Monitoring dynamic networks: A simulation-based strategy for comparing monitoring methods and a comparative study

Lisha YU, Inez Maria ZWETSLOOT*, Nathaniel Tyler STEVENS, James David WILSON, Kwok Leung TSUI

*Corresponding author for this work

Research output: Journal PublicationsJournal Article (refereed)peer-review

9 Citations (Scopus)

Abstract

Recently, there has been a lot of interest in monitoring and identifying changes in dynamic networks, which has led to the development of a variety of monitoring methods. New methods are often designed for a specialized use-case and rarely compared to competing methods in a systematic fashion. In light of this, the use of simulation is proposed to compare the performance of network monitoring methods over a variety of dynamic network changes. Using the family of simulated dynamic networks, the performance of several state-of-the-art social network monitoring methods from the literature are compared. Their performance over a variety of types of change is compared; both increases in communication levels as well as changes in community structure are considered. It is shown that there does not exist one method that is uniformly superior to the others; the best method depends on the context and the type of change one wishes to detect. As such, it is concluded that a variety of methods are needed for network monitoring and that it is important to understand in which scenarios a given method is appropriate.

Original languageEnglish
Pages (from-to)1226-1250
Number of pages25
JournalQuality and Reliability Engineering International
Volume38
Issue number3
Early online date14 Mar 2022
DOIs
Publication statusPublished - Apr 2022
Externally publishedYes

Bibliographical note

Publisher Copyright:
© 2021 John Wiley & Sons Ltd.

Keywords

  • comparison framework
  • control chart
  • dynamic networks
  • network surveillance
  • statistical process monitoring

Fingerprint

Dive into the research topics of 'Monitoring dynamic networks: A simulation-based strategy for comparing monitoring methods and a comparative study'. Together they form a unique fingerprint.

Cite this