Anomaly detection by discovering bipartite structure on complex networks
暂无分享,去创建一个
[1] P. Jaccard,et al. Etude comparative de la distribution florale dans une portion des Alpes et des Jura , 1901 .
[2] Ali A. Ghorbani,et al. Toward developing a systematic approach to generate benchmark datasets for intrusion detection , 2012, Comput. Secur..
[3] John McHugh,et al. Testing Intrusion detection systems: a critique of the 1998 and 1999 DARPA intrusion detection system evaluations as performed by Lincoln Laboratory , 2000, TSEC.
[4] Zhi-Hua Zhou,et al. Isolation Forest , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[5] Marijana Cosovic,et al. BGP Anomaly Prediction Using Ensemble Learning , 2019 .
[6] Siti Mariyam Shamsuddin,et al. Classification with class imbalance problem: A review , 2015, SOCO 2015.
[7] Mohiuddin Ahmed,et al. A survey of network anomaly detection techniques , 2016, J. Netw. Comput. Appl..
[8] Ying Zhong,et al. HELAD: A novel network anomaly detection model based on heterogeneous ensemble learning , 2020, Comput. Networks.
[9] A. Kraskov,et al. Estimating mutual information. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[10] A. Barabasi,et al. Hierarchical Organization of Modularity in Metabolic Networks , 2002, Science.
[11] Jean-Loup Guillaume,et al. Fast unfolding of communities in large networks , 2008, 0803.0476.
[12] P. Santhi Thilagam,et al. Mining social networks for anomalies: Methods and challenges , 2016, J. Netw. Comput. Appl..
[13] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[14] Ee-Peng Lim,et al. Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles , 2012, 2012 IEEE 12th International Conference on Data Mining.
[15] Andrea Lancichinetti,et al. Community detection algorithms: a comparative analysis: invited presentation, extended abstract , 2009, VALUETOOLS.
[16] Kejiang Ye,et al. Dynamic Network Anomaly Detection System by Using Deep Learning Techniques , 2019, CLOUD.
[17] Danai Koutra,et al. Graph based anomaly detection and description: a survey , 2014, Data Mining and Knowledge Discovery.
[18] Lada A. Adamic,et al. Friends and neighbors on the Web , 2003, Soc. Networks.
[19] Brian W. Kernighan,et al. An efficient heuristic procedure for partitioning graphs , 1970, Bell Syst. Tech. J..
[20] Yiming Yang,et al. The Enron Corpus: A New Dataset for Email Classi(cid:12)cation Research , 2004 .
[21] Shivendra S. Panwar,et al. Topological Design of Interconnected LAN/MAN Networks , 1993, IEEE J. Sel. Areas Commun..
[22] Joel J. P. C. Rodrigues,et al. A comprehensive survey on network anomaly detection , 2018, Telecommunication Systems.
[23] D. Sorensen. IMPLICITLY RESTARTED ARNOLDI/LANCZOS METHODS FOR LARGE SCALE EIGENVALUE CALCULATIONS , 1996 .
[24] Judy Qiu,et al. Anomaly Detection over Streaming Data: Indy500 Case Study , 2019, 2019 IEEE 12th International Conference on Cloud Computing (CLOUD).
[25] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[26] H. White,et al. STRUCTURAL EQUIVALENCE OF INDIVIDUALS IN SOCIAL NETWORKS , 1977 .
[27] R. Real,et al. AUC: a misleading measure of the performance of predictive distribution models , 2008 .
[28] Steve Harenberg,et al. Anomaly detection in dynamic networks: a survey , 2015 .
[29] Guobo Xie,et al. WBNPMD: weighted bipartite network projection for microRNA-disease association prediction , 2019, Journal of Translational Medicine.
[30] Alex Pothen,et al. PARTITIONING SPARSE MATRICES WITH EIGENVECTORS OF GRAPHS* , 1990 .
[31] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[32] Tharam S. Dillon,et al. CorrCorr: A feature selection method for multivariate correlation network anomaly detection techniques , 2019, Comput. Secur..
[33] Kok-Leong Ong,et al. Fraud detection: A systematic literature review of graph-based anomaly detection approaches , 2020, Decis. Support Syst..
[34] Luca Foschini,et al. Balanced Partitions of Trees and Applications , 2012, Algorithmica.