A survey of network anomaly detection techniques

M Ahmed, AN Mahmood, J Hu - Journal of Network and Computer …, 2016 - Elsevier
Abstract Information and Communication Technology (ICT) has a great impact on social
wellbeing, economic growth and national security in todays world. Generally, ICT includes …

A classification for community discovery methods in complex networks

M Coscia, F Giannotti… - Statistical Analysis and …, 2011 - Wiley Online Library
Many real‐world networks are intimately organized according to a community structure.
Much research effort has been devoted to develop methods and algorithms that can …

[BOOK][B] Model-based clustering and classification for data science: with applications in R

C Bouveyron, G Celeux, TB Murphy, AE Raftery - 2019 - books.google.com
Cluster analysis finds groups in data automatically. Most methods have been heuristic and
leave open such central questions as: how many clusters are there? Which method should I …

Families of alpha-beta-and gamma-divergences: Flexible and robust measures of similarities

A Cichocki, S Amari - Entropy, 2010 - mdpi.com
In this paper, we extend and overview wide families of Alpha-, Beta-and Gamma-
divergences and discuss their fundamental properties. In literature usually only one single …

Regression-based latent factor models

D Agarwal, BC Chen - Proceedings of the 15th ACM SIGKDD …, 2009 - dl.acm.org
We propose a novel latent factor model to accurately predict response for large scale dyadic
data in the presence of features. Our approach is based on a model that predicts response …

A scalable collaborative filtering framework based on co-clustering

T George, S Merugu - … Conference on Data Mining (ICDM'05), 2005 - ieeexplore.ieee.org
Collaborative filtering-based recommender systems have become extremely popular due to
the increase in Web-based activities such as e-commerce and online content distribution …

Copycatch: stop** group attacks by spotting lockstep behavior in social networks

A Beutel, W Xu, V Guruswami, C Palow… - Proceedings of the 22nd …, 2013 - dl.acm.org
How can web services that depend on user generated content discern fraudulent input by
spammers from legitimate input? In this paper we focus on the social network Facebook and …

[BOOK][B] Modern algorithms of cluster analysis

ST Wierzchoń, MA Kłopotek - 2018 - Springer
This chapter characterises the scope of this book. It explains the reasons why one should be
interested in cluster analysis, lists major application areas, basic theoretical and practical …

Divergence measures for statistical data processing—An annotated bibliography

M Basseville - Signal Processing, 2013 - Elsevier
Divergence measures for statistical data processing—An annotated bibliography -
ScienceDirect Skip to main contentSkip to article Elsevier logo Journals & Books Search …

[BOOK][B] Co-clustering: models, algorithms and applications

G Govaert, M Nadif - 2013 - books.google.com
Cluster or co-cluster analyses are important tools in a variety of scientific areas. The
introduction of this book presents a state of the art of already well-established, as well as …