{"id":"https://openalex.org/W2487269596","doi":"https://doi.org/10.1145/2955129.2955161","title":"Facebook Traffic Pattern Analytics","display_name":"Facebook Traffic Pattern Analytics","publication_year":2016,"publication_date":"2016-07-18","ids":{"openalex":"https://openalex.org/W2487269596","doi":"https://doi.org/10.1145/2955129.2955161","mag":"2487269596"},"language":"en","primary_location":{"id":"doi:10.1145/2955129.2955161","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2955129.2955161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090930264","display_name":"C. Chen","orcid":"https://orcid.org/0000-0003-2999-4291"},"institutions":[{"id":"https://openalex.org/I47449453","display_name":"Kean University","ror":"https://ror.org/04wzzqn13","country_code":"US","type":"education","lineage":["https://openalex.org/I47449453"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"C. Chen","raw_affiliation_strings":["Computer Science, Kean University, Union NJ USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Kean University, Union NJ USA","institution_ids":["https://openalex.org/I47449453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049301815","display_name":"J. Iglasias","orcid":null},"institutions":[{"id":"https://openalex.org/I47449453","display_name":"Kean University","ror":"https://ror.org/04wzzqn13","country_code":"US","type":"education","lineage":["https://openalex.org/I47449453"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. Iglasias","raw_affiliation_strings":["Computer Science, Kean University, Union NJ USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Kean University, Union NJ USA","institution_ids":["https://openalex.org/I47449453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5110430297","display_name":"Xuebing Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I47449453","display_name":"Kean University","ror":"https://ror.org/04wzzqn13","country_code":"US","type":"education","lineage":["https://openalex.org/I47449453"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"X. Lin","raw_affiliation_strings":["Computer Science, Kean University, Union NJ USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Kean University, Union NJ USA","institution_ids":["https://openalex.org/I47449453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5114102385","display_name":"J. J. Li","orcid":null},"institutions":[{"id":"https://openalex.org/I47449453","display_name":"Kean University","ror":"https://ror.org/04wzzqn13","country_code":"US","type":"education","lineage":["https://openalex.org/I47449453"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"J. J. Li","raw_affiliation_strings":["Computer Science, Kean University, Union NJ USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Kean University, Union NJ USA","institution_ids":["https://openalex.org/I47449453"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000851163","display_name":"Patricia Morreale","orcid":"https://orcid.org/0000-0002-7954-2122"},"institutions":[{"id":"https://openalex.org/I47449453","display_name":"Kean University","ror":"https://ror.org/04wzzqn13","country_code":"US","type":"education","lineage":["https://openalex.org/I47449453"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"P. Morreale","raw_affiliation_strings":["Computer Science, Kean University, Union NJ USA"],"affiliations":[{"raw_affiliation_string":"Computer Science, Kean University, Union NJ USA","institution_ids":["https://openalex.org/I47449453"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5000561768","display_name":"Linda Ness","orcid":null},"institutions":[{"id":"https://openalex.org/I2799411422","display_name":"Center for Discrete Mathematics and Theoretical Computer Science","ror":"https://ror.org/00k551w06","country_code":"US","type":"facility","lineage":["https://openalex.org/I102322142","https://openalex.org/I118347220","https://openalex.org/I1283103587","https://openalex.org/I1311060795","https://openalex.org/I20089843","https://openalex.org/I2799411422","https://openalex.org/I4210107353"]},{"id":"https://openalex.org/I102322142","display_name":"Rutgers, The State University of New Jersey","ror":"https://ror.org/05vt9qd57","country_code":"US","type":"education","lineage":["https://openalex.org/I102322142"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Linda Ness","raw_affiliation_strings":["DIMACS, Rutgers University, Piscataway, NJ USA"],"affiliations":[{"raw_affiliation_string":"DIMACS, Rutgers University, Piscataway, NJ USA","institution_ids":["https://openalex.org/I2799411422","https://openalex.org/I102322142"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5090930264"],"corresponding_institution_ids":["https://openalex.org/I47449453"],"apc_list":null,"apc_paid":null,"fwci":0.8686,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.77038064,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"5"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9972000122070312,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11106","display_name":"Data Management and Algorithms","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7681361436843872},{"id":"https://openalex.org/keywords/outlier","display_name":"Outlier","score":0.647356390953064},{"id":"https://openalex.org/keywords/data-pre-processing","display_name":"Data pre-processing","score":0.5672267079353333},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5634410381317139},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.5546450018882751},{"id":"https://openalex.org/keywords/analytics","display_name":"Analytics","score":0.544623076915741},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5096185207366943},{"id":"https://openalex.org/keywords/preprocessor","display_name":"Preprocessor","score":0.5085879564285278},{"id":"https://openalex.org/keywords/data-set","display_name":"Data set","score":0.47197920083999634},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.45372724533081055},{"id":"https://openalex.org/keywords/service","display_name":"Service (business)","score":0.4448772966861725},{"id":"https://openalex.org/keywords/data-collection","display_name":"Data collection","score":0.41232356429100037},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.24386128783226013},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.19808721542358398}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7681361436843872},{"id":"https://openalex.org/C79337645","wikidata":"https://www.wikidata.org/wiki/Q779824","display_name":"Outlier","level":2,"score":0.647356390953064},{"id":"https://openalex.org/C10551718","wikidata":"https://www.wikidata.org/wiki/Q5227332","display_name":"Data pre-processing","level":2,"score":0.5672267079353333},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5634410381317139},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.5546450018882751},{"id":"https://openalex.org/C79158427","wikidata":"https://www.wikidata.org/wiki/Q485396","display_name":"Analytics","level":2,"score":0.544623076915741},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5096185207366943},{"id":"https://openalex.org/C34736171","wikidata":"https://www.wikidata.org/wiki/Q918333","display_name":"Preprocessor","level":2,"score":0.5085879564285278},{"id":"https://openalex.org/C58489278","wikidata":"https://www.wikidata.org/wiki/Q1172284","display_name":"Data set","level":2,"score":0.47197920083999634},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.45372724533081055},{"id":"https://openalex.org/C2780378061","wikidata":"https://www.wikidata.org/wiki/Q25351891","display_name":"Service (business)","level":2,"score":0.4448772966861725},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.41232356429100037},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.24386128783226013},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.19808721542358398},{"id":"https://openalex.org/C162324750","wikidata":"https://www.wikidata.org/wiki/Q8134","display_name":"Economics","level":0,"score":0.0},{"id":"https://openalex.org/C105795698","wikidata":"https://www.wikidata.org/wiki/Q12483","display_name":"Statistics","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C136264566","wikidata":"https://www.wikidata.org/wiki/Q159810","display_name":"Economy","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/2955129.2955161","is_oa":false,"landing_page_url":"https://doi.org/10.1145/2955129.2955161","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, Data Science 2016","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W1974799041","https://openalex.org/W2018026844","https://openalex.org/W2108664475","https://openalex.org/W2465516359","https://openalex.org/W2546490537","https://openalex.org/W3098824294"],"related_works":["https://openalex.org/W2499612753","https://openalex.org/W3111802945","https://openalex.org/W2946096271","https://openalex.org/W2295423552","https://openalex.org/W2989490741","https://openalex.org/W1598471830","https://openalex.org/W3107369729","https://openalex.org/W3092506759","https://openalex.org/W2367545121","https://openalex.org/W4248881655"],"abstract_inverted_index":{"This":[0],"paper":[1],"presents":[2],"a":[3,7,94],"study":[4],"of":[5,20,32,45,51,56,62,78,93,100,106],"applying":[6],"new":[8],"data":[9,41,47,58],"pattern":[10],"recognition":[11],"approach,":[12],"called":[13],"Product":[14],"Coefficients":[15],"(PCs),":[16],"to":[17,74,87,109],"discover":[18],"patterns":[19,55,64],"Facebook":[21,112],"network":[22],"and":[23,36,49],"service":[24,33],"traffic.":[25],"It":[26],"includes":[27],"three":[28],"parts:":[29],"1)":[30],"collection":[31],"response":[34],"time":[35],"packages":[37],"as":[38,54],"the":[39,46,57,63,75,104],"initial":[40],"set,":[42],"2)":[43],"preprocessing":[44],"sets":[48],"discovers":[50],"PCs":[52,79,107],"values":[53,80],"set.":[59],"3)":[60],"displaying":[61],"for":[65,81],"simple":[66],"outlier":[67],"detection.":[68],"Additional":[69],"research":[70],"is":[71,103],"ongoing":[72],"related":[73],"post":[76],"processing":[77],"prediction,":[82],"e.g.":[83],"using":[84],"machine":[85],"learning":[86],"decide":[88],"if":[89],"outliers":[90],"are":[91],"indicators":[92],"security":[95],"attack.":[96],"The":[97],"key":[98],"contribution":[99],"this":[101],"work":[102],"application":[105],"method":[108],"some":[110],"practical":[111],"traffic":[113],"data.":[114]},"counts_by_year":[{"year":2018,"cited_by_count":2},{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
