Advances, Systems and Applications
From: A large-scale data security detection method based on continuous time graph embedding framework
Database | \(\left| V\right|\) | \(\left| E_{T}\right|\) | d | \(d_{max}\) | \(\mathcal {S}_{t}\) | T |
---|---|---|---|---|---|---|
IA-EMAIL-EU | 927 | 323.3K | 15.8 | 232 | 784.87 | 44 |
FB-FORUM | 899 | 33.7K | 9.9 | 109 | 147.52 | 10 |
SOC-SIGN-BITCOINA | 3.7K | 24.1K | 5.9 | 597 | 1791.32 | 11 |
SOC-WIKI-ELEC | 7.1K | 107K | 12.2 | 602 | 1263.47 | 20 |