A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2006; you can also visit the original URL.
The file type is
How does a 'normal' computer (or social) network look like? How can we spot 'abnormal' sub-networks in the Internet, or web graph? The answer to such questions is vital for outlier detection (terrorist networks, or illegal money-laundering rings), forecasting, and simulations ("how will a computer virus spread?"). The heart of the problem is finding the properties of real graphs that seem to persist over multiple disciplines. We list such "laws" and, more importantly, we propose a simple,doi:10.1137/1.9781611972740.43 dblp:conf/sdm/ChakrabartiZF04 fatcat:v4jnnhdevjapjpoqjsin7pe3cy