최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기응용통계연구 = The Korean journal of applied statistics, v.35 no.2, 2022년, pp.299 - 310
홍휘주 (중앙대학교 응용통계학과) , 이주원 (중앙대학교 응용통계학과) , 이재헌 (중앙대학교 응용통계학과)
As interest in social network analysis increases, researchers' interest in detecting changes in social networks is also increasing. Changes in social networks appear as structural changes in the network. Therefore, detecting a change in a social network is detecting a change in the structural charac...
Akoglu L, Chandy R, and Faloutsos C (2013). Opinion fraud detection in online reviews by network effects. In Proceedings of the International AAAI Conference on Web and Social Media, 7.
Chau DH, Pandit S, and Faloutsos C (2006). Detecting fraudulent personalities in networks of online auctioneers. In European conference on principles of data mining and knowledge discovery, Springer, 103-114.
Cheng A and Dickinson P (2013). Using scan-statistical correlations for network change analysis. In Pacific-Asia Conference on Knowledge Discovery and Data Mining, Springer, 1-13.
Chung F and Lu L (2002). The average distances in random graphs with given expected degrees. In Proceedings of the National Academy of Sciences, 99, 15879-15882.
Erdos P and Renyi A (1959). On random graphs I, Publicationes Mathematicae Debrecen, 6, 290-297.
Fire M, Katz G, and Elovici Y (2012). Strangers intrusion detection-detecting spammers and fake profiles in social networks based on topology anomalies, Human Journal, 1, 26-39.
Holland PW, Laskey KB, and Leinhardt S (1983). Stochastic blockmodels: first steps, Social Networks, 5, 109-137.
Karrer B and Newman ME (2011). Stochastic blockmodels and community structure in network, Physical Review E, 83, 016107.
Krebs VE (2002). Mapping networks of terrorist cells, Connections, 24, 43-52.
Malm A and Bichler G (2011). Networks of collaborating criminals: Assessing the structural vulnerability of drug markets, Journal of Research in Crime and Delinquency, 48, 271-297.
McCulloh I and Carley KM (2011). Detecting change in longitudinal social networks, Military Academy West Point NY Network Science Center (NSC).
Nowicki K and Snijders TA (2001). Estimation and prediction for stochastic block structures, Journal of the American Statistical Association, 96, 1077-1087.
Page ES (1954). Continuous inspection schemes, Biometrika, 41, 100-115.
Pandit S, Chau DH, Wang S, and Faloutsos C (2007). Netprobe: a fast and scalable system for fraud detection in online auction networks. In Proceedings of the 16th International Conference on World Wide Web, 201-210.
Phua C, Lee V, Smith K, and Gayler R (2010). A Comprehensive Survey of Data Mining-Based Fraud Detection Research, arXiv preprint arXiv :1009.6119
Quesenberry CP (1991a). SPC Q charts for a binomial parameter p: short or long runs, Journal of quality technology, 23, 239-246.
Quesenberry CP (1991b). SPC Q charts for a Poisson parameter λ: short or long runs, Journal of Quality Technology, 23, 296-303.
Roberts SW (1959). Control chart tests based on geometric moving averages, Technometrics, 42, 97-101.
Savage D, Zhang X, Yu X, Chou P, and Wang Q (2014). Performance evaluation of social network anomaly detection using a moving anomaly detection in online social networks, Social networks, 39, 62-70.
Shetty J and Adibi J (2005). Discovering important nodes through graph entropy the case of enron email database. In Proceedings of the 3rd International Workshop on Link Discovery, 23, 74-81.
Shewhart WA (1931). Economic Control of Quality of Manufactured Product, Van Nostrand, New York.
Snijders TA and Nowicki K (1997). Estimation and prediction for stochastic block models for graphs with latent block structure, Journal of Classification, 14, 75-100.
Zhao MJ, Driscoll AR, Sengupta S, Fricker Jr RD, Spitzner DJ, and Woodall WH (2018). Performance evaluation of social network anomaly detection using a moving window-based scan method, Quality and Reliability Engineering International, 34, 1699-1716.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.