{"id":"https://openalex.org/W4235496845","doi":"https://doi.org/10.1504/ijcnds.2016.10001611","title":"A review of social network centric anomaly detection techniques","display_name":"A review of social network centric anomaly detection techniques","publication_year":2016,"publication_date":"2016-01-01","ids":{"openalex":"https://openalex.org/W4235496845","doi":"https://doi.org/10.1504/ijcnds.2016.10001611"},"language":"en","primary_location":{"id":"doi:10.1504/ijcnds.2016.10001611","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcnds.2016.10001611","pdf_url":null,"source":{"id":"https://openalex.org/S156554173","display_name":"International Journal of Communication Networks and Distributed Systems","issn_l":"1754-3916","issn":["1754-3916","1754-3924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Networks and Distributed Systems","raw_type":"journal-article"},"type":"review","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5101906588","display_name":"Ravneet Kaur","orcid":"https://orcid.org/0000-0003-3060-326X"},"institutions":[{"id":"https://openalex.org/I51452335","display_name":"Panjab University","ror":"https://ror.org/04p2sbk06","country_code":"IN","type":"education","lineage":["https://openalex.org/I51452335"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Ravneet Kaur","raw_affiliation_strings":["Department of Computer Science and Engineering, UIET, Panjab University, Chandigarh - 160014, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, UIET, Panjab University, Chandigarh - 160014, India","institution_ids":["https://openalex.org/I51452335"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030382098","display_name":"Sarbjeet Singh","orcid":"https://orcid.org/0000-0002-7603-9230"},"institutions":[{"id":"https://openalex.org/I51452335","display_name":"Panjab University","ror":"https://ror.org/04p2sbk06","country_code":"IN","type":"education","lineage":["https://openalex.org/I51452335"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sarbjeet Singh","raw_affiliation_strings":["Department of Computer Science and Engineering, UIET, Panjab University, Chandigarh - 160014, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, UIET, Panjab University, Chandigarh - 160014, India","institution_ids":["https://openalex.org/I51452335"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5101906588"],"corresponding_institution_ids":["https://openalex.org/I51452335"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.37739327,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":"17","issue":"4","first_page":"358","last_page":"358"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9976000189781189,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11512","display_name":"Anomaly Detection Techniques and Applications","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8481450080871582},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.792815089225769},{"id":"https://openalex.org/keywords/focus","display_name":"Focus (optics)","score":0.7024381160736084},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.5053287148475647},{"id":"https://openalex.org/keywords/data-science","display_name":"Data science","score":0.47474342584609985},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.4624846577644348},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.45618996024131775},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.40845879912376404}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8481450080871582},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.792815089225769},{"id":"https://openalex.org/C192209626","wikidata":"https://www.wikidata.org/wiki/Q190909","display_name":"Focus (optics)","level":2,"score":0.7024381160736084},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.5053287148475647},{"id":"https://openalex.org/C2522767166","wikidata":"https://www.wikidata.org/wiki/Q2374463","display_name":"Data science","level":1,"score":0.47474342584609985},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.4624846577644348},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.45618996024131775},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.40845879912376404},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C120665830","wikidata":"https://www.wikidata.org/wiki/Q14620","display_name":"Optics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1504/ijcnds.2016.10001611","is_oa":false,"landing_page_url":"https://doi.org/10.1504/ijcnds.2016.10001611","pdf_url":null,"source":{"id":"https://openalex.org/S156554173","display_name":"International Journal of Communication Networks and Distributed Systems","issn_l":"1754-3916","issn":["1754-3916","1754-3924"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310317825","host_organization_name":"Inderscience Publishers","host_organization_lineage":["https://openalex.org/P4310317825"],"host_organization_lineage_names":["Inderscience Publishers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Communication Networks and Distributed Systems","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10","score":0.47999998927116394}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":0,"referenced_works":[],"related_works":["https://openalex.org/W2806741695","https://openalex.org/W3210364259","https://openalex.org/W4290647774","https://openalex.org/W3189286258","https://openalex.org/W3207797160","https://openalex.org/W2143820878","https://openalex.org/W2912112202","https://openalex.org/W2667207928","https://openalex.org/W4300558037","https://openalex.org/W4377864969"],"abstract_inverted_index":{"Online":[0],"social":[1,117],"networks":[2],"have":[3],"gained":[4],"much":[5],"attention":[6],"in":[7,11,36,146],"the":[8,37,85,108,114,147],"recent":[9],"years":[10],"terms":[12],"of":[13,22,40,47,59,71,87,111,116,134,141],"their":[14,62],"analysis":[15,115],"for":[16,75,84],"usage":[17],"as":[18,20,127],"well":[19],"detection":[21,121],"abnormal":[23],"activities.":[24],"Anomalous":[25],"activities":[26],"arise":[27],"when":[28],"someone":[29],"shows":[30],"a":[31,45,139],"different":[32,57,99],"behaviour":[33],"than":[34],"others":[35],"network.":[38],"Presence":[39],"these":[41],"anomalies":[42,60,77,89],"may":[43],"pose":[44],"number":[46,140],"problems":[48],"which":[49,123,143],"need":[50],"to":[51,98,104],"be":[52],"addressed.":[53],"This":[54],"paper":[55,112],"discusses":[56],"types":[58],"and":[61,82,130],"novel":[63],"categorisation":[64],"based":[65],"on":[66],"various":[67,72],"factors.":[68],"A":[69,93],"review":[70],"techniques":[73,142],"used":[74,103],"detecting":[76],"along":[78],"with":[79],"underlying":[80],"assumptions":[81],"reasons":[83],"presence":[86],"such":[88],"is":[90,96,113],"also":[91],"covered.":[92],"special":[94],"reference":[95],"made":[97],"data":[100],"mining":[101],"approaches":[102,122],"detect":[105],"anomalies.":[106],"However,":[107],"major":[109],"focus":[110],"network":[118],"centric":[119],"anomaly":[120],"are":[124,144],"broadly":[125],"classified":[126],"behaviour-based,":[128],"structure-based":[129],"spectral-based.":[131],"Each":[132],"one":[133],"this":[135],"classification":[136],"further":[137],"incorporates":[138],"discussed":[145],"paper.":[148]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
