Detecting anomalous behaviors using structural properties of social networks

Yaniv Altshuler, Michael Fire, Erez Shmueli, Yuval Elovici, Alfred Bruckstein, Alex Pentland, David Lazer

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper we discuss the analysis of mobile networks communication patterns in the presence of some anomalous "real world event". We argue that given limited analysis resources (namely, limited number of network edges we can analyze), it is best to select edges that are located around 'hubs' in the network, resulting in an improved ability to detect such events. We demonstrate this method using a dataset containing the call log data of 3 years from a major mobile carrier in a developed European nation.

Original languageEnglish
Title of host publicationSocial Computing, Behavioral-Cultural Modeling and Prediction - 6th International Conference, SBP 2013, Proceedings
Pages433-440
Number of pages8
DOIs
StatePublished - 14 Mar 2013
Event6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013 - Washington, DC, United States
Duration: 2 Apr 20135 Apr 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7812 LNCS

Conference

Conference6th International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, SBP 2013
Country/TerritoryUnited States
CityWashington, DC
Period2/04/135/04/13

Keywords

  • Anomalies Detection
  • Behavior Modeling
  • Emergencies
  • Mobile Networks

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Detecting anomalous behaviors using structural properties of social networks'. Together they form a unique fingerprint.

Cite this