A comprehensive review: Anomaly detection techniques on social networking and its applications

dc.contributor.authorSarfaraz Alam, Mohammad Faisal
dc.date.accessioned2026-04-23T04:50:13Z
dc.date.issued2025
dc.descriptionAdvances in Science, Engineering and Technology Edited ByTasneem Ahmed, Shrish Bajpai, Mohammad Faisal, Suman Lata Tripathi
dc.description.abstractDue to large part in the expansion of Web 2.0 and the Internet over the last ten years, interest in online social networks has increased dramatically. These websites are among the most widely used worldwide, with applications in telemarketing, healthcare, education, and entertainment that touch almost every facet of daily life. Unfortunately, criminals have made these their primary targets when attempting to commit crimes and harm other users. It is possible to identify the strange actions of these consumers by employing anomaly detection techniques. Anomaly detection in social networks involves identifying unusual and unexpected user behavior by analyzing the hidden patterns within the networks. This task is particularly challenging because the interaction patterns of these users differ significantly from those of regular network users. Although numerous anomaly detection techniques have been designed for various problematic situations, this area is still comparatively new and quickly evolving. Consequently, a structured analysis of the research conducted in anomaly detection within social networks is increasingly necessary. This paper provides an in-depth analysis of various approaches to social network anomaly detection. It introduces multiple taxonomy levels that categorize current techniques based on the types of anomalies they detect, the characteristics of the input networks, and the underlying detection methodologies. Additionally, the study explores the open problems and research obstacles in this field and highlights the diverse application contexts where these methods have been employed.
dc.identifier.isbn9781003641544
dc.identifier.urihttps://doi.org/10.1201/9781003641544
dc.identifier.urihttp://136.232.12.194:4000/handle/123456789/1754
dc.language.isoen_US
dc.publisherCRC Press
dc.subjectTECHNOLOGY::Information technology::Computer science
dc.titleA comprehensive review: Anomaly detection techniques on social networking and its applications
dc.typeBook chapter

Files

Original bundle

Now showing 1 - 1 of 1
Thumbnail Image
Name:
Ch_A comprehensive review.pdf
Size:
3.17 MB
Format:
Adobe Portable Document Format

License bundle

Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.71 KB
Format:
Item-specific license agreed upon to submission
Description: