Frequent pattern mining: current status and future directions

J Han, H Cheng, D **n, X Yan - Data mining and knowledge discovery, 2007 - Springer
Frequent pattern mining has been a focused theme in data mining research for over a
decade. Abundant literature has been dedicated to this research and tremendous progress …

Spectrum-based software fault localization: A survey of techniques, advances, and challenges

HA de Souza, ML Chaim, F Kon - arxiv preprint arxiv:1607.04347, 2016 - arxiv.org
Despite being one of the most basic tasks in software development, debugging is still
performed in a mostly manual way, leading to high cost and low performance. To address …

Unicorn: Runtime provenance-based detector for advanced persistent threats

X Han, T Pasquier, A Bates, J Mickens… - arxiv preprint arxiv …, 2020 - arxiv.org
Advanced Persistent Threats (APTs) are difficult to detect due to their" low-and-slow" attack
patterns and frequent use of zero-day exploits. We present UNICORN, an anomaly-based …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

Frequent pattern mining algorithms: A survey

CC Aggarwal, MA Bhuiyan, MA Hasan - Frequent pattern mining, 2014 - Springer
This chapter will provide a detailed survey of frequent pattern mining algorithms. A wide
variety of algorithms will be covered starting from Apriori. Many algorithms such as Eclat …

A survey on software fault localization

WE Wong, R Gao, Y Li, R Abreu… - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Software fault localization, the act of identifying the locations of faults in a program, is widely
recognized to be one of the most tedious, time consuming, and expensive-yet equally critical …

Fast memory-efficient anomaly detection in streaming heterogeneous graphs

E Manzoor, SM Milajerdi, L Akoglu - Proceedings of the 22nd ACM …, 2016 - dl.acm.org
Given a stream of heterogeneous graphs containing different types of nodes and edges,
how can we spot anomalous ones in real-time while consuming bounded memory? This …

Oddball: Spotting anomalies in weighted graphs

L Akoglu, M McGlohon, C Faloutsos - … and Data Mining: 14th Pacific-Asia …, 2010 - Springer
Given a large, weighted graph, how can we find anomalies? Which rules should be violated,
before we label a node as an anomaly? We propose the oddball algorithm, to find such …

GPLAG: detection of software plagiarism by program dependence graph analysis

C Liu, C Chen, J Han, PS Yu - Proceedings of the 12th ACM SIGKDD …, 2006 - dl.acm.org
Along with the blossom of open source projects comes the convenience for software
plagiarism. A company, if less self-disciplined, may be tempted to plagiarize some open …

Graph-based root cause analysis for service-oriented and microservice architectures

Á Brandón, M Solé, A Huélamo, D Solans… - Journal of Systems and …, 2020 - Elsevier
Abstract Service-oriented architectures and microservices define two ways of designing
software with the aim of dividing an application into loosely-coupled services that …