메뉴 건너뛰기




Volumn , Issue , 2011, Pages 1197-1202

Detecting anomalies in graphs with numeric labels

Author keywords

access control systems; anomaly detection; graph mining; transaction graphs

Indexed keywords

ANOMALY DETECTION; DISCRETIZATION ALGORITHMS; GRAPH MINING; QUALITATIVE EVALUATIONS; STRUCTURAL DATA; TRANSACTION GRAPHS;

EID: 83055191198     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2063576.2063749     Document Type: Conference Paper
Times cited : (38)

References (14)
  • 2
    • 83055188450 scopus 로고    scopus 로고
    • Security in physical environments: Algorithms and system for automated detection of suspicious activity
    • Springer
    • R. P. Biuk-Aghai, Y.-W. Si, S. Fong, and P.-F. Yan. Security in physical environments: Algorithms and system for automated detection of suspicious activity. In Workshop on Behavior Informatics 2010. Springer, 2010.
    • (2010) Workshop on Behavior Informatics 2010
    • Biuk-Aghai, R.P.1    Si, Y.-W.2    Fong, S.3    Yan, P.-F.4
  • 3
    • 0039253819 scopus 로고    scopus 로고
    • LOF: Identifying density-based local outliers
    • M. M. Breunig, H.-P. Kriegel, R. T. Ng, and J. Sander. LOF: Identifying density-based local outliers. SIGMOD Rec., 29(2):93-104, 2000.
    • (2000) SIGMOD Rec. , vol.29 , Issue.2 , pp. 93-104
    • Breunig, M.M.1    Kriegel, H.-P.2    Ng, R.T.3    Sander, J.4
  • 5
    • 67650469158 scopus 로고    scopus 로고
    • Mining for insider threats in business transactions and processes
    • March
    • W. Eberle and L. Holder. Mining for insider threats in business transactions and processes. In Computational Int. and Data Mining, 2009, pages 163-170, March 2009.
    • (2009) Computational Int. and Data Mining, 2009 , pp. 163-170
    • Eberle, W.1    Holder, L.2
  • 7
    • 0037410488 scopus 로고    scopus 로고
    • Discovering cluster-based local outliers
    • Z. He, X. Xu, and S. Deng. Discovering cluster-based local outliers. Pattern Recog. Letters, 24(9-10):1641-1650, 2003.
    • (2003) Pattern Recog. Letters , vol.24 , Issue.9-10 , pp. 1641-1650
    • He, Z.1    Xu, X.2    Deng, S.3
  • 9
    • 84862621856 scopus 로고    scopus 로고
    • Visualization of host behavior for network security
    • Mathematics and Visualization. Springer
    • F. Mansman, L. Meier, and D. A. Keim. Visualization of host behavior for network security. In VIZSEC 2007, Mathematics and Visualization. Springer, 2008.
    • (2008) VIZSEC 2007
    • Mansman, F.1    Meier, L.2    Keim, D.A.3
  • 12
    • 0039845384 scopus 로고    scopus 로고
    • Efficient algorithms for mining outliers from large data sets
    • May
    • S. Ramaswamy, R. Rastogi, and K. Shim. Efficient algorithms for mining outliers from large data sets. SIGMOD Rec., 29:427-438, May 2000.
    • (2000) SIGMOD Rec. , vol.29 , pp. 427-438
    • Ramaswamy, S.1    Rastogi, R.2    Shim, K.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.