[1] Y. Liu and S. Chawla, “Social Media Anomaly Detection: Challenges and Solutions,” in Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 2317-2318, 2015.##
[2] R. Yu, X. He, and Y. Liu, “Glad: Group Anomaly Detection In Social Media Analysis,” ACM Transactions on Knowledge Discovery from Data ACM T Knowl Discov D, vol. 10, no. 2, pp. 1-22, 2015.##
[4] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly Detection: A Survey,” ACM computing surveys ACM Comput. Surv., vol. 41, no. 3, pp. 1-58, 2009.##
[5] M. E. Newman, D. J. Watts, and S. H. Strogatz, “Random Graph Models of Social Networks,” Proceedings of the national academy of sciences, vol. 99, no. 1, pp. 2566-2572, 2002.##
[6] L. Akoglu, H. Tong, and D. Koutra, “Graph Based Anomaly Detection and Description: A Survey,” Data mining and knowledge discovery Data Min Knowl Disc, vol. 29, no. 3, pp. 626-688, 2015.##
[7] M. Zamini and S. M. H. Hasheminejad, “A Comprehensive Survey of Anomaly Detection in Banking, Wireless Sensor Networks, Social Networks, and Healthcare, ” Intelligent Decision Technologies FRONT ARTIF INTEL AP, vol. 13, no. 2, pp. 229-270, 2019.##
[8] S. Ranshous, S. Shen, D. Koutra, S. Harenberg, C. Faloutsos, and N. F. Samatova, “Anomaly Detection in Dynamic Networks: A Survey, ” Wiley Interdisciplinary Reviews: Computational Statistics, vol. 7, no. 3, pp. 223-247, 2015.##
[9] R. Hassanzadeh, R. Nayak, and D. Stebila, “Analyzing the Effectiveness of Graph Metrics for Anomaly Detection in Online Social Networks,” in International Conference on Web Information Systems Engineering, Springer, pp. 624-630, 2012.##
[10] K. Das, S. Samanta, and M. Pal, “Study on Centrality Measures in Social Networks: A Survey,” Social Network Analysis and Mining, vol. 8, no. 1, p. 13, 2018.##
[11] F. Riquelme, P. Gonzalez-Cantergiani, X. Molinero, and M. Serna, “Centrality Measure in Social Networks Based on Linear Threshold Model,” Knowledge-Based Systems Knowl-Based Syst., vol. 140, pp. 92-102, 2018.##
[12] M. Z. Al-Taie and S. Kadry, Python for Graph and Network Analysis, Springer, 2017.##
[13] A. Hagberg, D. Schult, and P. Swart, “NetworkX Reference, Release 2.3,” NetworkX Developers, Last updated on Apr. 11, 2019.##
[14] M. Mirzaee and A. Mahabadi, “Anomaly Detection Method in Attributed Graph, Based on Community Detection and Feature Selection,” Electronic and Cyber Defense, 2019.##
[15] N. A. Heard, D. J. Weston, K. Platanioti, and D. J. Hand, “Bayesian Anomaly Detection Methods for Social Networks,” The Annals of Applied Statistics, vol. 4, no. 2, pp. 645-662, 2010.##
[16] M. G. Vigliotti and C. Hankin, “Discovery of anomalous behaviour in temporal networks,” Social Networks, vol. 41, pp. 18-25, 2015.##
[17] V. K. Giri and S. Sachdeva, “Anomaly Detection in Social Networks,” in 2019 9th International Conference on Cloud Computing, Data Science & Engineering (Confluence), IEEE, pp. 698-703, 2019.##
[18] R. Kaur and S. Singh, ”A Comparative Analysis of Structural Graph Metrics to Identify Anomalies in Online Social Networks,” Computers & Electrical Engineering Comput. Electr. Eng., vol. 57, pp. 294-310, 2017.##