A survey of network anomaly detection techniques
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
wellbeing, economic growth and national security in todays world. Generally, ICT includes …
A classification for community discovery methods in complex networks
Many real‐world networks are intimately organized according to a community structure.
Much research effort has been devoted to develop methods and algorithms that can …
Much research effort has been devoted to develop methods and algorithms that can …
[BOOK][B] Model-based clustering and classification for data science: with applications in R
Cluster analysis finds groups in data automatically. Most methods have been heuristic and
leave open such central questions as: how many clusters are there? Which method should I …
leave open such central questions as: how many clusters are there? Which method should I …
Families of alpha-beta-and gamma-divergences: Flexible and robust measures of similarities
In this paper, we extend and overview wide families of Alpha-, Beta-and Gamma-
divergences and discuss their fundamental properties. In literature usually only one single …
divergences and discuss their fundamental properties. In literature usually only one single …
Regression-based latent factor models
D Agarwal, BC Chen - Proceedings of the 15th ACM SIGKDD …, 2009 - dl.acm.org
We propose a novel latent factor model to accurately predict response for large scale dyadic
data in the presence of features. Our approach is based on a model that predicts response …
data in the presence of features. Our approach is based on a model that predicts response …
A scalable collaborative filtering framework based on co-clustering
T George, S Merugu - … Conference on Data Mining (ICDM'05), 2005 - ieeexplore.ieee.org
Collaborative filtering-based recommender systems have become extremely popular due to
the increase in Web-based activities such as e-commerce and online content distribution …
the increase in Web-based activities such as e-commerce and online content distribution …
Copycatch: stop** group attacks by spotting lockstep behavior in social networks
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …
spammers from legitimate input? In this paper we focus on the social network Facebook and …
[BOOK][B] Modern algorithms of cluster analysis
ST Wierzchoń, MA Kłopotek - 2018 - Springer
This chapter characterises the scope of this book. It explains the reasons why one should be
interested in cluster analysis, lists major application areas, basic theoretical and practical …
interested in cluster analysis, lists major application areas, basic theoretical and practical …
Divergence measures for statistical data processing—An annotated bibliography
M Basseville - Signal Processing, 2013 - Elsevier
Divergence measures for statistical data processing—An annotated bibliography -
ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & Books Search …
ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & Books Search …
[BOOK][B] Co-clustering: models, algorithms and applications
G Govaert, M Nadif - 2013 - books.google.com
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The
introduction of this book presents a state of the art of already well-established, as well as …
introduction of this book presents a state of the art of already well-established, as well as …