The PDF file you selected should load here if your Web browser has a PDF reader plug-in installed (for example, a recent version of Adobe Acrobat Reader).

If you would like more information about how to print, save, and work with PDFs, Highwire Press provides a helpful Frequently Asked Questions about PDFs.

Alternatively, you can download the PDF file directly to your computer, from where it can be opened using a PDF reader. To download the PDF, click the Download link above.

Fullscreen Fullscreen Off


This survey paper cites some methods of graph based anomaly detection in the field of information security, finance, cybersecurity, online social networks, health care, law enforcement etc. and their classification. Finally, the relevance of cyber crime and its elimination is highlighted throughout the paper with some real world applications of graph based anomaly detection techniques and also some future direction to improve the technique of detecting anomalies in data has been given.

Keywords

Anomaly Detection, Fraud Detection, Graph, Online Social Networks, Outlier Detection, Security
User