{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T07:17:51Z","timestamp":1742973471708,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319180311"},{"type":"electronic","value":"9783319180328"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18032-8_17","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T05:41:54Z","timestamp":1431063714000},"page":"215-227","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["An Embedding Scheme for Detecting Anomalous Block Structured Graphs"],"prefix":"10.1007","author":[{"given":"Lida","family":"Rashidi","sequence":"first","affiliation":[]},{"given":"Sutharshan","family":"Rajasegarar","sequence":"additional","affiliation":[]},{"given":"Christopher","family":"Leckie","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"issue":"3","key":"17_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"4","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys 4(3), 1\u201358 (2009)","journal-title":"ACM Computing Surveys"},{"key":"17_CR2","doi-asserted-by":"crossref","unstructured":"Ding, Q., Katenka, N., Barford, P., Kolaczyk, E.D., Crovella, M.: Intrusion as (anti)social communication: characterization and detection. In: Proceedings of the 18th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 886\u2013894 (2012)","DOI":"10.1145\/2339530.2339670"},{"key":"17_CR3","doi-asserted-by":"crossref","unstructured":"Henderson, K., Eliassi-Rad, T., Faloutsos, C., Akoglu, L., Li, L., Maruhashi, K., Prakash, B.A., Tong, H.: Metricforensics: a multi-level approach for mining volatile graphs. In: Proceedings of the 16th ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD), pp. 163\u2013172 (2010)","DOI":"10.1145\/1835804.1835828"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Yu, and P.S.: Outlier detection in graph streams. In: Proceedings of the 27th International Conference on Data Engineering (ICDE), pp. 399\u2013409 (2011)","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"17_CR5","unstructured":"Shaw, B., Jebara, T.: Minimum volume embedding. In: Proceedings of the 11th International Conference on Artificial Intelligence and Statistics, pp. 460\u2013467 (2007)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Shaw, B., Jebara, T.: Structure preserving embedding. In: Proceedings of the 26th International Conference on Machine Learning, pp. 937\u2013944 (2009)","DOI":"10.1145\/1553374.1553494"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Johnson, W.B., Lindenstrauss, J.: Extensions of Lipschitz mappings into a Hilbert space. In: Conference in Modern Analysis and Probability, pp. 189\u2013206 (1984)","DOI":"10.1090\/conm\/026\/737400"},{"key":"17_CR8","unstructured":"Schlkopf, B., Williamson, R.C., Smola, A., Shawe-Taylor, J.: Support vector method for novelty detection. In: NIPS, vol. 12, pp. 582\u2013588 (1999)"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Cook, D., Holder, L.: Mining Graph Data. Wiley (2007)","DOI":"10.1002\/0470073047"},{"issue":"2","key":"17_CR10","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1145\/2481244.2481249","volume":"14","author":"U Kang","year":"2012","unstructured":"Kang, U., Faloutsos, C.: Big graph mining: algorithms and discoveries. ACM SIGKDD Explorations Newsletter 14(2), 29\u201336 (2012)","journal-title":"ACM SIGKDD Explorations Newsletter"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Riesen, K., Bunke, H.: Classification and clustering of vector space embedded graphs. In: Emerging Topics in Computer Vision and Its Applications, pp. 49\u201370. World Scientific (2012)","DOI":"10.1142\/9789814343008_0003"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Neuhaus, M., Bunke, H.: Bridging the Gap Between Graph Edit Distance and Kernel Machines. World Scientific (2007)","DOI":"10.1142\/6523"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Moshtaghi, M., Leckie, C., Karunasekera, S., Bezdek, J.C., Rajasegarar, S., Palaniswami, M.: Incremental elliptical boundary estimation for anomaly detection in wireless sensor networks. In: Proceedings of the 11th IEEE International Conference on Data Mining, pp. 467\u2013476 (2011)","DOI":"10.1109\/ICDM.2011.80"},{"issue":"3","key":"17_CR14","doi-asserted-by":"publisher","first-page":"518","DOI":"10.1109\/TIFS.2010.2051543","volume":"5","author":"S Rajasegarar","year":"2010","unstructured":"Rajasegarar, S., Leckie, C., Bezdek, J.C., Palaniswami, M.: Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks. IEEE Transactions on Information Forensics and Security 5(3), 518\u2013533 (2010)","journal-title":"IEEE Transactions on Information Forensics and Security"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Akoglu, L., Tong, H., Koutra, D.: Graph-based Anomaly Detection and Description: A Survey. Data Mining and Knowledge Discovery, pp. 1\u201363 (2014)","DOI":"10.1007\/s10618-014-0365-y"},{"key":"17_CR16","unstructured":"Chung, F.R.K.: Spectral Graph Theory. American Mathematical Society (1997)"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Belkin, M., Niyogi, P.: Laplacian Eigenmaps for Dimensionality Reduction and Data Representation. Neural Computation, pp. 1373\u20131396 (2002)","DOI":"10.1162\/089976603321780317"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Newman, M.: Modularity and community structure in networks. In: Proceedings of the National Academy of Sciences, vol. 23, pp. 8577\u20138582 (2006)","DOI":"10.1073\/pnas.0601602103"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Chan, J., Liu, W., Kan, A., Leckie, C., Bailey, J., Ramamohanarao, K.: Discovering latent blockmodels in sparse and noisy graphs using non-negative matrix factorisation. In: Proceedings of the 22nd ACM International Conference on Information & Knowledge Management, pp. 811\u2013816 (2013)","DOI":"10.1145\/2505515.2505595"},{"issue":"4","key":"17_CR20","doi-asserted-by":"publisher","first-page":"671","DOI":"10.1016\/S0022-0000(03)00025-4","volume":"66","author":"D Achlioptas","year":"2003","unstructured":"Achlioptas, D.: Database-friendly Random Projections: Johnson-Lindenstrauss with Binary Coins. Journal of Computer and System Sciences 66(4), 671\u2013687 (2003)","journal-title":"Journal of Computer and System Sciences"},{"key":"17_CR21","unstructured":"http:\/\/www-personal.umich.edu\/~mejn\/netdata\/"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18032-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T07:38:10Z","timestamp":1676446690000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18032-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319180311","9783319180328"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18032-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}