{"id":"https://openalex.org/W2406996709","doi":"https://doi.org/10.1137/1.9781611972832.4","title":"NetSpot: Spotting Significant Anomalous Regions on Dynamic Networks","display_name":"NetSpot: Spotting Significant Anomalous Regions on Dynamic Networks","publication_year":2013,"publication_date":"2013-05-02","ids":{"openalex":"https://openalex.org/W2406996709","doi":"https://doi.org/10.1137/1.9781611972832.4","mag":"2406996709"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1137/1.9781611972832.4","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5007291317","display_name":"Misael Mongiov\u0131\u0300","orcid":"https://orcid.org/0000-0003-0528-5490"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Misael Mongiov\u00ec","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5001272357","display_name":"Petko Bogdanov","orcid":"https://orcid.org/0000-0001-6310-3224"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Petko Bogdanov","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012509853","display_name":"Razvan Ranca","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Razvan Ranca","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054849323","display_name":"Evangelos E. Papalexakis","orcid":"https://orcid.org/0000-0002-3411-8483"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Evangelos E. Papalexakis","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":"https://openalex.org/A5035605036","display_name":"Christos Faloutsos","orcid":"https://orcid.org/0000-0003-2996-9790"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Christos Faloutsos","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":"https://openalex.org/A5036639779","display_name":"Ambuj K. Singh","orcid":"https://orcid.org/0000-0002-1997-7140"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Ambuj K. Singh","raw_affiliation_strings":[],"affiliations":[]}],"institution_assertions":[],"countries_distinct_count":0,"institutions_distinct_count":0,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":4.963,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":103,"citation_normalized_percentile":{"value":0.942582,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"28","last_page":"36"},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9992,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9988,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9782,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/spotting","display_name":"Spotting","score":0.84034026}],"concepts":[{"id":"https://openalex.org/C2779506182","wikidata":"https://www.wikidata.org/wiki/Q7580141","display_name":"Spotting","level":2,"score":0.84034026},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.77103263},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.6358153},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.5532302},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.44444987},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.4147993},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3742416},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.32722032},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.0},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1137/1.9781611972832.4","pdf_url":null,"source":null,"license":null,"license_id":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"datasets":[],"versions":[],"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W4386895402","https://openalex.org/W4380551034","https://openalex.org/W4362466842","https://openalex.org/W4255446307","https://openalex.org/W4249589822","https://openalex.org/W3202382261","https://openalex.org/W3184921334","https://openalex.org/W2988098900","https://openalex.org/W2103063669","https://openalex.org/W2034439647"],"abstract_inverted_index":{"Previous":[0,262],"chapter":[1,3,263,265],"Next":[2,264],"Full":[4],"AccessProceedings":[5],"Proceedings":[6],"of":[7,89,150,176,223,234,239],"the":[8,133,148,167,214,221],"2013":[9],"SIAM":[10],"International":[11],"Conference":[12],"on":[13,21,112,216,228],"Data":[14],"Mining":[15],"(SDM)NetSpot:":[16],"Spotting":[17],"Significant":[18,140],"Anomalous":[19,141],"Regions":[20,142],"Dynamic":[22],"NetworksMisael":[23],"Mongiov\u00ec,":[24,38],"Petko":[25,39],"Bogdanov,":[26,40],"Razvan":[27,41],"Ranca,":[28,42],"Evangelos":[29,43],"E.":[30,44],"Papalexakis,":[31,45],"Christos":[32,46],"Faloutsos,":[33,47],"and":[34,48,64,76,101,114,201,231,250],"Ambuj":[35,49],"K.":[36,50],"SinghMisael":[37],"Singhpp.28":[51],"-":[52],"36Chapter":[53],"DOI:https://doi.org/10.1137/1.9781611972832.4PDFBibTexSections":[54],"ToolsAdd":[55],"to":[56,62,166,173,237,258],"favoritesExport":[57],"CitationTrack":[58],"CitationsEmail":[59],"SectionsAboutAbstract":[60],"How":[61],"spot":[63],"summarize":[65],"anomalies":[66],"in":[67,179,246,255],"dynamic":[68],"networks":[69,75,230],"such":[70,82,116,139],"as":[71,83,125,127,157,159],"road":[72,229],"networks,":[73,253],"communication":[74],"social":[77],"networks?":[78],"An":[79],"anomalous":[80,118,235],"event,":[81],"a":[84,87,93],"traffic":[85],"accident,":[86],"denial":[88],"service":[90],"attack":[91],"or":[92],"chemical":[94],"spill,":[95],"can":[96],"affect":[97],"several":[98,107],"near-by":[99],"edges":[100],"make":[102],"them":[103],"behave":[104],"abnormally,":[105],"over":[106],"consecutive":[108],"time-ticks.":[109],"We":[110,241],"focus":[111],"spotting":[113],"summarizing":[115],"significant":[117],"regions,":[119],"spanning":[120,254],"space":[121],"(i.e.":[122],"nearby":[123],"edges),":[124],"well":[126,158],"time.":[128],"Our":[129],"first":[130],"contribution":[131,146,212],"is":[132,147,171,195,213],"problem":[134,204],"formulation,":[135],"namely":[136],"finding":[137],"all":[138],"(SAR).":[143],"The":[144,210],"next":[145],"design":[149],"novel":[151],"algorithms:":[152],"an":[153,160],"expensive,":[154],"exhaustive":[155,168],"algorithm,":[156,169],"efficient":[161],"approximation,":[162],"called":[163],"NETSPOT.":[164],"Compared":[165],"NETSPOT":[170,224],"up":[172,257],"one":[174],"order":[175],"magnitude":[177],"faster":[178,200],"real":[180,217],"data,":[181],"while":[182],"achieving":[183],"less":[184],"than":[185,197],"4%":[186],"average":[187],"relative":[188],"error":[189],"rate.":[190],"In":[191],"synthetic":[192,251],"datasets,":[193],"it":[194],"more":[196],"30":[198],"times":[199],"solves":[202],"large":[203,247],"instances":[205],"that":[206],"are":[207],"otherwise":[208],"infeasible.":[209],"final":[211],"validation":[215],"data:":[218],"we":[219],"demonstrate":[220],"utility":[222],"for":[225],"inferring":[226],"accidents":[227],"detecting":[232],"patterns":[233],"access":[236],"subnetworks":[238],"Wikipedia.":[240],"also":[242],"study":[243],"NETSPOT'S":[244],"scalability":[245],"social,":[248],"transportation":[249],"evolving":[252],"total":[256],"50":[259],"million":[260],"edges.":[261],"RelatedDetails":[266],"Published:2013ISBN:978-1-61197-262-7eISBN:978-1-61197-283-2":[267],"https://doi.org/10.1137/1.9781611972832Book":[268],"Series":[269],"Name:ProceedingsBook":[270],"Code:PRDT13Book":[271],"Pages:1-804":[272]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2406996709","counts_by_year":[{"year":2023,"cited_by_count":7},{"year":2022,"cited_by_count":4},{"year":2021,"cited_by_count":10},{"year":2020,"cited_by_count":17},{"year":2019,"cited_by_count":17},{"year":2018,"cited_by_count":14},{"year":2017,"cited_by_count":9},{"year":2016,"cited_by_count":10},{"year":2015,"cited_by_count":4},{"year":2014,"cited_by_count":8},{"year":2013,"cited_by_count":3}],"updated_date":"2025-01-02T10:29:18.253346","created_date":"2016-06-24"}