Open Access

Lyapunov–based Anomaly Detection in Preferential Attachment Networks

International Journal of Applied Mathematics and Computer Science's Cover Image
International Journal of Applied Mathematics and Computer Science
Advances in Complex Cloud and Service Oriented Computing (special section, pp. 213-274), Anna Kobusińska, Ching-Hsien Hsu, Kwei-Jay Lin (Eds.)

Cite

Barabási, A.-L. and Albert, R. (1999). Emergence of scaling in random networks, Science286(5439): 509–512.10.1126/science.286.5439.50910521342Search in Google Scholar

Barabási, A.-L. and Pósfai, M. (2016). Network Science, Cambridge University Press, Cambridge.Search in Google Scholar

Bianconi, G. and Barabási, A. L. (2001). Competition and Multiscaling in evolving networks, Europhysics Letters54(4): 436–442.10.1209/epl/i2001-00260-6Search in Google Scholar

Burgess, K. and Passino, K. (1995). Stability analysis of load balancing systems, International Journal of Control61(2): 357–393.10.1080/00207179508921907Search in Google Scholar

Caldarelli, G., Capocci, A., De Los Rios, P. and Muñoz, M.A. (2002). Scale-free networks from varying vertex intrinsic fitness, Physical Review Letters89(25): 258702.10.1103/PhysRevLett.89.25870212484927Search in Google Scholar

Chandola, V., Banerjee, A. and Kumar, V. (2009). Anomaly detection: A survey, ACM Computing Surveys41(3): 15:1–15:58.10.1145/1541880.1541882Search in Google Scholar

Chen, Q. and Shi, D. (2004). The modeling of scale-free networks, Physica A: Statistical Mechanics and Its Applications335(1): 240–248.10.1016/j.physa.2003.12.014Search in Google Scholar

Choromanski, K., Matuszak, M. and Miekisz, J. (2013). Scale-free graph with preferential attachment and evolving internal vertex structure, Journal of Statistical Physics151(6): 1175–1183.10.1007/s10955-013-0749-1Search in Google Scholar

Dorogovtsev, S.N., Mendes, J.F.F. and Samukhin, A.N. (2000). Structure of growing networks with preferential linking, Physical Review Letters85(21): 4633–4636.10.1103/PhysRevLett.85.463311082614Search in Google Scholar

Gogoi, P., Bhattacharyya, D., Borah, B. and Kalita, J.K. (2011). A survey of outlier detection methods in network anomaly identification, The Computer Journal54(4): 570–588.10.1093/comjnl/bxr026Search in Google Scholar

Hirose, S., Yamanishi, K., Nakata, T. and Fujimaki, R. (2009). Network anomaly detection based on eigen equation compression, Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, pp. 1185–1194.10.1145/1557019.1557147Search in Google Scholar

Host-Madsen, A. and Zhang, J. (2018). Coding of graphs with application to graph anomaly detection, 2018 IEEE International Symposium on Information Theory (ISIT), Vail, CO, USA, pp. 1829–1833.10.1109/ISIT.2018.8437551Search in Google Scholar

Jackson, M.O. and Rogers, B.W. (2007). Meeting strangers and friends of friends: How random are social networks?, American Economic Review97(3): 890–915.10.1257/aer.97.3.890Search in Google Scholar

Khalil, H. (2001). Nonlinear Systems, 3rd Edn., Pearson, Upper Saddle River, NJ.Search in Google Scholar

Koutra, D., Shah, N., Vogelstein, J.T., Gallagher, B. and Faloutsos, C. (2016). DELTACON: Principled massive-graph similarity function with attribution, ACM Transactions on Knowledge Discovery Data10(3): 28:1–28:43.10.1145/2824443Search in Google Scholar

Kudělka, M., Zehnalová, Š., Horák, Z., Krömer, P. and Snášel, V. (2015). Local dependency in networks, International Journal of Applied Mathematics and Computer Science25(2): 281–293, DOI: 10.1515/amcs-2015-0022.10.1515/amcs-2015-0022Open DOISearch in Google Scholar

Lee, C.-Y. (2006). Correlations among centrality measures in complex networks, arXiv: 0605220.Search in Google Scholar

Moriano, P. and Finke, J. (2012). Power-law weighted networks from local attachments, Europhysics Letters99(1): 18002.10.1209/0295-5075/99/18002Search in Google Scholar

Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C. and Samatova, N.F. (2015). Anomaly detection in dynamic networks: A survey, WIREs Computational Statistics7(3): 223–247.10.1002/wics.1347Search in Google Scholar

Ruiz, D. and Finke, J. (2013). Invalidation of dynamic network models, Proceedings of the American Control Conference, Washington, DC, USA, pp. 138–143.10.1109/ACC.2013.6579827Search in Google Scholar

Savage, D., Zhang, X., Yu, X., Chou, P. and Wang, Q. (2014). Anomaly detection in online social networks, Social Networks39(C): 62–70.10.1016/j.socnet.2014.05.002Search in Google Scholar

Segarra, S. and Ribeiro, A. (2016). Stability and continuity of centrality measures in weighted graphs, IEEE Transactions on Signal Processing64(3): 543–555.10.1109/TSP.2015.2486740Search in Google Scholar

Shao, Z.-G., Zou, X.-W., Tan, Z.-J. and Jin, Z.-Z. (2006). Growing networks with mixed attachment mechanisms, Journal of Physics A: Mathematical and General39(9): 2035.10.1088/0305-4470/39/9/004Search in Google Scholar

Shoubridge, P., Kraetzl, M., Wallis, W.D. and Bunke, H. (2002). Detection of abnormal change in a time series of graphs, Journal of Interconnection Networks3(01n02): 85–101.10.1142/S0219265902000562Search in Google Scholar

Tong, J., Hou, Z., Zhang, Z. and Kong, X. (2009). Degree correlations in the group preferential model, Journal of Physics A: Mathematical and Theoretical42(27): 275002.10.1088/1751-8113/42/27/275002Search in Google Scholar

Valente, T.W., Coronges, K., Lakon, C. and Costenbader, E. (2008). How correlated are network centrality measures?, Connections28(1): 16–26.Search in Google Scholar

Yu, R., Qiu, H., Wen, Z., Lin, C.-Y. and Liu, Y. (2016). A survey on social media anomaly detection, SIGKDD Explorations18(1): 1–14.10.1145/2980765.2980767Search in Google Scholar

eISSN:
2083-8492
Language:
English
Publication timeframe:
4 times per year
Journal Subjects:
Mathematics, Applied Mathematics