{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:14:17Z","timestamp":1743030857890,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031157769"},{"type":"electronic","value":"9783031157776"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-15777-6_28","type":"book-chapter","created":{"date-parts":[[2022,8,23]],"date-time":"2022-08-23T15:24:33Z","timestamp":1661268273000},"page":"508-524","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Semi-supervised Context Discovery for\u00a0Peer-Based Anomaly Detection in\u00a0Multi-layer Networks"],"prefix":"10.1007","author":[{"given":"Bo","family":"Dong","sequence":"first","affiliation":[]},{"given":"Yuhang","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Micheal","family":"Yeh","sequence":"additional","affiliation":[]},{"given":"Yusan","family":"Lin","sequence":"additional","affiliation":[]},{"given":"Yuzhong","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wanxin","family":"Bai","sequence":"additional","affiliation":[]},{"given":"Krupa","family":"Brahmkstri","sequence":"additional","affiliation":[]},{"given":"Zhang","family":"Yimin","sequence":"additional","affiliation":[]},{"given":"Chinna","family":"Kummitha","sequence":"additional","affiliation":[]},{"given":"Verma","family":"Abhisar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,8,24]]},"reference":[{"issue":"3","key":"28_CR1","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2014","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626\u2013688 (2014). https:\/\/doi.org\/10.1007\/s10618-014-0365-y","journal-title":"Data Min. Knowl. Disc."},{"unstructured":"Bolton, R.J., Hand, D.J., et al.: Unsupervised profiling methods for fraud detection. Credit Scoring Credit Control VII, 235\u2013255 (2001)","key":"28_CR2"},{"doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, 16\u201318 May 2000, Dallas, Texas, USA, pp. 93\u2013104 (2000)","key":"28_CR3","DOI":"10.1145\/335191.335388"},{"doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","key":"28_CR4","DOI":"10.1145\/1541880.1541882"},{"issue":"1","key":"28_CR5","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10844-011-0183-2","volume":"39","author":"Z Chen","year":"2012","unstructured":"Chen, Z., Hendrix, W., Samatova, N.F.: Community-based anomaly detection in evolutionary networks. J. Intell. Inf. Syst. 39(1), 59\u201385 (2012). https:\/\/doi.org\/10.1007\/s10844-011-0183-2","journal-title":"J. Intell. Inf. Syst."},{"unstructured":"Deloitte: Impact of COVID-19 in cybersecurity (2021)","key":"28_CR6"},{"key":"28_CR7","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139941907","volume-title":"Multilayer Social Networks","author":"ME Dickison","year":"2016","unstructured":"Dickison, M.E., Magnani, M., Rossi, L.: Multilayer Social Networks. Cambridge University Press, Cambridge (2016)"},{"doi-asserted-by":"crossref","unstructured":"Dimopoulos, G., Barlet-Ros, P., Dovrolis, C., Leontiadis, I.: Detecting network performance anomalies with contextual anomaly detection. In: 2017 IEEE International Workshop on Measurement and Networking (M &N), pp. 1\u20136. IEEE (2017)","key":"28_CR8","DOI":"10.1109\/IWMN.2017.8078404"},{"doi-asserted-by":"crossref","unstructured":"Ding, K., Li, J., Bhanushali, R., Liu, H.: Deep anomaly detection on attributed networks. In: SDM, pp. 594\u2013602 (2019)","key":"28_CR9","DOI":"10.1137\/1.9781611975673.67"},{"issue":"6","key":"28_CR10","doi-asserted-by":"publisher","first-page":"663","DOI":"10.3233\/IDA-2007-11606","volume":"11","author":"W Eberle","year":"2007","unstructured":"Eberle, W., Holder, L.B.: Anomaly detection in data represented as graphs. Intell. Data Anal. 11(6), 663\u2013689 (2007)","journal-title":"Intell. Data Anal."},{"issue":"2","key":"28_CR11","first-page":"39","volume":"5","author":"H Eldardiry","year":"2014","unstructured":"Eldardiry, H., et al.: Multi-source fusion for anomaly detection: using across-domain and across-time peer-group consistency checks. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(2), 39\u201358 (2014)","journal-title":"J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl."},{"key":"28_CR12","first-page":"59","volume":"9","author":"M Goldstein","year":"2012","unstructured":"Goldstein, M., Dengel, A.: Histogram-based outlier score (hbos): a fast unsupervised anomaly detection algorithm. KI-2012: Poster Demo Track 9, 59\u201363 (2012)","journal-title":"KI-2012: Poster Demo Track"},{"doi-asserted-by":"crossref","unstructured":"Hayes, M.A., Capretz, M.A.M.: Contextual anomaly detection in big sensor data. In: 2014 IEEE International Congress on Big Data, Anchorage, AK, USA, 27 June\u20132 July 2014, pp. 64\u201371. IEEE Computer Society (2014)","key":"28_CR13","DOI":"10.1109\/BigData.Congress.2014.19"},{"issue":"1","key":"28_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-014-0011-y","volume":"2","author":"MA Hayes","year":"2015","unstructured":"Hayes, M.A., Capretz, M.A.M.: Contextual anomaly detection framework for big sensor data. J. Big Data 2(1), 1\u201322 (2015). https:\/\/doi.org\/10.1186\/s40537-014-0011-y","journal-title":"J. Big Data"},{"doi-asserted-by":"crossref","unstructured":"Interdonato, R., Magnani, M., Perna, D., Tagarelli, A., Vega, D.: Multilayer network simplification: approaches, models and methods. Comput. Sci. Rev. 36, 100246 (2020)","key":"28_CR15","DOI":"10.1016\/j.cosrev.2020.100246"},{"issue":"10","key":"28_CR16","doi-asserted-by":"publisher","first-page":"8986","DOI":"10.1016\/j.eswa.2012.02.025","volume":"39","author":"Y Kim","year":"2012","unstructured":"Kim, Y., Sohn, S.Y.: Stock fraud detection using peer group analysis. Expert Syst. Appl. 39(10), 8986\u20138992 (2012)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"28_CR17","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1093\/comnet\/cnu016","volume":"2","author":"M Kivel\u00e4","year":"2014","unstructured":"Kivel\u00e4, M., Arenas, A., Barthelemy, M., Gleeson, J.P., Moreno, Y., Porter, M.A.: Multilayer networks. J. Complex Networks 2(3), 203\u2013271 (2014)","journal-title":"J. Complex Networks"},{"doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.: Isolation forest. In: Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 15\u201319 December 2008, Pisa, Italy, pp. 413\u2013422. IEEE Computer Society (2008)","key":"28_CR18","DOI":"10.1109\/ICDM.2008.17"},{"doi-asserted-by":"crossref","unstructured":"Liu, N., Huang, X., Hu, X.: Accelerated local anomaly detection via resolving attributed networks. In: IJCAI, pp. 2337\u20132343 (2017)","key":"28_CR19","DOI":"10.24963\/ijcai.2017\/325"},{"unstructured":"Madden, S., et al.: Intel lab data. Web page, Intel (2004)","key":"28_CR20"},{"doi-asserted-by":"crossref","unstructured":"Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Getoor, L., Senator, T.E., Domingos, P.M., Faloutsos, C. (eds.) Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, 24\u201327 August 2003, pp. 631\u2013636. ACM (2003)","key":"28_CR21","DOI":"10.1145\/956750.956831"},{"doi-asserted-by":"crossref","unstructured":"Thiprungsri, S., Vasarhelyi, M.A.: Cluster analysis for anomaly detection in accounting data: an audit approach. Int. J. Digital Account. Res. 11 (2011)","key":"28_CR22","DOI":"10.4192\/1577-8517-v11_4"},{"unstructured":"Xie, J., Girshick, R., Farhadi, A.: Unsupervised deep embedding for clustering analysis. In: International Conference on Machine Learning, pp. 478\u2013487 (2016)","key":"28_CR23"},{"unstructured":"Zhang, H., Basu, S., Davidson, I.: Deep constrained clustering - algorithms and advances. Arxiv Preprint 1901.10061 (2019)","key":"28_CR24"},{"issue":"14","key":"28_CR25","doi-asserted-by":"publisher","first-page":"i190","DOI":"10.1093\/bioinformatics\/btx252","volume":"33","author":"M Zitnik","year":"2017","unstructured":"Zitnik, M., Leskovec, J.: Predicting multicellular function through multi-layer tissue networks. Bioinformatics 33(14), i190\u2013i198 (2017)","journal-title":"Bioinformatics"}],"container-title":["Lecture Notes in Computer Science","Information and Communications Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-15777-6_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,7]],"date-time":"2024-03-07T16:37:38Z","timestamp":1709829458000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-15777-6_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031157769","9783031157776"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-15777-6_28","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"24 August 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}