Intelligence Cookbooks
End-to-end walkthroughs for real-world temporal graph analysis. Each cookbook starts with synthetic data, walks through the analysis step by step, and produces actionable insights.
Financial Fraud Detection
Detect coordinated fraud rings, trace money flows, and generate SAR-ready investigation reports.
Learn more
Cybersecurity Threat Hunting
Detect lateral movement, reconstruct attack chains, and calculate blast radius from compromised hosts.
Learn more
Supply Chain Risk Analysis
Model multi-tier supplier dependencies, simulate disruption cascades, and identify single points of failure.
Learn more
Social Network Analysis
Track influence evolution, model viral content spread, and detect coordinated inauthentic behavior.
Learn more
Service Dependency Mapping
Map microservice dependencies, detect failure cascades, and identify critical infrastructure paths.
Learn more
Cookbook Philosophy
Unlike tutorials, cookbooks are complete, working pipelines you can adapt for your use case:
- Start with data – Each cookbook generates realistic synthetic data
- Show the challenge – Explain what we're solving and why temporal matters
- Step-by-step analysis – Every code block works and has output
- Actionable output – End with reports, scores, or alerts you can use
Choosing a Cookbook
| If you're in... | Start with... |
|---|---|
| Financial Services | Fraud Detection |
| Security / SOC | Cybersecurity |
| Manufacturing / Logistics | Supply Chain |
| Social / Media Platforms | Social Networks |
| DevOps / SRE | Network Operations |