메뉴 건너뛰기




Volumn 20, Issue 8, 2008, Pages 1039-1052

Discovering and explaining abnormal nodes in semantic graphs

Author keywords

Anomaly detection; Data mining; Knowledge and data engineering tools and techniques; Semantic graphs

Indexed keywords

(E ,3E) PROCESS; CENTRAL NODES; COMPLEX DATA; DIFFERENT TYPES; EXPLANATION SYSTEMS; GRAPH-BASED; HOMELAND SECURITY (HLS); HUMAN SUBJECTS; LARGE DATA SETS; NATURAL LANGUAGE EXPLANATIONS; NUMERICAL DATA; OUTLIER DETECTION; SEMANTIC GRAPHS; SOCIAL NETWORK ANALYSIS (SNA); UNSUPERVISED NETWORK;

EID: 46649095259     PISSN: 10414347     EISSN: None     Source Type: Journal    
DOI: 10.1109/TKDE.2007.190691     Document Type: Conference Paper
Times cited : (39)

References (39)
  • 1
    • 0012254042 scopus 로고
    • The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects
    • M. Sparrow, "The Application of Network Analysis to Criminal Intelligence: An Assessment of the Prospects," Social Networks, vol. 13, pp. 251-274, 1991.
    • (1991) Social Networks , vol.13 , pp. 251-274
    • Sparrow, M.1
  • 2
    • 33947228099 scopus 로고    scopus 로고
    • Break Detection Systems
    • W. Kloesgen and J. Zytkow, eds, pp, Oxford Univ. Press
    • T. Senator and H. Goldberg, "Break Detection Systems," Handbook of Knowledge Discovery and Data Mining, W. Kloesgen and J. Zytkow, eds., pp. 863-873, Oxford Univ. Press, 2002.
    • (2002) Handbook of Knowledge Discovery and Data Mining , pp. 863-873
    • Senator, T.1    Goldberg, H.2
  • 4
    • 33745765244 scopus 로고    scopus 로고
    • Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis
    • J. Wang, F. Wang, and D. Zeng, "Rule+Exception Learning-Based Class Specification and Labeling in Intelligence and Security Analysis," Proc. Workshop Intelligence and Security Informatics (WISI '06), vol. 3917, pp. 181-182, 2006.
    • (2006) Proc. Workshop Intelligence and Security Informatics (WISI '06) , vol.3917 , pp. 181-182
    • Wang, J.1    Wang, F.2    Zeng, D.3
  • 5
    • 0038401985 scopus 로고    scopus 로고
    • Mapping Networks of Terrorist Cells
    • V. Krebs, "Mapping Networks of Terrorist Cells," Connections, vol. 24, no. 3, pp. 43-52, 2001.
    • (2001) Connections , vol.24 , Issue.3 , pp. 43-52
    • Krebs, V.1
  • 6
    • 24944475288 scopus 로고    scopus 로고
    • Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network
    • P. Kantor et al, ed, pp, Springer
    • J. Qin, J. Xu, D. Hu, M. Sageman, and H. Chen, "Analyzing Terrorist Networks: A Case Study of the Global Salafi Jihad Network," Intelligence and Security Informatics, P. Kantor et al., ed., pp. 287-304, Springer, 2005.
    • (2005) Intelligence and Security Informatics , pp. 287-304
    • Qin, J.1    Xu, J.2    Hu, D.3    Sageman, M.4    Chen, H.5
  • 7
    • 85046981212 scopus 로고    scopus 로고
    • Total Information Overload
    • editorial, Mar
    • "Total Information Overload," Scientific Am., editorial, Mar. 2003.
    • (2003) Scientific Am
  • 10
    • 46649085080 scopus 로고    scopus 로고
    • Modeling, Finding, and Explaining Abnormal Instances in Multi-Relational Networks,
    • PhD dissertation, Dept. of Computer Science, Univ. of Southern California
    • S. Lin, "Modeling, Finding, and Explaining Abnormal Instances in Multi-Relational Networks," PhD dissertation, Dept. of Computer Science, Univ. of Southern California, 2006.
    • (2006)
    • Lin, S.1
  • 11
    • 0039845384 scopus 로고    scopus 로고
    • Efficient Algorithms for Mining Outliers from Large Data Sets
    • S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient Algorithms for Mining Outliers from Large Data Sets," Proc. ACM SIGMOD '00, pp. 427-438, 2000.
    • (2000) Proc. ACM SIGMOD '00 , pp. 427-438
    • Ramaswamy, S.1    Rastogi, R.2    Shim, K.3
  • 15
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative Sources in a Hyperlinked Environment
    • J. Kleinberg, "Authoritative Sources in a Hyperlinked Environment," J. ACM, vol. 46, no. 5, pp. 604-632, 1999.
    • (1999) J. ACM , vol.46 , Issue.5 , pp. 604-632
    • Kleinberg, J.1
  • 17
    • 23744454242 scopus 로고    scopus 로고
    • A Cluster Algorithm for Graphs,
    • Technical Report INS-R0010, Nat'l Research Inst. for Math. and Computer Science, Amsterdam, The Netherlands
    • S. Dongen, "A Cluster Algorithm for Graphs," Technical Report INS-R0010, Nat'l Research Inst. for Math. and Computer Science, Amsterdam, The Netherlands, 2000.
    • (2000)
    • Dongen, S.1
  • 19
    • 46649116982 scopus 로고    scopus 로고
    • S. Lin, Generating Natural Language Descriptions for Paths in the Semantic Network, final project report, Dept. of Linguistics, Univ. of Southern California, 2006.
    • S. Lin, "Generating Natural Language Descriptions for Paths in the Semantic Network," final project report, Dept. of Linguistics, Univ. of Southern California, 2006.
  • 20
    • 4243116398 scopus 로고    scopus 로고
    • Countering Terrorism through Information Technology
    • R. Popp, "Countering Terrorism through Information Technology," Comm. ACM, vol. 47, no. 3, pp. 36-43, 2004.
    • (2004) Comm. ACM , vol.47 , Issue.3 , pp. 36-43
    • Popp, R.1
  • 21
    • 27344452368 scopus 로고    scopus 로고
    • Artificial Intelligence for Homeland Security
    • H. Chen and F. Wang, "Artificial Intelligence for Homeland Security," IEEE Intelligent Systems, vol. 20, no. 5, pp. 12-16, 2005.
    • (2005) IEEE Intelligent Systems , vol.20 , Issue.5 , pp. 12-16
    • Chen, H.1    Wang, F.2
  • 22
    • 20344376408 scopus 로고    scopus 로고
    • Criminal Network Analysis and Visualization
    • J. Xu and H. Chen, "Criminal Network Analysis and Visualization," Comm. ACM, vol. 48, no. 6, pp. 101-107, 2005.
    • (2005) Comm. ACM , vol.48 , Issue.6 , pp. 101-107
    • Xu, J.1    Chen, H.2
  • 23
    • 28844486779 scopus 로고    scopus 로고
    • Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective
    • H. Chen and J. Xu, "Intelligence and Security Informatics for National Security: A Knowledge Discovery Perspective," Ann. Rev. of Information Science and Technology, vol. 40, pp. 229-289, 2006.
    • (2006) Ann. Rev. of Information Science and Technology , vol.40 , pp. 229-289
    • Chen, H.1    Xu, J.2
  • 30
    • 9444219998 scopus 로고    scopus 로고
    • Using Unsupervised Link Discovery Methods to Find Interesting Facts and Connections in a Bibliography Dataset
    • Dec
    • S. Lin and H. Chalupsky, "Using Unsupervised Link Discovery Methods to Find Interesting Facts and Connections in a Bibliography Dataset," SIGKDD Explorations, vol. 5, no. 2, pp. 173-178, Dec. 2003.
    • (2003) SIGKDD Explorations , vol.5 , Issue.2 , pp. 173-178
    • Lin, S.1    Chalupsky, H.2
  • 31
    • 26944444029 scopus 로고    scopus 로고
    • Data Mining in a Nutshell
    • S. Dzeroski and N. Lavrac, eds. pp, Springer
    • S. Dzeroski, "Data Mining in a Nutshell," Relational Data Mining, S. Dzeroski and N. Lavrac, eds. pp. 1-27, Springer, 2001.
    • (2001) Relational Data Mining , pp. 1-27
    • Dzeroski, S.1
  • 34
    • 0034832530 scopus 로고    scopus 로고
    • Confirmation-Guided Discovery of First-Order Rules with Tertius
    • P. Flach and N. Lachiche, "Confirmation-Guided Discovery of First-Order Rules with Tertius," Machine Learning, vol. 42, nos. 1-2, pp. 61-95, 2001.
    • (2001) Machine Learning , vol.42 , Issue.1-2 , pp. 61-95
    • Flach, P.1    Lachiche, N.2
  • 36
    • 0002192370 scopus 로고    scopus 로고
    • Explora: A Multipattern and Multistrategy Discovery Assistant
    • U. Fayyad et al, ed, pp, AAAI/MIT Press
    • W. Klosgen, "Explora: A Multipattern and Multistrategy Discovery Assistant," Advances in Knowledge Discovery and Data Mining, U. Fayyad et al., ed., pp. 249-271, AAAI/MIT Press, 1996.
    • (1996) Advances in Knowledge Discovery and Data Mining , pp. 249-271
    • Klosgen, W.1
  • 38
    • 7044231011 scopus 로고    scopus 로고
    • Explanation-Oriented Association Mining Using a Combination of Unsupervised and Super-vised Learning Algorithms
    • Y. Yao, Y. Zhao, and R. Maguire, "Explanation-Oriented Association Mining Using a Combination of Unsupervised and Super-vised Learning Algorithms," Proc. Canadian Conf. Artificial intelligence, pp. 527-531, 2003.
    • (2003) Proc. Canadian Conf. Artificial intelligence , pp. 527-531
    • Yao, Y.1    Zhao, Y.2    Maguire, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.