Outlier Detection for Temporal Data

Outlier (or anomaly) detection is a very broad field which has been studied in the context of a large number of research areas like statistics, data mining, sensor networks, environmental science, distributed systems, spatio-temporal mining, etc. Initial research in outlier detection focused on time series-based outliers (in statistics). Since then, outlier detection has been studied on a large variety of data types including high-dimensional data, uncertain data, stream data, network data, time series data, spatial data, and spatio-temporal data. While there have been many tutorials and surveys for general outlier detection, we focus on outlier detection for temporal data in this book. A large number of applications generate temporal datasets. For example, in our everyday life, various kinds of records like credit, personnel, financial, judicial, medical, etc., are all temporal. This stresses the need for an organized and detailed study of outliers with respect to such temporal data. In the past decade, there has been a lot of research on various forms of temporal data including consecutive data snapshots, series of data snapshots and data streams. Besides the initial work on time series, researchers have focused on rich forms of data including multiple data streams, spatio-temporal data, network data, community distribution data, etc. Compared to general outlier detection, techniques for temporal outlier detection are very different. In this book, we will present an organized picture of both recent and past research in temporal outlier detection. We start with the basics and then ramp up the reader to the main ideas in state-of-the-art outlier detection techniques. We motivate the importance of temporal outlier detection and brief the challenges beyond usual outlier detection. Then, we list down a taxonomy of proposed techniques for temporal outlier detection. Such techniques broadly include statistical techniques (like AR models, Markov models, histograms, neural networks), distance- and density-based approaches, grouping-based approaches (clustering, community detection), network-based approaches, and spatio-temporal outlier detection approaches. We summarize by presenting a wide collection of applications where temporal outlier detection techniques have been applied to discover interesting outliers.

[1]  Sameer Singh,et al.  Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..

[2]  Chang-Tien Lu,et al.  Wavelet fuzzy classification for detecting and tracking region outliers in meteorological data , 2004, GIS '04.

[3]  R. Lasaponara On the use of principal component analysis (PCA) for evaluating interannual vegetation anomalies from SPOT/VEGETATION NDVI temporal series , 2006 .

[4]  William M. Pottenger,et al.  A Survey of Emerging Trend Detection in Textual Data Mining , 2004 .

[5]  Yizhou Sun,et al.  On community outliers and their efficient detection in information networks , 2010, KDD.

[6]  Dimitrios Gunopulos,et al.  Distributed deviation detection in sensor networks , 2003, SGMD.

[7]  Charu C. Aggarwal,et al.  Event Detection in Social Streams , 2012, SDM.

[8]  Salvatore J. Stolfo,et al.  Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.

[9]  Dipankar Dasgupta,et al.  Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).

[10]  A. Raftery,et al.  Modeling flat stretches, bursts, and outliers in time series using mixture transition distribution models , 1996 .

[11]  Boleslaw K. Szymanski,et al.  Recursive data mining for masquerade detection and author identification , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[12]  S. Muthukrishnan,et al.  Mining Deviants in a Time Series Database , 1999, VLDB.

[13]  Yiguo Qiao,et al.  Anomaly intrusion detection method based on HMM , 2002 .

[14]  Eamonn J. Keogh,et al.  HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).

[15]  Charu C. Aggarwal,et al.  Addressing Concept-Evolution in Concept-Drifting Data Streams , 2010, 2010 IEEE International Conference on Data Mining.

[16]  David J. Marchette,et al.  Scan Statistics on Enron Graphs , 2005, Comput. Math. Organ. Theory.

[17]  Hui Xiong,et al.  A Stochastic Model for Context-Aware Anomaly Detection in Indoor Location Traces , 2012, 2012 IEEE 12th International Conference on Data Mining.

[18]  Eamonn J. Keogh,et al.  Finding the most unusual time series subsequence: algorithms and applications , 2006, Knowledge and Information Systems.

[19]  Aleksandar Lazarevic,et al.  Incremental Local Outlier Detection for Data Streams , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.

[20]  Mikhail J. Atallah,et al.  Detection of significant sets of episodes in event sequences , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[21]  Eamonn J. Keogh,et al.  Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).

[22]  Mikhail J. Atallah,et al.  Reliable detection of episodes in event sequences , 2004, Knowledge and Information Systems.

[23]  Jiong Yang,et al.  CLUSEQ: efficient and effective sequence clustering , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).

[24]  Mario Innocenti,et al.  Fault detection using neural networks , 1994, Proceedings of 1994 IEEE International Conference on Neural Networks (ICNN'94).

[25]  Philip S. Yu,et al.  Outlier Detection with Uncertain Data , 2008, SDM.

[26]  Abhishek Sharma,et al.  Context-Aware Time Series Anomaly Detection for Complex Systems , 2013 .

[27]  Martin Meckesheimer,et al.  Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.

[28]  Mikhail J. Atallah,et al.  Markov Models for Identification of Significant Episodes , 2005, SDM.

[29]  Peter J. Rousseeuw,et al.  Robust regression and outlier detection , 1987 .

[30]  Boleslaw K. Szymanski,et al.  FUZZY ROC CURVES FOR THE 1 CLASS SVM: APPLICATION TO INTRUSION DETECTION , 2005 .

[31]  Nirvana Meratnia,et al.  Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.

[32]  Anup K. Ghosh,et al.  Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[33]  Stephanie Forrest,et al.  A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[34]  Hui Xiong,et al.  Top-Eye: top-k evolving trajectory outlier detection , 2010, CIKM.

[35]  Daniel B. Neill,et al.  Fast subset scan for multivariate event detection , 2013, Statistics in medicine.

[36]  Philip S. Yu,et al.  Mining Knowledge from Interconnected Data: A Heterogeneous Information Network Analysis Approach , 2012, Proc. VLDB Endow..

[37]  Dipankar Dasgupta,et al.  Novelty detection in time series data using ideas from immunology , 1996 .

[38]  Matthew O. Ward,et al.  Neighbor-based pattern detection for windows over streaming data , 2009, EDBT '09.

[39]  M. Kraetzl,et al.  Novel approaches in modelling dynamics of networked surveillance environment , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[40]  Jiawei Han,et al.  On detecting Association-Based Clique Outliers in heterogeneous information networks , 2013, 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2013).

[41]  Charu C. Aggarwal,et al.  Evolutionary Clustering and Analysis of Bibliographic Networks , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[42]  Charu C. Aggarwal,et al.  Stream Classification with Recurring and Novel Class Detection Using Class-Based Ensemble , 2012, 2012 IEEE 12th International Conference on Data Mining.

[43]  Anne Lohrli Chapman and Hall , 1985 .

[44]  Ashok N. Srivastava,et al.  Anomaly Detection and Diagnosis Algorithms for Discrete Symbol Sequences with Applications to Airline Safety , 2009, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[45]  Mohammed J. Zaki,et al.  ADMIT: anomaly-based data mining for intrusions , 2002, KDD.

[46]  Philip K. Chan,et al.  Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .

[47]  Priya Narasimhan,et al.  Tiresias: Black-Box Failure Prediction in Distributed Systems , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[48]  Philip S. Yu,et al.  Mining knowledge from databases: an information network analysis approach , 2010, SIGMOD Conference.

[49]  Yiming Yang,et al.  Topic Detection and Tracking Pilot Study Final Report , 1998 .

[50]  Eleazar Eskin,et al.  A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .

[51]  Eamonn J. Keogh,et al.  Finding Time Series Discords Based on Haar Transform , 2006, ADMA.

[52]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[53]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .

[54]  Shai Ben-David,et al.  Detecting Change in Data Streams , 2004, VLDB.

[55]  Lon-Mu Liu,et al.  Joint Estimation of Model Parameters and Outlier Effects in Time Series , 1993 .

[56]  Yizhou Sun,et al.  Ranking-based clustering of heterogeneous information networks with star network schema , 2009, KDD.

[57]  Salvatore J. Stolfo,et al.  A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.

[58]  Vasant Honavar,et al.  Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.

[59]  Dimitrios Gunopulos,et al.  Online outlier detection in sensor data using non-parametric models , 2006, VLDB.

[60]  Jiawei Han Exploring the Power of Links in Data Mining , 2007, APWeb/WAIM.

[61]  Graham J. Williams,et al.  On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.

[62]  T. Lane,et al.  Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .

[63]  Jiawei Han,et al.  On the Power of Ensemble: Supervised and Unsupervised Methods Reconciled* , 2010 .

[64]  Eamonn J. Keogh,et al.  A symbolic representation of time series, with implications for streaming algorithms , 2003, DMKD '03.

[65]  Charu C. Aggarwal,et al.  On Anomalous Hotspot Discovery in Graph Streams , 2013, 2013 IEEE 13th International Conference on Data Mining.

[66]  Jeffrey Scott Vitter,et al.  Mining deviants in time series data streams , 2004, Proceedings. 16th International Conference on Scientific and Statistical Database Management, 2004..

[67]  Ira Assent,et al.  AnyOut: Anytime Outlier Detection on Streaming Data , 2012, DASFAA.

[68]  Terran Lane,et al.  An Application of Machine Learning to Anomaly Detection , 1999 .

[69]  R. McCulloch,et al.  Bayesian Inference and Prediction for Mean and Variance Shifts in Autoregressive Time Series , 1993 .

[70]  Charu C. Aggarwal,et al.  Outlier ensembles: position paper , 2013, SKDD.

[71]  Yizhou Sun,et al.  Integrating community matching and outlier detection for mining evolutionary community outliers , 2012, KDD.

[72]  Philip S. Yu,et al.  Mining Knowledge from Data: An Information Network Analysis Approach , 2012, 2012 IEEE 28th International Conference on Data Engineering.

[73]  Srinivasan Parthasarathy,et al.  LOADED: link-based outlier and anomaly detection in evolving data sets , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).

[74]  Carla Marceau,et al.  Characterizing the behavior of a program using multiple-length N-grams , 2001, NSPW '00.

[75]  Kenji Yamanishi,et al.  A unifying framework for detecting outliers and change points from non-stationary time series data , 2002, KDD.

[76]  Philip S. Yu,et al.  Mining, Indexing, and Similarity Search in Graphs and Complex Structures , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[77]  Michael Schatz,et al.  Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.

[78]  Charu C. Aggarwal,et al.  On change diagnosis in evolving data streams , 2005, IEEE Transactions on Knowledge and Data Engineering.

[79]  A. N. Srivastava,et al.  Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences , 2006 .

[80]  Peter J. Rousseeuw,et al.  Clustering by means of medoids , 1987 .

[81]  Salvatore J. Stolfo,et al.  Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.

[82]  Vikramaditya R. Jakkula,et al.  Anomaly Detection Using Temporal Data Mining in a Smart Home Environment , 2008, Methods of Information in Medicine.

[83]  Victoria J. Hodge,et al.  A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.

[84]  M. Kraetzl,et al.  Detection of abnormal change in dynamic networks , 1999, 1999 Information, Decision and Control. Data and Information Fusion Symposium, Signal Processing and Communications Symposium and Decision and Control Symposium. Proceedings (Cat. No.99EX251).

[85]  Haifeng Chen,et al.  Modeling and Tracking of Transaction Flow Dynamics for Fault Detection in Complex Systems , 2006, IEEE Transactions on Dependable and Secure Computing.

[86]  Jae-Gil Lee,et al.  Mining Massive RFID, Trajectory, and Traffic Data Sets , 2008, Knowledge Discovery and Data Mining.

[87]  Eyal Amir,et al.  Real‐time Bayesian anomaly detection in streaming environmental data , 2007 .

[88]  Dennis Shasha,et al.  Efficient elastic burst detection in data streams , 2003, KDD '03.

[89]  Vipin Kumar,et al.  Comparative Evaluation of Anomaly Detection Techniques for Sequence Data , 2008, 2008 Eighth IEEE International Conference on Data Mining.

[90]  C.-C. Jay Kuo,et al.  Distributed spatio-temporal outlier detection in sensor networks , 2005, SPIE Defense + Commercial Sensing.

[91]  Ji Zhang,et al.  SPOT: A System for Detecting Projected Outliers From High-dimensional Data Streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[92]  Carla E. Brodley,et al.  Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.

[93]  Daniel Peña,et al.  Detection of outlier patches in autoregressive time series , 1998 .

[94]  Li Wei,et al.  Assumption-Free Anomaly Detection in Time Series , 2005, SSDBM.

[95]  Charu C. Aggarwal,et al.  On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.

[96]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[97]  Aric A. Hagberg,et al.  Separating the Wheat from the Chaff: Practical Anomaly Detection Schemes in Ecological Applications of Distributed Sensor Networks , 2007, DCOSS.

[98]  Jimeng Sun,et al.  Streaming Pattern Discovery in Multiple Time-Series , 2005, VLDB.

[99]  Christos Faloutsos,et al.  Metric forensics: a multi-level approach for mining volatile graphs , 2010, KDD.

[100]  Jiawei Han,et al.  Community Distribution Outlier Detection in Heterogeneous Information Networks , 2013, ECML/PKDD.

[101]  Andrew R. Post,et al.  Temporal data mining. , 2008, Clinics in laboratory medicine.

[102]  P. Dickinson,et al.  Investigation of graph edit distance cost functions for detection of network anomalies , 2007 .

[103]  Peter J. Rousseeuw,et al.  Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.

[104]  Hector Garcia-Molina,et al.  Web graph similarity for anomaly detection , 2010, Journal of Internet Services and Applications.

[105]  Jae-Gil Lee,et al.  Temporal Outlier Detection in Vehicle Traffic Data , 2009, 2009 IEEE 25th International Conference on Data Engineering.

[106]  Zhilin Li,et al.  A Multiscale Approach for Spatio‐Temporal Outlier Detection , 2006, Trans. GIS.

[107]  Philip S. Yu,et al.  Scalable OLAP and mining of information networks , 2009, EDBT '09.

[108]  R. Tsay,et al.  Outlier Detection in Multivariate Time Series by Projection Pursuit , 2006 .

[109]  R. Tsay,et al.  Outliers in multivariate time series , 2000 .

[110]  Zhen Guo,et al.  Tracking Probabilistic Correlation of Monitoring Data for Fault Detection in Complex Systems , 2006, International Conference on Dependable Systems and Networks (DSN'06).

[111]  Derya Birant,et al.  Spatio-temporal outlier detection in large databases , 2006, 28th International Conference on Information Technology Interfaces, 2006..

[112]  Raman K. Mehra,et al.  Detection and classification of intrusions and faults using sequences of system calls , 2001, SGMD.

[113]  Daniel Peña,et al.  The Identification of Multiple Outliers in ARIMA Models , 2003 .

[114]  Katharina Morik,et al.  Anomaly Detection in Vertically Partitioned Data by Distributed Core Vector Machines , 2013, ECML/PKDD.

[115]  Zhilin Li,et al.  A hybrid approach to detect spatio-temporal outliers , 2004 .

[116]  Philip Chan,et al.  Learning States and Rules for Detecting Anomalies in Time Series , 2005, Applied Intelligence.

[117]  Lionel Tarassenko,et al.  A System for the Analysis of Jet Engine Vibration Data , 1999, Integr. Comput. Aided Eng..

[118]  Alberto Luceñ,et al.  Detecting possibly non‐consecutive outliers in industrial time series , 1998 .

[119]  Fabrizio Angiulli,et al.  Detecting distance-based outliers in streams of data , 2007, CIKM '07.

[120]  Cheng Zhang,et al.  Native API based Windows anomaly intrusion detection method using SVM , 2006, IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC'06).

[121]  Barak A. Pearlmutter,et al.  Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).

[122]  Philip S. Yu,et al.  Outlier detection in graph streams , 2011, 2011 IEEE 27th International Conference on Data Engineering.

[123]  Vipin Kumar,et al.  Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.

[124]  Rajeev Gandhi,et al.  Ganesha: blackBox diagnosis of MapReduce systems , 2010, PERV.

[125]  Rayford B. Vaughn,et al.  Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models , 2005, ISC.

[126]  Sangkyum Kim,et al.  Motion-Alert: Automatic Anomaly Detection in Massive Moving Objects , 2006, ISI.

[127]  Anup K. Ghosh,et al.  A Study in Using Neural Networks for Anomaly and Misuse Detection , 1999, USENIX Security Symposium.

[128]  Leonid Portnoy,et al.  Intrusion detection with unlabeled data using clustering , 2000 .

[129]  Shaomin Mu,et al.  Sequence-similarity kernels for SVMs to detect anomalies in system calls , 2007, Neurocomputing.

[130]  W. Drosdowsky,et al.  An analysis of Australian seasonal rainfall anomalies: 1950–1987. I: Spatial patterns , 1993 .

[131]  Ana Bianco,et al.  Outlier Detection in Regression Models with ARIMA Errors Using Robust Estimates , 2001 .

[132]  Stephanie Forrest,et al.  Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..

[133]  Brandon Pincombea,et al.  Anomaly Detection in Time Series of Graphs using ARMA Processes , 2007 .

[134]  James Allan,et al.  Introduction to topic detection and tracking , 2002 .

[135]  D. Endler,et al.  Intrusion detection. Applying machine learning to Solaris audit data , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).

[136]  Sanjay Chawla,et al.  Spatio-temporal Outlier Detection in Precipitation Data , 2008, KDD Workshop on Knowledge Discovery from Sensor Data.

[137]  Philip S. Yu,et al.  GraphScope: parameter-free mining of large time-evolving graphs , 2007, KDD '07.

[138]  Alan S. Perelson,et al.  Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.

[139]  Cyrus Shahabi,et al.  TSA-tree: a wavelet-based approach to improve the efficiency of multi-level surprise and trend queries on time-series data , 2000, Proceedings. 12th International Conference on Scientific and Statistica Database Management.

[140]  Charu C. Aggarwal,et al.  Finding Top-k Shortest Path Distance Changes in an Evolutionary Network , 2011, SSTD.

[141]  Jian Pei,et al.  WAT: Finding Top-K Discords in Time Series Database , 2007, SDM.

[142]  Christoph C. Michael,et al.  Two state-based approaches to program-based anomaly detection , 2000, Proceedings 16th Annual Computer Security Applications Conference (ACSAC'00).

[143]  Charu C. Aggarwal,et al.  Classification and Adaptive Novel Class Detection of Feature-Evolving Data Streams , 2013, IEEE Transactions on Knowledge and Data Engineering.

[144]  G. C. Tiao,et al.  Estimation of time series parameters in the presence of outliers , 1988 .

[145]  Dipankar Dasgupta,et al.  A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.

[146]  Hisashi Kashima,et al.  Eigenspace-based anomaly detection in computer systems , 2004, KDD.

[147]  Nong Ye,et al.  A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .

[148]  Dawei Liu,et al.  Efficient anomaly monitoring over moving object trajectory streams , 2009, KDD.

[149]  Jiawei Han,et al.  Top-K interesting subgraph discovery in information networks , 2014, 2014 IEEE 30th International Conference on Data Engineering.

[150]  Gregory F. Cooper,et al.  A multivariate Bayesian scan statistic for early event detection and characterization , 2010, Machine Learning.

[151]  David J. Hill,et al.  Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..

[152]  Charu C. Aggarwal,et al.  Tutorial: Outlier Detection for Temporal Data , 2013 .

[153]  Eyal Amir,et al.  Real-time Bayesian Anomaly Detection for Environmental Sensor Data , 2007 .

[154]  Jörgen Hansson,et al.  Issues in Active Real-Time Databases , 1995, ARTDB.

[155]  Michael Gertz,et al.  Detection and Exploration of Outlier Regions in Sensor Data Streams , 2008, 2008 IEEE International Conference on Data Mining Workshops.

[156]  Jiawei Han,et al.  Data Mining: Concepts and Techniques , 2000 .

[157]  Eamonn J. Keogh,et al.  Finding surprising patterns in a time series database in linear time and space , 2002, KDD.

[158]  Pingzhi Fan,et al.  A new anomaly detection method based on hierarchical HMM , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.

[159]  Sangkyum Kim,et al.  ROAM: Rule- and Motif-Based Anomaly Detection in Massive Moving Object Data Sets , 2007, SDM.

[160]  Jiawei Han,et al.  A Geometric Perspective on Dimensionality Reduction , 2009, SDM 2009.

[161]  Anup K. Ghosh,et al.  Using Program Behavior Pro � les for Intrusion Detection , 1999 .

[162]  Andre Lucas,et al.  Outlier Detection in Cointegration Analysis , 1998 .

[163]  Paul Helman,et al.  An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[164]  Kun Li,et al.  Efficient Clustering-Based Outlier Detection Algorithm for Dynamic Data Stream , 2008, 2008 Fifth International Conference on Fuzzy Systems and Knowledge Discovery.

[165]  M. Otto,et al.  Outliers in Time Series , 1972 .

[166]  Li Wei,et al.  Experiencing SAX: a novel symbolic representation of time series , 2007, Data Mining and Knowledge Discovery.

[167]  B. R. Badrinath,et al.  Context-Aware Sensors , 2004, EWSN.

[168]  Eamonn J. Keogh,et al.  Towards parameter-free data mining , 2004, KDD.

[169]  W. Krajewski,et al.  Real-time quality control of streamflow data―a simulation study , 1989 .

[170]  Jiawei Han,et al.  Mining Approximate Top-K Subspace Anomalies in Multi-Dimensional Time-Series Data , 2007, VLDB.

[171]  Philip S. Yu,et al.  Outlier detection for high dimensional data , 2001, SIGMOD '01.

[172]  H. Bunke,et al.  Median graphs and anomalous change detection in communication networks , 2002, Final Program and Abstracts on Information, Decision and Control.

[173]  Srinivasan Parthasarathy,et al.  Fast Distributed Outlier Detection in Mixed-Attribute Data Sets , 2006, Data Mining and Knowledge Discovery.

[174]  Raymond T. Ng,et al.  Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.

[175]  Marimuthu Palaniswami,et al.  Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.

[176]  James Allan,et al.  Topic detection and tracking: event-based information organization , 2002 .

[177]  Praneeth Namburi,et al.  Online Outlier Detection Based on Relative Neighbourhood Dissimilarity , 2008, WISE.

[178]  Sanjay Chawla,et al.  Mining for Outliers in Sequential Databases , 2006, SDM.

[179]  Michael Gertz,et al.  ORDEN: outlier region detection and exploration in sensor networks , 2009, SIGMOD Conference.

[180]  J. Ma,et al.  Time-series novelty detection using one-class support vector machines , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..

[181]  James Allan,et al.  Explorations within topic tracking and detection , 2002 .

[182]  Sameer Singh,et al.  Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..

[183]  Li Wei,et al.  SAXually Explicit Images: Finding Unusual Shapes , 2006, Sixth International Conference on Data Mining (ICDM'06).

[184]  Jiawei Han,et al.  Mining heterogeneous information networks , 2010, Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD '10.

[185]  Tom Fawcett,et al.  Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.

[186]  Yizhou Sun,et al.  Community Trend Outlier Detection Using Soft Temporal Pattern Mining , 2012, ECML/PKDD.

[187]  Kanishka Bhaduri,et al.  Distributed anomaly detection using 1‐class SVM for vertically partitioned data , 2011, Stat. Anal. Data Min..

[188]  Eamonn J. Keogh,et al.  Disk aware discord discovery: finding unusual time series in terabyte sized datasets , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).

[189]  Douglas M. Hawkins Identification of Outliers , 1980, Monographs on Applied Probability and Statistics.

[190]  Charu C. Aggarwal,et al.  On clustering heterogeneous social media objects with outlier links , 2012, WSDM '12.

[191]  Ma Xiujun,et al.  Detecting spatio-temporal outliers in climate dataset: a method study , 2005, Proceedings. 2005 IEEE International Geoscience and Remote Sensing Symposium, 2005. IGARSS '05..

[192]  Latifur Khan Data Stream Mining: Challenges and Techniques , 2010, 2010 22nd IEEE International Conference on Tools with Artificial Intelligence.

[193]  Christos Faloutsos,et al.  oddball: Spotting Anomalies in Weighted Graphs , 2010, PAKDD.

[194]  Jae-Gil Lee,et al.  Trajectory Outlier Detection: A Partition-and-Detect Framework , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[195]  Jiawei Han,et al.  Local Learning for Mining Outlier Subgraphs from Network Datasets , 2014, SDM.

[196]  Pavlos Protopapas,et al.  Finding anomalous periodic time series , 2009, Machine Learning.

[197]  Gang Chen,et al.  Attribute Outlier Detection over Data Streams , 2010, DASFAA.

[198]  Bo Gao,et al.  HMMs (Hidden Markov models) based on anomaly intrusion detection method , 2002, Proceedings. International Conference on Machine Learning and Cybernetics.

[199]  Vijayalakshmi Atluri,et al.  Neighborhood based detection of anomalies in high dimensional spatio-temporal sensor datasets , 2004, SAC '04.

[200]  Jonathan G. Fiscus,et al.  NIST's 1998 topic detection and tracking evaluation (TDT2) , 1999, EUROSPEECH.

[201]  Ran Wolff,et al.  Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .

[202]  Jae Won Lee,et al.  OutlierD: an R package for outlier detection using quantile regression on mass spectrometry data , 2008, Bioinform..

[203]  Mark Crovella,et al.  Characterization of network-wide anomalies in traffic flows , 2004, IMC '04.

[204]  R. Tsay Time Series Model Specification in the Presence of Outliers , 1986 .

[205]  Charu C. Aggarwal,et al.  Detecting Recurring and Novel Classes in Concept-Drifting Data Streams , 2011, 2011 IEEE 11th International Conference on Data Mining.

[206]  Xiao-yun Chen,et al.  Multi-scale anomaly detection algorithm based on infrequent pattern of time series , 2008 .

[207]  Fabio A. González,et al.  Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.

[208]  Thorsten Brants,et al.  A System for new event detection , 2003, SIGIR.

[209]  Junshui Ma,et al.  Online novelty detection on temporal sequences , 2003, KDD '03.