{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,19]],"date-time":"2025-09-19T08:55:22Z","timestamp":1758272122990,"version":"3.41.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T00:00:00Z","timestamp":1476921600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000015","name":"U.S. Department of Energy","doi-asserted-by":"publisher","award":["DE-AC05-00OR22725"],"award-info":[{"award-number":["DE-AC05-00OR22725"]}],"id":[{"id":"10.13039\/100000015","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["N66001-14-1-4063"],"award-info":[{"award-number":["N66001-14-1-4063"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000936","name":"Gordon and Betty Moore Foundation","doi-asserted-by":"crossref","award":["http:\/\/dx.doi.org\/10.13039\/100000936"],"award-info":[{"award-number":["http:\/\/dx.doi.org\/10.13039\/100000936"]}],"id":[{"id":"10.13039\/100000936","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Soc. Netw. Anal. Min."],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13278-016-0409-y","type":"journal-article","created":{"date-parts":[[2016,10,20]],"date-time":"2016-10-20T09:58:59Z","timestamp":1476957539000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A multi-level anomaly detection algorithm for time-varying graph data with interactive visualization"],"prefix":"10.1007","volume":"6","author":[{"given":"Robert A.","family":"Bridges","sequence":"first","affiliation":[]},{"given":"John","family":"Collins","sequence":"additional","affiliation":[]},{"given":"Erik M.","family":"Ferragut","sequence":"additional","affiliation":[]},{"given":"Jason","family":"Laska","sequence":"additional","affiliation":[]},{"given":"Blair D.","family":"Sullivan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,20]]},"reference":[{"issue":"3","key":"409_CR1","doi-asserted-by":"publisher","first-page":"626","DOI":"10.1007\/s10618-014-0365-y","volume":"29","author":"L Akoglu","year":"2015","unstructured":"Akoglu L, Tong H, Koutra D (2015) Graph based anomaly detection and description: a survey. Data Min Knowl Discov 29(3):626\u2013688","journal-title":"Data Min Knowl Discov"},{"issue":"5439","key":"409_CR2","doi-asserted-by":"publisher","first-page":"509","DOI":"10.1126\/science.286.5439.509","volume":"286","author":"AL Barab\u00e1si","year":"1999","unstructured":"Barab\u00e1si AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509\u2013512","journal-title":"Science"},{"key":"409_CR3","doi-asserted-by":"crossref","unstructured":"Bridges RA, Collins JP, Ferragut EM, Laska JA, Sullivan BD (2015) Multi-level anomaly detection on time-varying graph data. In: Proceedings of the 2015 IEEE\/ACM international conference on advances in social networks analysis and mining 2015. ACM, pp 579\u2013583","DOI":"10.1145\/2808797.2809406"},{"issue":"1","key":"409_CR4","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1145\/1132952.1132954","volume":"38","author":"D Chakrabarti","year":"2006","unstructured":"Chakrabarti D, Faloutsos C (2006) Graph mining: laws, generators, and algorithms. ACM Comput Surv (CSUR) 38(1):2","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"25","key":"409_CR5","doi-asserted-by":"publisher","first-page":"15879","DOI":"10.1073\/pnas.252631999","volume":"99","author":"F Chung","year":"2002","unstructured":"Chung F, Lu L (2002) The average distances in random graphs with given expected degrees. Proc Natl Acad Sci 99(25):15879\u201315882","journal-title":"Proc Natl Acad Sci"},{"issue":"6","key":"409_CR6","doi-asserted-by":"crossref","first-page":"663","DOI":"10.3233\/IDA-2007-11606","volume":"11","author":"W Eberle","year":"2007","unstructured":"Eberle W, Holder L (2007) Anomaly detection in data represented as graphs. Intell Data Anal 11(6):663\u2013689","journal-title":"Intell Data Anal"},{"key":"409_CR7","doi-asserted-by":"crossref","first-page":"290","DOI":"10.5486\/PMD.1959.6.3-4.12","volume":"6","author":"P Erd\u0151s","year":"1959","unstructured":"Erd\u0151s P, R\u00e9nyi A (1959) On random graphs. Publ Math Debr 6:290\u2013297","journal-title":"Publ Math Debr"},{"key":"409_CR8","doi-asserted-by":"crossref","unstructured":"Ferragut EM, Laska J, Bridges RA (2012) A new, principled approach to anomaly detection. In: International conference on machine learning and applications, vol\u00a02. IEEE, pp 210\u2013215","DOI":"10.1109\/ICMLA.2012.151"},{"issue":"3","key":"409_CR9","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/j.physrep.2009.11.002","volume":"486","author":"S Fortunato","year":"2010","unstructured":"Fortunato S (2010) Community detection in graphs. Phys Rep 486(3):75\u2013174","journal-title":"Phys Rep"},{"key":"409_CR10","doi-asserted-by":"crossref","unstructured":"Hagberg AA, Schult DA, Swart PJ (2008) Exploring network structure, dynamics, and function using NetworkX. In: Proceedings of the 7th Python in science conference (SciPy2008). Pasadena, CA, USA, pp 11\u201315","DOI":"10.25080\/TCWV9851"},{"key":"409_CR11","doi-asserted-by":"crossref","unstructured":"Harshaw CR, Bridges RA, Iannacone MD, Reed JW, Goodall JR (2016) Graphprints: towards a graph analytic method for network anomaly detection. In: Proceedings of the 11th annual cyber and information security research conference. ACM, p 15","DOI":"10.1145\/2897795.2897806"},{"issue":"2","key":"409_CR12","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/0378-8733(83)90021-7","volume":"5","author":"PW Holland","year":"1983","unstructured":"Holland PW, Laskey KB, Leinhardt S (1983) Stochastic blockmodels: first steps. Soc Netw 5(2):109\u2013137","journal-title":"Soc Netw"},{"issue":"5","key":"409_CR13","doi-asserted-by":"publisher","first-page":"C424","DOI":"10.1137\/130914218","volume":"36","author":"TG Kolda","year":"2014","unstructured":"Kolda TG, Pinar A, Plantenga T, Seshadhri C (2014) A scalable generative graph model with community structure. SIAM J Sci Comput 36(5):C424\u2013C452","journal-title":"SIAM J Sci Comput"},{"key":"409_CR14","unstructured":"LLC S.R. (2015) Sports reference college football statistics & History. http:\/\/www.sports-reference.com\/cfb\/ . Used with permission"},{"key":"409_CR16","doi-asserted-by":"crossref","unstructured":"Miller BA, Stephens LH, Bliss NT (2012) Goodness-of-fit statistics for anomaly detection in Chung\u2013Lu random graphs. In: International conference on acoustics, speech and signal processing. IEEE, pp 3265\u20133268","DOI":"10.1109\/ICASSP.2012.6288612"},{"issue":"1","key":"409_CR15","first-page":"10","volume":"20","author":"BA Miller","year":"2013","unstructured":"Miller BA, Bliss NT, Wolfe PJ, Beard MS (2013) Detection theory for graphs. Linc Lab J 20(1):10\u201330","journal-title":"Linc Lab J"},{"key":"409_CR17","doi-asserted-by":"crossref","unstructured":"Moreno S, Neville J (2013) Network hypothesis testing using mixed kronecker product graph models. In: IEEE 13th international conference on data mining (ICDM). IEEE, pp 1163\u20131168","DOI":"10.1109\/ICDM.2013.165"},{"key":"409_CR18","doi-asserted-by":"crossref","unstructured":"Peel L, Clauset A (2015) Detecting change points in the large-scale structure of evolving networks. In: Proceedings of the twenty-ninth AAAI conference on artificial intelligence. AAAI Press, pp 2914\u20132920","DOI":"10.1609\/aaai.v29i1.9574"},{"key":"409_CR19","doi-asserted-by":"crossref","unstructured":"Satuluri V, Parthasarathy S (2009) Scalable graph clustering using stochastic flows: applications to community discovery. In: Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, pp 737\u2013746","DOI":"10.1145\/1557019.1557101"},{"issue":"5","key":"409_CR20","doi-asserted-by":"publisher","first-page":"056109","DOI":"10.1103\/PhysRevE.85.056109","volume":"85","author":"C Seshadhri","year":"2012","unstructured":"Seshadhri C, Kolda TG, Pinar A (2012) Community structure and scale-free collections of Erd\u0151s\u2013R\u00e9nyi graphs. Phys Rev E 85(5):056109","journal-title":"Phys Rev E"},{"key":"409_CR21","unstructured":"Van\u00a0Dongen SM (2000) Graph clustering by flow simulation. Ph.D. thesis, University of Utrecht"},{"issue":"2","key":"409_CR22","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1057\/palgrave.ivs.9500177","volume":"7","author":"PC Wong","year":"2008","unstructured":"Wong PC, Foote H, Mackey P, Chin G, Sofia H, Thomas J (2008) A dynamic multiscale magnifying tool for exploring large sparse graphs. Inf Vis 7(2):105\u2013117","journal-title":"Inf Vis"}],"container-title":["Social Network Analysis and Mining"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0409-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13278-016-0409-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13278-016-0409-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,11]],"date-time":"2025-06-11T18:26:51Z","timestamp":1749666411000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13278-016-0409-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,20]]},"references-count":22,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["409"],"URL":"https:\/\/doi.org\/10.1007\/s13278-016-0409-y","relation":{},"ISSN":["1869-5450","1869-5469"],"issn-type":[{"type":"print","value":"1869-5450"},{"type":"electronic","value":"1869-5469"}],"subject":[],"published":{"date-parts":[[2016,10,20]]},"assertion":[{"value":"18 December 2015","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 September 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 October 2016","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 October 2016","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"99"}}