2023
DOI: 10.1007/s11280-023-01165-z
|View full text |Cite
|
Sign up to set email alerts
|

Persistent graph stream summarization for real-time graph analytics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 28 publications
(3 citation statements)
references
References 34 publications
0
2
0
Order By: Relevance
“…With many important breakthroughs in the application of deep neural network models to graphs, graph-based methods have attracted more and more attention from scholars in many research areas. For example, to better analyze large-volume and fast-changing streaming graphs, Gu and Jiang, et al, proposed a method to efficiently find the graph stream summary, PGSS-MDC [20], to address the problem of providing highly accurate and fast answers to graph queries within a certain time interval. Meanwhile, the use of graph-based methods to detect network intrusions have also become an important research direction; for example, to to detect the existence of multi-step attacks in a large number of security alarms in smart city application scenarios, Jia, et al, proposed the ACAM network security analysis framework [21], which is a network security analysis framework based on the Knowledge Representation Model (Multi-dimensional Data Association and Intelligent Analysis Model [22]).…”
Section: Related Workmentioning
confidence: 99%
“…With many important breakthroughs in the application of deep neural network models to graphs, graph-based methods have attracted more and more attention from scholars in many research areas. For example, to better analyze large-volume and fast-changing streaming graphs, Gu and Jiang, et al, proposed a method to efficiently find the graph stream summary, PGSS-MDC [20], to address the problem of providing highly accurate and fast answers to graph queries within a certain time interval. Meanwhile, the use of graph-based methods to detect network intrusions have also become an important research direction; for example, to to detect the existence of multi-step attacks in a large number of security alarms in smart city application scenarios, Jia, et al, proposed the ACAM network security analysis framework [21], which is a network security analysis framework based on the Knowledge Representation Model (Multi-dimensional Data Association and Intelligent Analysis Model [22]).…”
Section: Related Workmentioning
confidence: 99%
“…In terms of the definition of hyperedges and edges, graphs are a special case of hypergraphs. There is a large amount of discrete data with complex relationships in the real world, but modeling binary relationships between discrete data via graphs can result in a loss of information, whereas hypergraphs are a more direct and natural way of modeling [23]. Figure 1 shows the topology difference between graphs and hypergraphs.…”
Section: Preliminariesmentioning
confidence: 99%
“…While knowledge graph can represent facts clearly [8], most of these facts are static and not easily changed. In the real world, dynamic facts typically dominate and may be distorted by the passage of time and changes in space.…”
Section: Introductionmentioning
confidence: 99%