-
1
-
-
32944463447
-
Knowledge representation issues in semantic graphs for relationship detection
-
AAAI Press
-
Barthélemy, M., Chow, E. and Eliassi-Rad, T, Knowledge Representation Issues in Semantic Graphs for Relationship Detection. AI Technologies for Homeland Security: Papers from the 2005 AAAI Spring Symposium, AAAI Press, 2005, pp. 91-98.
-
(2005)
AI Technologies for Homeland Security: Papers from the 2005 AAAI Spring Symposium
, pp. 91-98
-
-
Barthélemy, M.1
Chow, E.2
Eliassi-Rad, T.3
-
2
-
-
18244405757
-
Leveraging social networks to fight spam
-
April 2005
-
Boykin, P. and Roychowdhury, V. Leveraging Social Networks to Fight Spam. IEEE Computer, April 2005, 38(4), 61-67, 2005.
-
(2005)
IEEE Computer
, vol.38
, Issue.4
, pp. 61-67
-
-
Boykin, P.1
Roychowdhury, V.2
-
3
-
-
0033721503
-
Graph structure in the web
-
Broder, A., Kumar, R., Maghoul, F., Raghavan, P., Rajagopalan, S., Stata, R., Tomkins, A. and Wiener, J. Graph Structure in the Web. Computer Networks, Vol. 33, 309-320, 2000.
-
(2000)
Computer Networks
, vol.33
, pp. 309-320
-
-
Broder, A.1
Kumar, R.2
Maghoul, F.3
Raghavan, P.4
Rajagopalan, S.5
Stata, R.6
Tomkins, A.7
Wiener, J.8
-
4
-
-
11844281602
-
Clustering as an add-on for firewalls
-
WIT Press
-
Caruso, C. and Malerba, D. Clustering as an add-on for firewalls. Data Mining, WIT Press, 2004.
-
(2004)
Data Mining
-
-
Caruso, C.1
Malerba, D.2
-
6
-
-
0038087282
-
Eigenvalues of random power law graphs
-
Chung, F., Lu, L., Vu, V. Eigenvalues of Random Power Law Graphs. Annals of Combinatorics, 7, 21-33, 2003.
-
(2003)
Annals of Combinatorics
, vol.7
, pp. 21-33
-
-
Chung, F.1
Lu, L.2
Vu, V.3
-
13
-
-
4544314758
-
Substructure discovery in the SUBDUE system
-
Holder, L., Cook, D. and Djoko, S. Substructure Discovery in the SUBDUE System. Proceedings of the AAAI Workshop on Knowledge Discover in Databases, pp. 169-180, 1994.
-
(1994)
Proceedings of the AAAI Workshop on Knowledge Discover in Databases
, pp. 169-180
-
-
Holder, L.1
Cook, D.2
Djoko, S.3
-
14
-
-
24044478763
-
Graph-based relational learning with application to security
-
March
-
Holder, L., Cook, D., Coble, J., and Mukherjee, M. Graph-based Relational Learning with Application to Security. Fundamenta Informaticae Special Issue on Mining Graphs, Trees and Sequences, 66(1-2):83-101, March 2005.
-
(2005)
Fundamenta Informaticae Special Issue on Mining Graphs, Trees and Sequences
, vol.66
, Issue.1-2
, pp. 83-101
-
-
Holder, L.1
Cook, D.2
Coble, J.3
Mukherjee, M.4
-
15
-
-
12244294770
-
SPIN: Mining maximal frequent subgraphs from graph databases
-
Huan, J., Wang, W. and Prins, J. SPIN: Mining Maximal Frequent Subgraphs from Graph Databases. Knowledge Discovery and Data Mining, KDD '04, 2004.
-
(2004)
Knowledge Discovery and Data Mining, KDD '04
-
-
Huan, J.1
Wang, W.2
Prins, J.3
-
25
-
-
84957885501
-
The case for anomalous link discovery
-
Rattigan, M. and Jensen, D. The case for anomalous link discovery. ACM SIGKDD Explor. Newsl., 7(2):41-47, 2005.
-
(2005)
ACM SIGKDD Explor. Newsl.
, vol.7
, Issue.2
, pp. 41-47
-
-
Rattigan, M.1
Jensen, D.2
-
29
-
-
0000949239
-
GrIDS - A graph based intrusion detection system for large networks
-
Staniford-Chen, S., Cheung, S., Crawford, R., Dilger, M., Frank, J., Hoagland, J., Levitt, K., Wee, C., Yip, R. and Zerkle, D. GrIDS - A Graph Based Intrusion Detection System for Large Networks. Proceedings of the 19th National Information Systems Security Conference, 1996.
-
(1996)
Proceedings of the 19th National Information Systems Security Conference
-
-
Staniford-Chen, S.1
Cheung, S.2
Crawford, R.3
Dilger, M.4
Frank, J.5
Hoagland, J.6
Levitt, K.7
Wee, C.8
Yip, R.9
Zerkle, D.10
-
30
-
-
33749416395
-
Relevance search and anomaly detection in bipartite graphs
-
Sun, J, Qu, H., Chakrabarti, D. and Faloutsos, C. Relevance search and anomaly detection in bipartite graphs. SIGKDD Explorations 7(2), 48-55, 2005.
-
(2005)
SIGKDD Explorations
, vol.7
, Issue.2
, pp. 48-55
-
-
Sun, J.1
Qu, H.2
Chakrabarti, D.3
Faloutsos, C.4
-
31
-
-
27344450574
-
Data mining and domestic security: Connecting the dots to make sense of data
-
Taipale, K. Data Mining and Domestic Security: Connecting the Dots to Make Sense of Data. Columbia Science and Technology Law Review, 2003.
-
(2003)
Columbia Science and Technology Law Review
-
-
Taipale, K.1
-
32
-
-
34748817998
-
MARGIN: Maximal frequent subgraph mining
-
Thomas, L., Valluri, S. and Karlapalem, K. MARGIN: Maximal Frequent Subgraph Mining. Sixth International Conference on Data Mining (ICMD '06), 109-1101, 2006.
-
(2006)
Sixth International Conference on Data Mining (ICMD '06)
, pp. 109-1101
-
-
Thomas, L.1
Valluri, S.2
Karlapalem, K.3
-
34
-
-
84892313782
-
-
WEKA, http://www.cs.waikato.ac.nz/~ml/index.html.
-
WEKA
-
-
-
35
-
-
0003736078
-
-
Prentice-Hall International. Second Edition
-
West, D. Introduction to Graph Theory. Prentice-Hall International. Second Edition. 2001.
-
(2001)
Introduction to Graph Theory
-
-
West, D.1
-
37
-
-
33749560883
-
Coherent closed quasi-clique discovery from large dense graph databases
-
SIGKDD
-
Zeng, Z., Wang, J., Zhou, L. and Karypis, G. Coherent closed quasi-clique discovery from large dense graph databases. Conference on Knowledge Discovery in Data, SIGKDD, 797-802, 2006.
-
(2006)
Conference on Knowledge Discovery in Data
, pp. 797-802
-
-
Zeng, Z.1
Wang, J.2
Zhou, L.3
Karypis, G.4
|