{"id":"https://openalex.org/W2768153367","doi":"https://doi.org/10.1145/3110025.3116200","title":"Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining","display_name":"Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining","publication_year":2017,"publication_date":"2017-07-31","ids":{"openalex":"https://openalex.org/W2768153367","doi":"https://doi.org/10.1145/3110025.3116200","mag":"2768153367"},"language":"en","primary_location":{"id":"doi:10.1145/3110025.3116200","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3110025.3116200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100424653","display_name":"Ze Li","orcid":"https://orcid.org/0000-0003-3087-0595"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Ze Li","raw_affiliation_strings":["College of Information System and Management, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Information System and Management, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101059950","display_name":"Duoyong Sun","orcid":null},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Duoyong Sun","raw_affiliation_strings":["College of Information System and Management, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Information System and Management, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5004418846","display_name":"Feng Xu","orcid":"https://orcid.org/0000-0001-6786-6202"},"institutions":[{"id":"https://openalex.org/I170215575","display_name":"National University of Defense Technology","ror":"https://ror.org/05d2yfz11","country_code":"CN","type":"education","lineage":["https://openalex.org/I170215575"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Feng Xu","raw_affiliation_strings":["College of Information System and Management, National University of Defense Technology, Changsha, China"],"affiliations":[{"raw_affiliation_string":"College of Information System and Management, National University of Defense Technology, Changsha, China","institution_ids":["https://openalex.org/I170215575"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100783947","display_name":"Bo Li","orcid":"https://orcid.org/0000-0001-6226-1052"},"institutions":[{"id":"https://openalex.org/I4210126638","display_name":"Horological Research Institute of Light Industry","ror":"https://ror.org/031nqzs81","country_code":"CN","type":"facility","lineage":["https://openalex.org/I4210126638"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Bo Li","raw_affiliation_strings":["Xi'an Hi-Tech Research Institute, Hongqing Town, Xi'an, China"],"affiliations":[{"raw_affiliation_string":"Xi'an Hi-Tech Research Institute, Hongqing Town, Xi'an, China","institution_ids":["https://openalex.org/I4210126638"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5100424653"],"corresponding_institution_ids":["https://openalex.org/I170215575"],"apc_list":null,"apc_paid":null,"fwci":0.4144,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.67164272,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1112","last_page":"1119"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9979000091552734,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.7538361549377441},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7523322105407715},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.5883166193962097},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.507916271686554},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4741458594799042},{"id":"https://openalex.org/keywords/behavioral-pattern","display_name":"Behavioral pattern","score":0.4435006380081177},{"id":"https://openalex.org/keywords/collective-behavior","display_name":"Collective behavior","score":0.42343869805336},{"id":"https://openalex.org/keywords/temporal-database","display_name":"Temporal database","score":0.41917213797569275},{"id":"https://openalex.org/keywords/profiling","display_name":"Profiling (computer programming)","score":0.41334325075149536},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.3856968283653259}],"concepts":[{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.7538361549377441},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7523322105407715},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.5883166193962097},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.507916271686554},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4741458594799042},{"id":"https://openalex.org/C83804111","wikidata":"https://www.wikidata.org/wiki/Q1063558","display_name":"Behavioral pattern","level":2,"score":0.4435006380081177},{"id":"https://openalex.org/C100339178","wikidata":"https://www.wikidata.org/wiki/Q2548752","display_name":"Collective behavior","level":2,"score":0.42343869805336},{"id":"https://openalex.org/C77277458","wikidata":"https://www.wikidata.org/wiki/Q1969246","display_name":"Temporal database","level":2,"score":0.41917213797569275},{"id":"https://openalex.org/C187191949","wikidata":"https://www.wikidata.org/wiki/Q1138496","display_name":"Profiling (computer programming)","level":2,"score":0.41334325075149536},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.3856968283653259},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.0},{"id":"https://openalex.org/C144024400","wikidata":"https://www.wikidata.org/wiki/Q21201","display_name":"Sociology","level":0,"score":0.0},{"id":"https://openalex.org/C19165224","wikidata":"https://www.wikidata.org/wiki/Q23404","display_name":"Anthropology","level":1,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3110025.3116200","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3110025.3116200","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4399999976158142,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":30,"referenced_works":["https://openalex.org/W961884","https://openalex.org/W4012559","https://openalex.org/W175854469","https://openalex.org/W192714392","https://openalex.org/W307289813","https://openalex.org/W950821216","https://openalex.org/W1533657962","https://openalex.org/W1578859737","https://openalex.org/W1896833666","https://openalex.org/W1983371452","https://openalex.org/W2053724458","https://openalex.org/W2055672304","https://openalex.org/W2061122559","https://openalex.org/W2061901927","https://openalex.org/W2096121981","https://openalex.org/W2122646361","https://openalex.org/W2132870739","https://openalex.org/W2140273660","https://openalex.org/W2147620601","https://openalex.org/W2153635508","https://openalex.org/W2155640700","https://openalex.org/W2163557584","https://openalex.org/W2333750674","https://openalex.org/W2361911975","https://openalex.org/W2392310840","https://openalex.org/W2515500989","https://openalex.org/W2752404929","https://openalex.org/W2917784888","https://openalex.org/W4212770024","https://openalex.org/W4254420769"],"related_works":["https://openalex.org/W2161444195","https://openalex.org/W2589019771","https://openalex.org/W2985540061","https://openalex.org/W2185012154","https://openalex.org/W4252521128","https://openalex.org/W4287867321","https://openalex.org/W2911183501","https://openalex.org/W2104014222","https://openalex.org/W3006062179","https://openalex.org/W2613265192"],"abstract_inverted_index":{"The":[0],"interaction":[1],"between":[2],"members":[3],"within":[4],"an":[5],"organization":[6,25],"evolves":[7],"continuously":[8],"and":[9,26,52,117,153,210],"drives":[10],"the":[11,20,24,28,32,43,151,169,179,191,196,204,223],"organizational":[12,99,144,158,174,232],"behavior":[13,57,100,145,159,233],"to":[14,78,122,142,184],"change":[15],"over":[16],"time.":[17],"To":[18,129],"understand":[19],"temporal":[21,66,91,108,138,170,180],"behaviors":[22],"of":[23,31,42,62,64,157,166,187,206],"recognize":[27],"evolving":[29,72,115],"characteristics":[30],"networks,":[33,74],"we":[34,48,132,148,162,177],"need":[35],"effective":[36,228],"tools":[37],"that":[38,88,202,222],"can":[39],"capture":[40],"evolution":[41,56],"objects.":[44],"In":[45],"this":[46,130],"paper,":[47],"propose":[49,133],"a":[50,60,65,84,104,134,154,164,199],"novel":[51],"important":[53],"problem":[54,106],"in":[55,83,113,168,229],"discovery.":[58],"Given":[59],"series":[61],"snapshots":[63],"dataset,":[67],"which":[68,81],"are":[69,110],"modeled":[70],"as":[71,98,107],"social":[73,135],"our":[75],"goal":[76],"is":[77,103,120,213,226],"find":[79],"networks":[80,188],"evolve":[82],"dramatically":[85],"different":[86],"way":[87],"deviate":[89],"from":[90,126,190],"pattern":[92,139,181],"norm.":[93],"We":[94],"define":[95],"such":[96],"objects":[97,125],"anomalies.":[101,146,160,234],"It":[102],"challenging":[105],"patterns":[109],"hidden":[111],"deeply":[112],"noisy":[114],"datasets":[116,220],"thus":[118],"it":[119],"difficult":[121],"distinguish":[123],"anomalous":[124],"normal":[127,192],"ones.":[128],"end,":[131],"network":[136],"based":[137],"mining":[140,182],"framework":[141,183,225],"detect":[143],"Specifically,":[147],"first":[149],"give":[150],"definition":[152],"brief":[155],"description":[156],"Then,":[161],"extract":[163],"number":[165],"features":[167],"dataset":[171],"for":[172],"profiling":[173],"networks.":[175],"Third,":[176],"use":[178],"evaluate":[185],"anomalies":[186],"deviating":[189],"evolutionary":[193],"patterns.":[194],"Within":[195],"proposed":[197,224],"framework,":[198],"two-step":[200],"procedure":[201],"exploits":[203],"strengths":[205],"unsupervised":[207],"anomaly":[208],"detection":[209],"supervised":[211],"classification":[212],"used.":[214],"Experimental":[215],"results":[216],"on":[217],"two":[218],"real-world":[219],"show":[221],"highly":[227],"discovering":[230],"interesting":[231]},"counts_by_year":[{"year":2019,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
