{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T08:49:59Z","timestamp":1775292599012,"version":"3.50.1"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030054106","type":"print"},{"value":"9783030054113","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,12,2]],"date-time":"2018-12-02T00:00:00Z","timestamp":1543708800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-05411-3_20","type":"book-chapter","created":{"date-parts":[[2018,12,1]],"date-time":"2018-12-01T15:37:22Z","timestamp":1543678642000},"page":"244-255","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":8,"title":["A Community-Aware Approach for Identifying Node Anomalies in Complex Networks"],"prefix":"10.1007","author":[{"given":"Thomas J.","family":"Helling","sequence":"first","affiliation":[]},{"given":"Johannes C.","family":"Scholtes","sequence":"additional","affiliation":[]},{"given":"Frank W.","family":"Takes","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,2]]},"reference":[{"key":"20_CR1","unstructured":"Akoglu, L., Mcglohon, M., Faloutsos, C.: Anomaly detection in large graphs. In: CMU-CS-09-173 Technical Report (2009)"},{"issue":"3","key":"20_CR2","doi-asserted-by":"crossref","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Discov. 29(3), 626\u2013688 (2015)","journal-title":"Data Min. Knowl. Discov."},{"key":"20_CR3","unstructured":"Barab\u00e1si, A.L.: Network Science. Cambridge University Press (2016)"},{"key":"20_CR4","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1016\/j.jnca.2016.02.021","volume":"68","author":"PV Bindu","year":"2016","unstructured":"Bindu, P.V., Thilagam, P.S.: Mining social networks for anomalies: methods and challenges. J. Netw. Comput. Appl. 68, 213\u2013229 (2016)","journal-title":"J. Netw. Comput. Appl."},{"issue":"10","key":"20_CR5","first-page":"6","volume":"10008","author":"VD Blondel","year":"2008","unstructured":"Blondel, V.D., Guillaume, J.L., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 10008(10), 6 (2008)","journal-title":"J. Stat. Mech. Theory Exp."},{"issue":"September","key":"20_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(September), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"20_CR7","doi-asserted-by":"crossref","unstructured":"Denning, D.E.: An intrusion-detection model. In: Proceedings of IEEE Symposium on Security and Privacy, pp. 118\u2013131 (2012)","DOI":"10.1109\/SP.1986.10010"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Fortunato, S.: Community detection in graphs (2010)","DOI":"10.1007\/978-0-387-30440-3_76"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Hassanzadeh, R., Nayak, R., Stebila, D.: Analyzing the effectiveness of graph metrics for anomaly detection in online social networks. In: Lecture Notes in Computer Science, vol. 7651, pp. 624\u2013630 (2012)","DOI":"10.1007\/978-3-642-35063-4_45"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Haveliwala, T.H.: Topic-sensitive PageRank. In: Proceedings of 11th International Conference on World Wide Web, pp. 517\u2013526 (2002)","DOI":"10.1145\/511446.511513"},{"key":"20_CR11","doi-asserted-by":"crossref","unstructured":"Henderson, K., et al.: It\u2019s who you know: graph mining using recursive structural features. In: Proceedings of 17th ACM International Conference on Knowledge Discovery and Data Mining, p. 663 (2011)","DOI":"10.1145\/2020408.2020512"},{"key":"20_CR12","doi-asserted-by":"crossref","unstructured":"Hu, R., Aggarwal, C.C., Ma, S., Huai, J.: An embedding approach to anomaly detection. In: Proceedings of 32nd IEEE International Conference on Data Engineering, pp. 385\u2013396 (2016)","DOI":"10.1109\/ICDE.2016.7498256"},{"key":"20_CR13","unstructured":"Janssens, J.: Outlier Selection and One-Class Classification. Maastricht University (2013)"},{"key":"20_CR14","doi-asserted-by":"crossref","first-page":"294","DOI":"10.1016\/j.compeleceng.2016.11.018","volume":"57","author":"R Kaur","year":"2017","unstructured":"Kaur, R., Singh, S.: A comparative analysis of structural graph metrics to identify anomalies in online social networks. Comput. Electr. Eng. 57, 294\u2013310 (2017)","journal-title":"Comput. Electr. Eng."},{"key":"20_CR15","first-page":"37","volume":"6","author":"V Krishnan","year":"2006","unstructured":"Krishnan, V., Raj, R.: Web spam detection with anti-trust rank. AIRWeb 6, 37\u201340 (2006)","journal-title":"AIRWeb"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Lancichinetti, A., Fortunato, S., Radicchi, F.: Benchmark graphs for testing community detection algorithms. Phys. Rev. E 78(4) (2008)","DOI":"10.1103\/PhysRevE.78.046110"},{"issue":"1999\u201366","key":"20_CR17","first-page":"1","volume":"54","author":"L Page","year":"1998","unstructured":"Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank Citation Ranking: Bringing Order to the Web. World Wide Web Internet Web Inf. Syst. 54(1999\u201366), 1\u201317 (1998)","journal-title":"World Wide Web Internet Web Inf. Syst."},{"issue":"4","key":"20_CR18","doi-asserted-by":"crossref","first-page":"1118","DOI":"10.1073\/pnas.0706851105","volume":"105","author":"M Rosvall","year":"2008","unstructured":"Rosvall, M., Bergstrom, C.: Maps of random walks on complex networks reveal community structure. Proc. Natl. Acad. Sci. 105(4), 1118\u20131123 (2008)","journal-title":"Proc. Natl. Acad. Sci."},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Rosvall, M., Bergstrom, C.T.: Multilevel compression of random walks on networks reveals hierarchical organization in large integrated systems. PLoS ONE 6(4) (2011)","DOI":"10.1371\/journal.pone.0018209"},{"key":"20_CR20","unstructured":"Sun, J., Qu, H., Chakr, D., Faloutsos, C.: Neighorhood formation and anomaly detection in bipartite graphs. In: Proceedings of SIAM Conference on Data Mining, pp. 1\u20138 (2008)"},{"key":"20_CR21","doi-asserted-by":"crossref","unstructured":"Tong, H., Lin, C.: Non-negative residual matrix factorization with application to graph anomaly detection. In: Proceedings of SIAM Conference on Data Mining, pp. 143\u2013153 (2011)","DOI":"10.1137\/1.9781611972818.13"},{"issue":"4","key":"20_CR22","doi-asserted-by":"crossref","first-page":"425","DOI":"10.2307\/2786545","volume":"32","author":"J Travers","year":"1969","unstructured":"Travers, J., Milgram, S.: An experimental study of the small world problem. Sociometry 32(4), 425 (1969)","journal-title":"Sociometry"},{"issue":"6684","key":"20_CR23","doi-asserted-by":"crossref","first-page":"440","DOI":"10.1038\/30918","volume":"393","author":"DJ Watts","year":"1998","unstructured":"Watts, D.J., Strogatz, S.H.: Collective dynamics of \u2018small-world\u2019 networks. Nature 393(6684), 440\u2013442 (1998)","journal-title":"Nature"},{"key":"20_CR24","doi-asserted-by":"crossref","unstructured":"Xu, X., Yuruk, N., Feng, Z., Schweiger, T.A.J.: SCAN: a structural clustering algorithm for networks. In: Proceedings of 13th ACM International Conference on Knowledge Discovery and Data Mining, pp. 824\u2013833 (2007)","DOI":"10.1145\/1281192.1281280"},{"key":"20_CR25","unstructured":"Kou, Y., Lu, C.-T., Sirwongwattana, S., Huang, Y.-P.: Survey of fraud detection techniques. In: Proceedings of IEEE International Conference on Networking, Sensing and Control, 2004, pp. 749\u2013754 (2004)"}],"container-title":["Studies in Computational Intelligence","Complex Networks and Their Applications VII"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05411-3_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T07:55:47Z","timestamp":1775289347000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05411-3_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12,2]]},"ISBN":["9783030054106","9783030054113"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05411-3_20","relation":{},"ISSN":["1860-949X","1860-9503"],"issn-type":[{"value":"1860-949X","type":"print"},{"value":"1860-9503","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,2]]},"assertion":[{"value":"COMPLEX NETWORKS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Complex Networks and their Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cambridge","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iwcna2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.complexnetworks.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}