Data-driven cybersecurity incident prediction: A survey

N Sun, J Zhang, P Rimba, S Gao… - … surveys & tutorials, 2018 - ieeexplore.ieee.org
Driven by the increasing scale and high profile cybersecurity incidents related public data,
recent years we have witnessed a paradigm shift in understanding and defending against …

Multi-scale attributed node embedding

B Rozemberczki, C Allen… - Journal of Complex …, 2021 - academic.oup.com
We present network embedding algorithms that capture information about a node from the
local distribution over node attributes around it, as observed over random walks following an …

node2vec: Scalable feature learning for networks

A Grover, J Leskovec - Proceedings of the 22nd ACM SIGKDD …, 2016 - dl.acm.org
Prediction tasks over nodes and edges in networks require careful effort in engineering
features used by learning algorithms. Recent research in the broader field of representation …

Deepwalk: Online learning of social representations

B Perozzi, R Al-Rfou, S Skiena - Proceedings of the 20th ACM SIGKDD …, 2014 - dl.acm.org
We present DeepWalk, a novel approach for learning latent representations of vertices in a
network. These latent representations encode social relations in a continuous vector space …

Graph based anomaly detection and description: a survey

L Akoglu, H Tong, D Koutra - Data mining and knowledge discovery, 2015 - Springer
Detecting anomalies in data is a vital task, with numerous high-impact applications in areas
such as security, finance, health care, and law enforcement. While numerous techniques …

Mining social networks for anomalies: Methods and challenges

PV Bindu, PS Thilagam - Journal of Network and Computer Applications, 2016 - Elsevier
Online social networks have received a dramatic increase of interest in the last decade due
to the growth of Internet and Web 2.0. They are among the most popular sites on the Internet …

APATE: A novel approach for automated credit card transaction fraud detection using network-based extensions

V Van Vlasselaer, C Bravo, O Caelen… - Decision support …, 2015 - Elsevier
In the last decade, the ease of online payment has opened up many new opportunities for e-
commerce, lowering the geographical boundaries for retail. While e-commerce is still …

Rolx: structural role extraction & mining in large graphs

K Henderson, B Gallagher, T Eliassi-Rad… - Proceedings of the 18th …, 2012 - dl.acm.org
Given a network, intuitively two nodes belong to the same role if they have similar structural
behavior. Roles should be automatically determined from the data, and could be, for …

Interactive anomaly detection on attributed networks

K Ding, J Li, H Liu - Proceedings of the twelfth ACM international …, 2019 - dl.acm.org
Performing anomaly detection on attributed networks concerns with finding nodes whose
patterns or behaviors deviate significantly from the majority of reference nodes. Its success …

Reformulating graph kernels for self-supervised space-time correspondence learning

Z Qin, X Lu, D Liu, X Nie, Y Yin, J Shen… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Self-supervised space-time correspondence learning utilizing unlabeled videos holds great
potential in computer vision. Most existing methods rely on contrastive learning with mining …