Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Anomaly detection in dynamic networks: a survey
Anomaly detection is an important problem with multiple applications, and thus has been
studied for decades in various research domains. In the past decade there has been a …
studied for decades in various research domains. In the past decade there has been a …
Graph based anomaly detection and description: a survey
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …
such as security, finance, health care, and law enforcement. While numerous techniques …
Outlier detection for temporal data: A survey
In the statistics community, outlier detection for time series data has been studied for
decades. Recently, with advances in hardware and software technology, there has been a …
decades. Recently, with advances in hardware and software technology, there has been a …
[PDF][PDF] A survey on different graph based anomaly detection techniques
D Sensarma, SS Sarma - Indian J Sci Technol, 2015 - sciresol.s3.us-east-2.amazonaws …
This survey paper cites some methods of graph based anomaly detection in the field of
information security, finance, cybersecurity, online social networks, health care, law …
information security, finance, cybersecurity, online social networks, health care, law …
Dynamic graph-based anomaly detection in the electrical grid
Given sensor readings over time from a power grid, how can we accurately detect when an
anomaly occurs? A key part of achieving this goal is to use the network of power grid …
anomaly occurs? A key part of achieving this goal is to use the network of power grid …
Detecting malicious logins as graph anomalies
BA Powell - Journal of information security and applications, 2020 - Elsevier
Authenticated lateral movement via compromised accounts is a common adversarial
maneuver that is challenging to discover with signature-or rules-based intrusion detection …
maneuver that is challenging to discover with signature-or rules-based intrusion detection …
Relative Hausdorff distance for network analysis
Similarity measures are used extensively in machine learning and data science algorithms.
The newly proposed graph Relative Hausdorff (RH) distance is a lightweight yet nuanced …
The newly proposed graph Relative Hausdorff (RH) distance is a lightweight yet nuanced …
A swarm intelligence-based approach to anomaly detection of dynamic systems
H Agharazi, RM Kolacinski, W Theeranaew… - Swarm and Evolutionary …, 2019 - Elsevier
We propose a novel Swarm Intelligence-based approach for anomaly detection of dynamic
systems. Specifically, we consider observation processes for dynamic systems from a …
systems. Specifically, we consider observation processes for dynamic systems from a …
Designing size consistent statistics for accurate anomaly detection in dynamic networks
An important task in network analysis is the detection of anomalous events in a network time
series. These events could merely be times of interest in the network timeline or they could …
series. These events could merely be times of interest in the network timeline or they could …
Real-time abnormal change detection in graphs
(57) ABSTRACT A method for detecting abnormal changes in real-time in dynamic graphs.
The method includes extracting, by a graph sampler, an active sampled graph from an …
The method includes extracting, by a graph sampler, an active sampled graph from an …