Phys Rep doi: 10.1016/j.physrep.2005.10.009 – volume: 59 start-page: 96 issue: 7 year: 2016 ident: 503_CR19 publication-title: Commun ACM doi: 10.1145/2818717 |
| SSID | ssj0001033906 |
| Score | 2.308106 |
| Snippet | In the past decade, graph-based structures have penetrated nearly every aspect of our lives. The detection of anomalies in these networks has become... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 27 |
| SubjectTerms | Algorithms Apexes Applications of Graph Theory and Complex Networks Co authorship Computer networks Computer Science Data Mining and Knowledge Discovery Datasets Economics False positive results Game Theory Graph theory Graphs Humanities Law Machine learning Methodology of the Social Sciences Methods Original Article Social and Behav. Sciences Social networks Statistics for Social Sciences Topology |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PS8MwFA5zu3gRRcXplBw8KcE2SeNyEFGZjIFDxMFuJc0PHWzdnPXiX-9L1q4ouENPaQP9Xpr3vb6X7yF0HlvrgIcKwriShGdCkC6NOfHeJ_N1gDRodz4NRX_EB-Nk3EDD6iyML6us9sSwUZu59v_Ir6iEcBt8ZyRvFx_Ed43y2dWqhYYqWyuYmyAxtoVa1CtjNVHrvjd8fqn_ukQMgvxw5KgrJAH6sE51hvN0jHrB2RiuJGKE_3ZWNQP9kzQNvuhxF-2UJBLfray-hxo230eDoCA90Vjl85maQkSPQ69l2AiwsUUoucoxrLPp5BtmxQr75C1eLH2qJoyp6Ru8cfE-O0Cjx97rQ5-UnRKIZoIXRDsTAzZdqQ1nTtprnhgDRM5kUeysjbnRSmrBwCyGSQVBk7KxYtIZriNuLTtEzXye2yOEpYmF6GbCx1acUpdJChxFyci5hCZOt1FUQZLqUkbcd7OYprUAskcxBRRTj2LK2-hi_chipaGx6eZOhXNafk6faW38NrqssK-H_53sePNkJ2ibemOH6pQOahbLL3sKHKPIzsqF8wPbvMwm priority: 102 providerName: ProQuest |
| Title | Generic anomalous vertices detection utilizing a link prediction algorithm |
| URI | https://link.springer.com/article/10.1007/s13278-018-0503-4 https://www.proquest.com/docview/2919497609 |
| Volume | 8 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVLSH databaseName: SpringerLink Journals customDbUrl: mediaType: online eissn: 1869-5469 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001033906 issn: 1869-5450 databaseCode: AFBBN dateStart: 20110101 isFulltext: true providerName: Library Specific Holdings – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1869-5469 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001033906 issn: 1869-5450 databaseCode: BENPR dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVAVX databaseName: HAS SpringerNature Open Access 2022 customDbUrl: eissn: 1869-5469 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001033906 issn: 1869-5450 databaseCode: AAJSJ dateStart: 20110101 isFulltext: true titleUrlDefault: https://www.springernature.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1869-5469 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0001033906 issn: 1869-5450 databaseCode: AGYKE dateStart: 20110101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1869-5469 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0001033906 issn: 1869-5450 databaseCode: U2A dateStart: 20110101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3Na9swFH8s7WG7tF220fQj6LDThsD6sGod05K0dFsZY4HuZGR9bIEsLYlLoX99nxQ7ZmUd7GAMlizh956k3_P7AnjPvA-IQxUV0mgqK6VowZmk8fSpoh8gT7k7v1ypi6m8vM6vmzjuVevt3pok007dBbsJHrPBMrzyTFDZg-08ZvNCIZ7yUfdjJROox6eookJpighhY8382yh_nkcdyHxiF03HzWQPdhqcSEZrxr6GF37Rh922BgNplmQfXraRxas-9D6b-zdwmTJJzywx-NzMUbMnqeYybgjE-Tq5Xi0Iytt89oBTE0MiNcjtMppsUpuZ_7xZzupfv9_CdDL-fnZBm4oJ1Aola2qDY4gvCm2dFEH7E5k7h4DOVRkL3jPprNFWCWSPE9qg8mQ8M0IHJ20mvRfvYGtxs_D7QLRjShWVijqW5DxUmiNWMToLIed5sAPIWrqVtkknHqtazMsuEXIkdYmkLiOpSzmAD5tXbte5NP7V-ahlRtksq1XJNdMSPzDTA_jYMqhrfnawg__qfQiveBSQ5LRyBFv18s4fI_SoqyH0isn5ELZH5z8-jfF-Or76-m2YBPARLMLRXA |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LT9wwEB7BciiXqggqllLwAS4gq4ntuOsDqigPLa8VqkDiFhw_KNKS3bJBVflx_LaOTUIEEtw45ORklHyeeGY84_kA1lLnPPqhknKhFRWFlLTHUkGD9SlCHSCLvTtPBrJ_Lg4vsospeGjOwoSyymZNjAu1HZmwR_6NKQy30XYm6sf4Dw2sUSG72lBo6JpawW7FFmP1wY4j9-8vhnCTrYNdnO91xvb3znb6tGYZoIZLUVHjbYpye8pYwb1y30VmLTpBtkhS71wqrNHKSI6fZLnSGHBol2quvBUmEc5xlDsNM4Lj23Vg5ufe4PRXu8uTcK4iwWegfqLorjylVuP5Pc5Cg9sUryzhVDw3jq3H-yJJG23f_if4WDutZPtRy-ZgypXzcBg7Vl8bosvRjR6O7iYkcjvjwkOsq2KJV0lQr4fX9yiVaBKSxWR8G1JDcUwPrxDh6vfNApy_C2afoVOOSrcIRNlUyl4hQywnGPOFYugTaZV4n7HMmy4kDSS5qduWB_aMYd42XA4o5ohiHlDMRRc2nh4ZP_bseOvm5QbnvP59J3mrbF3YbLBvh18VtvS2sFX40D87Oc6PDwZHX2CWhYmPlTHL0Klu79xX9G-qYqVWIgKX7623_wFqnAr_ |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT9tAEB7xkIBLaQNV04ayh56KVngf3maPqCWigaIeGombtd4HjZQ6UWKExK_v7MbGalWQevDFXq_lmVnvN56ZbwA-MO8D4lBFhTSaylIpOuRM0rj7lDEPkCfuzm_X6mIixzf5TdPndNVmu7chyXVNQ2RpqurThQunXeGb4JEZluGRZ4LKTdiWkScBDXrCz7qfLJlAnz5VGA2VpogWHiOb_5rlz72pA5x_xUjT1jN6CS8azEjO1kp-BRu-6sF-24-BNMuzB7ttlfGqB5tX5v4AxolVemqJwfNmhl4-Sf2X8eNAnK9TGlZF0PZm0wd8NDEkSoYsljF8k66Z2e18Oa1__jqEyej8x-cL2nRPoFYoWVMbHEOsMdTWSRG0_yRz5xDcuTJjwXsmnTXaKoGqckIbdKSMZ0bo4KTNpPfiNWxV88q_AaIdU2pYquhvSc5DqTniFqOzEHKeB9uHrJVbYRtq8djhYlZ0pMhR1AWKuoiiLmQfPj7esljzajw3eNAqo2iW2KrgmmmJL5jpPpy0CuouPznZ2_8afQw737-Miquv15fvYI9HW0m5LAPYqpd3_ggRSV2-T1b3G27I1HA |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Generic+anomalous+vertices+detection+utilizing+a+link+prediction+algorithm&rft.jtitle=Social+network+analysis+and+mining&rft.au=Kagan%2C+Dima&rft.au=Elovichi%2C+Yuval&rft.au=Fire%2C+Michael&rft.date=2018-12-01&rft.pub=Springer+Vienna&rft.issn=1869-5450&rft.eissn=1869-5469&rft.volume=8&rft.issue=1&rft_id=info:doi/10.1007%2Fs13278-018-0503-4&rft.externalDocID=10_1007_s13278_018_0503_4 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1869-5450&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1869-5450&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1869-5450&client=summon |