Anomaly detection: A survey
暂无分享,去创建一个
[1] F. Y. Edgeworth,et al. XLI. On discordant observations , 1887 .
[2] K. Pearson. Biometrika , 1902, The American Naturalist.
[3] A. R. Crathorne,et al. Economic Control of Quality of Manufactured Product. , 1933 .
[4] F. J. Anscombe,et al. Rejection of Outliers , 1960 .
[5] Thomas S. Ferguson,et al. On the Rejection of Outliers , 1961 .
[6] E. Parzen. On Estimation of a Probability Density Function and Mode , 1962 .
[7] G. C. Tiao,et al. A bayesian approach to some outlier problems. , 1968, Biometrika.
[8] F. E. Grubbs. Procedures for Detecting Outlying Observations in Samples , 1969 .
[9] M. Otto,et al. Outliers in Time Series , 1972 .
[10] W. Stefansky. Rejecting Outliers in Factorial Designs , 1972 .
[11] Douglas M. Hawkins,et al. The Detection of Errors in Multivariate Data Using Principal Components , 1974 .
[12] J. Pickands. Statistical Inference Using Extreme Order Statistics , 1975 .
[13] Jon Louis Bentley,et al. Multidimensional binary search trees used for associative searching , 1975, CACM.
[14] V. Barnett. The Ordering of Multivariate Data , 1976 .
[15] 共立出版株式会社. コンピュータ・サイエンス : ACM computing surveys , 1978 .
[16] Vic Barnett,et al. Outliers in Statistical Data , 1980 .
[17] W. R. Buckland,et al. Outliers in Statistical Data , 1979 .
[18] G. Box,et al. Bayesian analysis of some outlier problems in time series , 1979 .
[19] G. Kitagawa. On the Use of AIC for the Detection of Outliers , 1979 .
[20] J. A. Hartigan,et al. A k-means clustering algorithm , 1979 .
[21] B. Rosner. Percentage Points for a Generalized ESD Many-Outlier Procedure , 1983 .
[22] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1987, IEEE Transactions on Software Engineering.
[23] Peter J. Rousseeuw,et al. Robust regression and outlier detection , 1987 .
[24] Peter J. Rousseeuw,et al. Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.
[25] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[26] A. Madansky. Identification of Outliers , 1988 .
[27] B. Abraham,et al. Outlier detection and time series modeling , 1989 .
[28] Lawrence D. Jackel,et al. Handwritten Digit Recognition with a Back-Propagation Network , 1989, NIPS.
[29] H. Arp. Discordant observations. , 1990, Science.
[30] H. S. Teng,et al. Adaptive real-time anomaly detection using inductively generated sequential patterns , 1990, Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy.
[31] Michael Kearns,et al. Computational complexity of machine learning , 1990, ACM distinguished dissertations.
[32] J. Liu,et al. Detection of outlying data in bioavailability/bioequivalence studies. , 1991, Statistics in medicine.
[33] Dirk Aeyels,et al. On the dynamic behavior of the novelty detector and the novelty filter , 1991 .
[34] Harold S. Javitz,et al. The SRI IDES statistical anomaly detector , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[35] A. Jagota,et al. Novelty detection on a very large number of memories stored in a Hopfield-style network , 1991, IJCNN-91-Seattle International Joint Conference on Neural Networks.
[36] Philip H. S. Torr,et al. Outlier detection and motion segmentation , 1993, Other Conferences.
[37] Ming Li,et al. An Introduction to Kolmogorov Complexity and Its Applications , 2019, Texts in Computer Science.
[38] M. M. Moya,et al. One-class classifier networks for target recognition applications , 1993 .
[39] R. Perfetti,et al. Generalized cellular neural network for novelty detection , 1994 .
[40] Jiawei Han,et al. Efficient and Effective Clustering Methods for Spatial Data Mining , 1994, VLDB.
[41] Christopher M. Bishop,et al. Novelty detection and neural network validation , 1994 .
[42] Stephen J. Roberts,et al. A Probabilistic Resource Allocating Network for Novelty Detection , 1994, Neural Computation.
[43] Alan S. Perelson,et al. Self-nonself discrimination in a computer , 1994, Proceedings of 1994 IEEE Computer Society Symposium on Research in Security and Privacy.
[44] Matthias Jarke,et al. 20th VLDB Conference, September 12-15, 1994, Santiago-Chile : proceedings of the 20th International Conference on Very Large Data Bases , 1994 .
[45] Alfonso Valdes,et al. Next Generation Intrusion Detection Expert System (NIDES), Software Users Manual , 1994 .
[46] Douglas L. Reilly,et al. Credit card fraud detection with a neural-network , 1994, 1994 Proceedings of the Twenty-Seventh Hawaii International Conference on System Sciences.
[47] Padhraic Smyth,et al. Markov monitoring with unknown states , 1994, IEEE J. Sel. Areas Commun..
[48] Dulal K. Bhaumik,et al. Statistical Methods for Groundwater Monitoring , 1994 .
[49] Nick Roussopoulos,et al. Nearest neighbor queries , 1995, SIGMOD '95.
[50] Nathalie Japkowicz,et al. A Novelty Detection Approach to Classification , 1995, IJCAI.
[51] Teuvo Kohonen,et al. Self-Organizing Maps , 2010 .
[52] Ashok N. Srivastava,et al. Nonlinear gated experts for time series: discovering regimes and avoiding overfitting , 1995, Int. J. Neural Syst..
[53] Richard A. Kemmerer,et al. State Transition Analysis: A Rule-Based Intrusion Detection Approach , 1995, IEEE Trans. Software Eng..
[54] Bruce A. Whitehead,et al. Function approximation approach to anomaly detection in propulsion system test data , 1995 .
[55] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[56] Germano C. Vasconcelos,et al. Investigating feedforward neural networks with respect to the rejection of spurious patterns , 1995, Pattern Recognit. Lett..
[57] Michael Brady,et al. Novelty detection for the identification of masses in mammograms , 1995 .
[58] Stephen Jose Hanson,et al. A Neural Network Autoassociator for Induction Motor Failure Prediction , 1995, NIPS.
[59] Ron Meir,et al. Time Series Prediction using Mixtures of Experts , 1996, NIPS.
[60] Padhraic Smyth,et al. Clustering Sequences with Hidden Markov Models , 1996, NIPS.
[61] Prabhakar Raghavan,et al. A Linear Method for Deviation Detection in Large Databases , 1996, KDD.
[62] Hans-Peter Kriegel,et al. A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise , 1996, KDD.
[63] Paul Helman,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[64] Lucas C. Parra,et al. Statistical Independence and Novelty Detection with Information Preserving Nonlinear Maps , 1996, Neural Computation.
[65] Ray J. Frank,et al. The detection of fraud in mobile phone networks , 1996 .
[66] Mohamed A. El-Sharkawi,et al. Detection of shorted-turns in the field winding of turbine-generator rotors using novelty detectors-development and field test , 1996 .
[67] S. Forrest,et al. An immunological approach to change detection: algorithms, analysis and implications , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[68] Stephanie Forrest,et al. A sense of self for Unix processes , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.
[69] Keith Worden,et al. STRUCTURAL FAULT DETECTION USING A NOVELTY MEASURE , 1997 .
[70] Cecilia Surace,et al. A statistical approach to damage detection through vibration monitoring , 1997 .
[71] Peter Sykacek,et al. Equivalent error bars for neural network classifiers trained by Bayesian inference , 1997, ESANN.
[72] Peter G. Neumann,et al. EMERALD: Event Monitoring Enabling Responses to Anomalous Live Disturbances , 1997, CCS 2002.
[73] R. Blender,et al. Identification of cyclone‐track regimes in the North Atlantic , 1997 .
[74] Robert P. W. Duin,et al. Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.
[75] T. Lane,et al. Sequence Matching and Learning in Anomaly Detection for Computer Security , 1997 .
[76] Cecilia Surace,et al. A Novelty Detection Approach to Diagnose Damage in a Cracked Beam , 1997 .
[77] Paul Helman,et al. A statistically based system for prioritizing information exploration under uncertainty , 1997, IEEE Trans. Syst. Man Cybern. Part A.
[78] William I. Gasarch,et al. Book Review: An introduction to Kolmogorov Complexity and its Applications Second Edition, 1997 by Ming Li and Paul Vitanyi (Springer (Graduate Text Series)) , 1997, SIGACT News.
[79] Dan Gusfield,et al. Algorithms on Strings, Trees, and Sequences - Computer Science and Computational Biology , 1997 .
[80] Philip K. Chan,et al. Learning Patterns from Unix Process Execution Traces for Intrusion Detection , 1997 .
[81] M. R. Brito,et al. Connectivity of the mutual k-nearest-neighbor graph in clustering and outlier detection , 1997 .
[82] Paul M. B. Vitányi,et al. An Introduction to Kolmogorov Complexity and Its Applications , 1993, Graduate Texts in Computer Science.
[83] Bernd Freisleben,et al. CARDWATCH: a neural network based database mining system for credit card fraud detection , 1997, Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr).
[84] Raymond T. Ng,et al. A unified approach for mining outliers , 1997, CASCON.
[85] Jean Rouat,et al. A Novelty Detector Using a Network of Integrate and Fire Neurons , 1997, ICANN.
[86] José R. Dorronsoro,et al. Neural fraud detection in credit card operations , 1997, IEEE Trans. Neural Networks.
[87] Lionel Tarassenko,et al. Choosing an appropriate model for novelty detection , 1997 .
[88] H. Javitz,et al. Detecting Unusual Program Behavior Using the Statistical Component of the Next-generation Intrusion Detection Expert System ( NIDES ) 1 , 1997 .
[89] Steven A. Hofmeyr,et al. Intrusion Detection via System Call Traces , 1997, IEEE Softw..
[90] Eamonn J. Keogh,et al. A Probabilistic Approach to Fast Pattern Matching in Time Series Databases , 1997, KDD.
[91] Hongxing He,et al. Application of neural networks to detection of medical fraud , 1997 .
[92] George Karypis,et al. Multilevel k-way Partitioning Scheme for Irregular Graphs , 1998, J. Parallel Distributed Comput..
[93] Sunita Sarawagi,et al. Mining Surprising Patterns Using Temporal Description Length , 1998, VLDB.
[94] Jean Rouat,et al. Novelty detection based on relaxation time of a network of integrate-and-fire neurons , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[95] Anup K. Ghosh,et al. Detecting anomalous and unknown intrusions against programs , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[96] Stephanie Forrest,et al. Intrusion Detection Using Sequences of System Calls , 1998, J. Comput. Secur..
[97] Shyhtsun Felix Wu,et al. Statistical anomaly detection for link-state routing protocols , 1998, Proceedings Sixth International Conference on Network Protocols (Cat. No.98TB100256).
[98] Vasant Honavar,et al. Intelligent agents for intrusion detection , 1998, 1998 IEEE Information Technology Conference, Information Environment for the Future (Cat. No.98EX228).
[99] Salvatore J. Stolfo,et al. Data Mining Approaches for Intrusion Detection , 1998, USENIX Security Symposium.
[100] A. Raftery,et al. Nearest-Neighbor Clutter Removal for Estimating Features in Spatial Point Processes , 1998 .
[101] D. Endler,et al. Intrusion detection. Applying machine learning to Solaris audit data , 1998, Proceedings 14th Annual Computer Security Applications Conference (Cat. No.98EX217).
[102] T. Brotherton,et al. Classification and novelty detection using linear models and a class dependent-elliptical basis function neural network , 1998, 1998 IEEE International Joint Conference on Neural Networks Proceedings. IEEE World Congress on Computational Intelligence (Cat. No.98CH36227).
[103] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[104] Yiming Yang,et al. Topic Detection and Tracking Pilot Study Final Report , 1998 .
[105] Haym Hirsh,et al. Learning to Predict Rare Events in Event Sequences , 1998, KDD.
[106] Volker Tresp,et al. Call-Based Fraud Detection in Mobile Communication Networks Using a Hierarchical Regime-Switching Model , 1998, NIPS.
[107] Carla E. Brodley,et al. Temporal sequence learning and data reduction for anomaly detection , 1998, CCS '98.
[108] Hanseok Ko,et al. Dynamical Behavior of Autoassociative Memory Performaing Novelty Filtering , 1998 .
[109] Nimrod Megiddo,et al. Discovery-Driven Exploration of OLAP Data Cubes , 1998, EDBT.
[110] P. Brockett,et al. Using Kohonen's Self-Organizing Feature Map to Uncover Automobile Bodily Injury Claims Fraud , 1998 .
[111] Cecilia Surace,et al. A novelty detection method to diagnose damage in structures: An application to an offshore platform , 1998 .
[112] Volker Tresp,et al. Fraud detection in communication networks using neural and probabilistic methods , 1998, Proceedings of the 1998 IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP '98 (Cat. No.98CH36181).
[113] Aidong Zhang,et al. WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases , 1998, VLDB.
[114] M. J. Desforges,et al. Applications of probability density estimation to the detection of abnormal conditions in engineering , 1998 .
[115] D. Martinez,et al. Neural tree density estimation for novelty detection , 1998, IEEE Trans. Neural Networks.
[116] Mohamed A. El-Sharkawi,et al. Elliptical novelty grouping for on-line short-turn detection of excited running rotors , 1999 .
[118] Stefan Wermter,et al. Effectiveness of feature extraction in neural network architectures for novelty detection , 1999 .
[119] Hans-Peter Kriegel,et al. OPTICS-OF: Identifying Local Outliers , 1999, PKDD.
[120] Michael Schatz,et al. Learning Program Behavior Profiles for Intrusion Detection , 1999, Workshop on Intrusion Detection and Network Monitoring.
[121] Rüdiger W. Brause,et al. Neural data mining for credit card fraud detection , 1999, Proceedings 11th International Conference on Tools with Artificial Intelligence.
[122] John Platt,et al. Probabilistic Outputs for Support vector Machines and Comparisons to Regularized Likelihood Methods , 1999 .
[123] David J. Marchette. A Statistical Method for Profiling Network Traffic , 1999, Workshop on Intrusion Detection and Network Monitoring.
[124] Robert P. W. Duin,et al. Data domain description using support vectors , 1999, ESANN.
[125] Anup K. Ghosh,et al. Using Program Behavior Pro � les for Intrusion Detection , 1999 .
[126] Raymond T. Ng,et al. Finding Intensional Knowledge of Distance-Based Outliers , 1999, VLDB.
[127] TERRAN LANE,et al. Temporal sequence learning and data reduction for anomaly detection , 1999, TSEC.
[128] Barak A. Pearlmutter,et al. Detecting intrusions using system calls: alternative data models , 1999, Proceedings of the 1999 IEEE Symposium on Security and Privacy (Cat. No.99CB36344).
[129] Terran Lane,et al. An Application of Machine Learning to Anomaly Detection , 1999 .
[130] R. Sekar,et al. A high-performance network intrusion detection system , 1999, CCS '99.
[131] A. McNeil. Extreme Value Theory for Risk Managers , 1999 .
[132] S. Roberts. Novelty detection using extreme value statistics , 1999 .
[133] Kentaro Kojima,et al. Autonomous learning of novel patterns by utilizing chaotic dynamics , 1999, IEEE SMC'99 Conference Proceedings. 1999 IEEE International Conference on Systems, Man, and Cybernetics (Cat. No.99CH37028).
[134] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[135] Tom Fawcett,et al. Activity monitoring: noticing interesting changes in behavior , 1999, KDD '99.
[136] Sungzoon Cho,et al. Characteristics of auto-associative MLP as a novelty detector , 1999, IJCNN'99. International Joint Conference on Neural Networks. Proceedings (Cat. No.99CH36339).
[137] Lionel Tarassenko,et al. A System for the Analysis of Jet Engine Vibration Data , 1999, Integr. Comput. Aided Eng..
[138] L. Baker,et al. A Hierarchical Probabilistic Model for Novelty Detection in Text , 1999, NIPS 1999.
[139] L. Lawrence Ho,et al. A Distributed and Reliable Platform for Adaptive Anomaly Detection in IP Networks , 1999, DSOM.
[140] S. Muthukrishnan,et al. Mining Deviants in a Time Series Database , 1999, VLDB.
[141] Robert P. W. Duin,et al. Support vector domain description , 1999, Pattern Recognit. Lett..
[142] David G. Stork,et al. Pattern Classification (2nd ed.) , 1999 .
[143] Jeffrey M. Hausdorff,et al. Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .
[144] Ahmed H. Tewfik,et al. Robust clustering of acoustic emission signals using the Kohonen network , 2000, 2000 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.00CH37100).
[145] Raymond T. Ng,et al. Distance-based outliers: algorithms and applications , 2000, The VLDB Journal.
[146] Sudipto Guha,et al. ROCK: A Robust Clustering Algorithm for Categorical Attributes , 2000, Inf. Syst..
[147] Stephen R. Marsland,et al. A Real-Time Novelty Detector for a Mobile Robot , 2000, ArXiv.
[148] Martti Juhola,et al. Informal identification of outliers in medical data , 2000 .
[149] Alfonso Valdes,et al. Adaptive, Model-Based Monitoring for Cyber Attack Detection , 2000, Recent Advances in Intrusion Detection.
[150] Christos Faloutsos,et al. Online data mining for co-evolving time sequences , 2000, Proceedings of 16th International Conference on Data Engineering (Cat. No.00CB37073).
[151] Marc Dacier,et al. Fixed- vs. Variable-Length Patterns for Detecting Suspicious Process Behavior , 1998, J. Comput. Secur..
[152] Eleazar Eskin,et al. Anomaly Detection over Noisy Data using Learned Probability Distributions , 2000, ICML.
[153] R Borisyuk,et al. An oscillatory neural network model of sparse distributed memory and novelty detection. , 2000, Bio Systems.
[154] Keith Worden,et al. Long-term stability of normal condition data for novelty detection , 2000, Smart Structures.
[155] Stephen J. Roberts,et al. Extreme value statistics for novelty detection in biomedical signal processing , 2000 .
[156] Vladimir N. Vapnik,et al. The Nature of Statistical Learning Theory , 2000, Statistics for Engineering and Information Science.
[157] Stephen L. Scott,et al. Detecting Network Intrusion Using a Markov Modulated Nonhomogeneous Poisson Process , 2000 .
[158] Andrew McCallum,et al. Efficient clustering of high-dimensional data sets with application to reference matching , 2000, KDD '00.
[159] Dipankar Dasgupta,et al. A comparison of negative and positive selection algorithms in novel pattern detection , 2000, Smc 2000 conference proceedings. 2000 ieee international conference on systems, man and cybernetics. 'cybernetics evolving to systems, humans, organizations, and their complex interactions' (cat. no.0.
[160] Nong Ye,et al. A Markov Chain Model of Temporal Behavior for Anomaly Detection , 2000 .
[161] Jim Austin,et al. Novelty detection in airframe strain data , 2000, Proceedings 15th International Conference on Pattern Recognition. ICPR-2000.
[162] R. Tsay,et al. Outliers in multivariate time series , 2000 .
[163] Colin Campbell,et al. A Linear Programming Approach to Novelty Detection , 2000, NIPS.
[164] Stephen R. Marsland,et al. Novelty Detection for Robot Neotaxis , 2000, ArXiv.
[165] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[166] Sridhar Ramaswamy,et al. Efficient algorithms for mining outliers from large data sets , 2000, SIGMOD '00.
[167] Leonid Portnoy,et al. Intrusion detection with unlabeled data using clustering , 2000 .
[168] Geoffrey G. Hazel,et al. Multivariate Gaussian MRF for multispectral scene segmentation and anomaly detection , 2000, IEEE Trans. Geosci. Remote. Sens..
[169] Andrew McCallum,et al. Maximum Entropy Markov Models for Information Extraction and Segmentation , 2000, ICML.
[170] Florian Metze,et al. Generalized radial basis function networks for classification and novelty detection: self-organization of optimal Bayesian decision , 2000, Neural Networks.
[171] Mario Vento,et al. To reject or not to reject: that is the question-an answer in case of neural classifiers , 2000, IEEE Trans. Syst. Man Cybern. Part C.
[172] Padhraic Smyth,et al. Visualization of navigation patterns on a Web site using model-based clustering , 2000, KDD '00.
[173] David G. Stork,et al. Pattern classification, 2nd Edition , 2000 .
[174] Hanseok Ko,et al. Dynamical behavior of autoassociative memory performing novelty filtering for signal enhancement , 2000, IEEE Trans. Neural Networks Learn. Syst..
[175] Charles R. Farrar,et al. Novelty detection under changing environmental conditions , 2001, SPIE Smart Structures and Materials + Nondestructive Evaluation and Health Monitoring.
[176] Anthony K. H. Tung,et al. Mining top-n local outliers in large databases , 2001, KDD '01.
[177] Golan Yona,et al. Variations on probabilistic suffix trees: statistical modeling and prediction of protein families , 2001, Bioinform..
[178] Dong Xiang,et al. Information-theoretic measures for anomaly detection , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[179] Malik Yousef,et al. One-Class SVMs for Document Classification , 2002, J. Mach. Learn. Res..
[180] Martin Mueller,et al. Self-aware services: using Bayesian networks for detecting anomalies in Internet-based services , 2001, 2001 IEEE/IFIP International Symposium on Integrated Network Management Proceedings. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No.01EX470).
[181] Luc De Raedt,et al. Proceedings of the 12th European Conference on Machine Learning , 2001 .
[182] Li Jun,et al. HIDE: a Hierarchical Network Intrusion Detection System Using Statistical Preprocessing and Neural Network Classification , 2001 .
[183] Raman K. Mehra,et al. Detection and classification of intrusions and faults using sequences of system calls , 2001, SGMD.
[184] Martin Lauer,et al. A Mixture Approach to Novelty Detection Using Training Data with Outliers , 2001, ECML.
[185] R. Sekar,et al. A fast automaton-based method for detecting anomalous program behaviors , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[186] Theodore Johnson,et al. Anomaly Detection for Advance Military Aircraft Using Neural Networks1 , 2001 .
[187] Kenji Yamanishi,et al. Discovering outlier filtering rules from unlabeled data: combining a supervised learner with an unsupervised learner , 2001, KDD '01.
[188] Alan F. Murray,et al. Novelty detection using products of simple experts--a potential architecture for embedded systems , 2001, Neural Networks.
[189] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[190] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[191] Qiang Chen,et al. An anomaly detection technique based on a chi‐square statistic for detecting intrusions into information systems , 2001 .
[192] Salvatore J. Stolfo,et al. Modeling system calls for intrusion detection with dynamic window sizes , 2001, Proceedings DARPA Information Survivability Conference and Exposition II. DISCEX'01.
[193] Ana Bianco,et al. Outlier Detection in Regression Models with ARIMA Errors Using Robust Estimates , 2001 .
[194] George Varghese,et al. Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications , 2001, SIGCOMM 2001.
[195] Yoshikiyo Kato,et al. Fault Detection by Mining Association Rules from House-keeping Data , 2001 .
[196] Carla Marceau,et al. Characterizing the behavior of a program using multiple-length N-grams , 2001, NSPW '00.
[197] K. Worden,et al. On the long-term stability of normal condition for damage detection in a composite panel , 2001 .
[198] Philip S. Yu,et al. Outlier detection for high dimensional data , 2001, SIGMOD '01.
[199] P. S. Horn,et al. Effect of outliers and nonhealthy individuals on reference interval estimation. , 2001, Clinical chemistry.
[200] Bernhard Schölkopf,et al. Estimating the Support of a High-Dimensional Distribution , 2001, Neural Computation.
[201] En Sup Yoon,et al. Analysis of Novelty Detection Properties of Autoassociators , 2001 .
[202] Shian-Shyong Tseng,et al. Two-phase clustering process for outliers detection , 2001, Pattern Recognit. Lett..
[203] Sushil Jajodia,et al. ADAM: a testbed for exploring the use of data mining in intrusion detection , 2001, SGMD.
[204] Vipin Kumar,et al. Mining needle in a haystack: classifying rare classes via two-phase rule induction , 2001, SIGMOD '01.
[205] D. Snyder,et al. On-Line Intrusion Detection Using Sequences of System Calls , 2001 .
[206] Shashi Shekhar,et al. Detecting graph-based spatial outliers: algorithms and applications (a summary of results) , 2001, KDD '01.
[207] T. Brotherton,et al. Anomaly detection for advanced military aircraft using neural networks , 2001, 2001 IEEE Aerospace Conference Proceedings (Cat. No.01TH8542).
[208] P. Sajda,et al. Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model , 2001, Proceedings IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA 2001).
[209] Andrew McCallum,et al. Conditional Random Fields: Probabilistic Models for Segmenting and Labeling Sequence Data , 2001, ICML.
[210] Outlier Detection Integrating Semantic Knowledge , 2002, WAIM.
[211] Jian Tang,et al. Enhancing Effectiveness of Outlier Detections for Low Density Patterns , 2002, PAKDD.
[212] Clara Pizzuti,et al. Fast Outlier Detection in High Dimensional Spaces , 2002, PKDD.
[213] J. Hollmen,et al. Residual generation and visualization for understanding novel process conditions , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[214] Simon J. Godsill,et al. Detection of abrupt spectral changes using support vector machines an application to audio signal segmentation , 2002, 2002 IEEE International Conference on Acoustics, Speech, and Signal Processing.
[215] I. Jolliffe. Principal Component Analysis , 2002 .
[216] Hongxing He,et al. Outlier Detection Using Replicator Neural Networks , 2002, DaWaK.
[217] Hongxing He,et al. A comparative study of RNN for outlier detection in data mining , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[218] Stephen R. Marsland,et al. A tale of two filters-on-line novelty detection , 2002, Proceedings 2002 IEEE International Conference on Robotics and Automation (Cat. No.02CH37292).
[219] Ricardo Vilalta,et al. Predicting rare events in temporal domains , 2002, 2002 IEEE International Conference on Data Mining, 2002. Proceedings..
[220] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[221] Andrew W. Moore,et al. Rule-based anomaly pattern detection for detecting disease outbreaks , 2002, AAAI/IAAI.
[222] Vir V. Phoha,et al. Internet Security Dictionary , 2002, Springer New York.
[223] D. Hand,et al. Unsupervised Profiling Methods for Fraud Detection , 2002 .
[224] Stefan Jakubek,et al. Fault-diagnosis using neural networks with ellipsoidal basis functions , 2002, Proceedings of the 2002 American Control Conference (IEEE Cat. No.CH37301).
[225] Lionel Tarassenko,et al. The use of novelty detection techniques for monitoring high-integrity plant , 2002, Proceedings of the International Conference on Control Applications.
[226] Dipankar Dasgupta,et al. Anomaly detection in multidimensional data using negative selection algorithm , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[227] Chun Zhang,et al. Storing and querying ordered XML using a relational database system , 2002, SIGMOD '02.
[228] Christopher Krügel,et al. Service specific anomaly detection for network intrusion detection , 2002, SAC '02.
[229] Vipin Kumar,et al. Predicting rare classes: can boosting make any weak learner strong? , 2002, KDD.
[230] Philip K. Chan,et al. Learning nonstationary models of normal network traffic for detecting novel attacks , 2002, KDD.
[231] Symeon Papavassiliou,et al. Network intrusion and fault detection: a statistical anomaly approach , 2002, IEEE Commun. Mag..
[232] Alexander S. Szalay,et al. Very Fast Outlier Detection in Large Multidimensional Data Sets , 2002, DMKD.
[233] David M. Pennock,et al. A Maximum Entropy Approach to Collaborative Filtering in Dynamic, Sparse, High-Dimensional Domains , 2002, NIPS.
[234] R.J. Marks,et al. Implicit learning in autoencoder novelty assessment , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[235] Dit-Yan Yeung,et al. Parzen-window network intrusion detectors , 2002, Object recognition supported by user interaction for service robots.
[236] Eamonn J. Keogh,et al. Finding surprising patterns in a time series database in linear time and space , 2002, KDD.
[237] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[238] Lionel Sacks,et al. Active Platform Security through Intrusion Detection Using Naïve Bayesian Network for Anomaly Detection , 2002 .
[239] J. B. Hampshire,et al. Real-time object classification and novelty detection for collaborative video surveillance , 2002, Proceedings of the 2002 International Joint Conference on Neural Networks. IJCNN'02 (Cat. No.02CH37290).
[240] Gunnar Rätsch,et al. Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..
[241] Khaled Labib,et al. NSOM: A Real-Time Network-Based Intrusion Detection System Using Self-Organizing Maps , 2002 .
[242] Aidong Zhang,et al. FindOut: Finding Outliers in Very Large Datasets , 2002, Knowledge and Information Systems.
[243] Paul A. Crook,et al. A Robot Implementation of a Biologically Inspired Method for Novelty Detection , 2002 .
[244] Jim Austin,et al. Novelty detection for strain-gauge degradation using maximally correlated components , 2002, ESANN.
[245] Wenjie Hu,et al. Robust support vector machine with bullet hole image classification , 2002 .
[246] M. F. Augusteijn,et al. Neural network classification and novelty detection , 2002 .
[247] Michael J. Pont,et al. Improving the performance of radial basis function classifiers in condition monitoring and fault diagnosis applications where 'unknown' faults may occur , 2002, Pattern Recognit. Lett..
[248] R. Sekar,et al. Specification-based anomaly detection: a new approach for detecting network intrusions , 2002, CCS '02.
[249] Dmitry Pavlov,et al. Sequence modeling with mixtures of conditional maximum entropy distributions , 2003, Third IEEE International Conference on Data Mining.
[250] Ada Wai-Chee Fu,et al. Enhancements on local outlier detection , 2003, Seventh International Database Engineering and Applications Symposium, 2003. Proceedings..
[251] Salvatore J. Stolfo,et al. Using artificial anomalies to detect unknown and known network intrusions , 2003, Knowledge and Information Systems.
[252] Srinivasan Parthasarathy,et al. Towards NIC-based intrusion detection , 2003, KDD '03.
[253] V. Rao Vemuri,et al. Robust Support Vector Machines for Anomaly Detection in Computer Security , 2003, ICMLA.
[254] Sameer Singh,et al. Novelty detection: a review - part 1: statistical approaches , 2003, Signal Process..
[255] Salvatore J. Stolfo,et al. One Class Support Vector Machines for Detecting Anomalous Windows Registry Accesses , 2003 .
[256] Christopher Krügel,et al. Bayesian event classification for intrusion detection , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..
[257] Vipin Kumar,et al. Finding Topics in Collections of Documents: A Shared Nearest Neighbor Approach , 2003, Clustering and Information Retrieval.
[258] Stephen D. Bay,et al. Mining distance-based outliers in near linear time with randomization and a simple pruning rule , 2003, KDD '03.
[259] Shawn Ostermann,et al. Detecting Anomalous Network Traffic with Self-organizing Maps , 2003, RAID.
[260] Chang-Tien Lu,et al. Algorithms for spatial outlier detection , 2003, Third IEEE International Conference on Data Mining.
[261] Wenjie Hu,et al. Robust Anomaly Detection Using Support Vector Machines , 2003 .
[262] Diane J. Cook,et al. Graph-based anomaly detection , 2003, KDD '03.
[263] Christos Faloutsos,et al. LOCI: fast outlier detection using the local correlation integral , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[264] James Theiler,et al. Resampling approach for anomaly detection in multispectral images , 2003, SPIE Defense + Commercial Sensing.
[265] Jaideep Srivastava,et al. A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.
[266] Jing Zhang,et al. Factor analysis based anomaly detection , 2003, IEEE Systems, Man and Cybernetics SocietyInformation Assurance Workshop, 2003..
[267] Donald E. Brown,et al. An Outlier-based Data Association Method for Linking Criminal Incidents , 2003, SDM.
[268] Christopher Krügel,et al. Anomaly detection of web-based attacks , 2003, CCS '03.
[269] Yi Li,et al. Bootstrapping a data mining intrusion detection system , 2003, SAC '03.
[270] K. Kadota,et al. Detecting outlying samples in microarray data: A critical assessment of the effect of outliers on sample classification , 2003 .
[271] Sameer Singh,et al. Novelty detection: a review - part 2: : neural network based approaches , 2003, Signal Process..
[272] Einoshin Suzuki,et al. Detecting interesting exceptions from medical test data with visual summarization , 2003, Third IEEE International Conference on Data Mining.
[273] Philip K. Chan,et al. A Machine Learning Approach to Anomaly Detection , 2003 .
[274] Junshui Ma,et al. Online novelty detection on temporal sequences , 2003, KDD '03.
[275] Jiong Yang,et al. CLUSEQ: efficient and effective sequence clustering , 2003, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405).
[276] Li Wei,et al. HOT: Hypergraph-Based Outlier Test for Categorical Data , 2003, PAKDD.
[277] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[278] M. Shyu,et al. A Novel Anomaly Detection Scheme Based on Principal Component Classifier , 2003 .
[279] Marina Thottan,et al. Anomaly detection in IP networks , 2003, IEEE Trans. Signal Process..
[280] Andrew W. Moore,et al. Bayesian Network Anomaly Pattern Detection for Disease Outbreaks , 2003, ICML.
[281] J. Ma,et al. Time-series novelty detection using one-class support vector machines , 2003, Proceedings of the International Joint Conference on Neural Networks, 2003..
[282] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[283] Raymond J. Mooney,et al. A probabilistic framework for semi-supervised clustering , 2004, KDD.
[284] Volker Roth,et al. Outlier Detection with One-class Kernel Fisher Discriminants , 2004, NIPS.
[285] Salvatore J. Stolfo,et al. Adaptive Intrusion Detection: A Data Mining Approach , 2000, Artificial Intelligence Review.
[286] Steven K. Donoho,et al. Early detection of insider trading in option markets , 2004, KDD.
[287] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[288] Chris Clifton,et al. Privacy-preserving outlier detection , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[289] Zengyou He,et al. Mining Class Outliers: Concepts, Algorithms and Applications , 2004, WAIM.
[290] P. Helman,et al. A formal framework for positive and negative detection schemes , 2004, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[291] Basil S. Maglaris,et al. Towards multisensor data fusion for DoS detection , 2004, SAC '04.
[292] Kai Hwang,et al. Frequent episode rules for Internet anomaly detection , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..
[293] Sameer Singh,et al. An approach to novelty detection applied to the classification of image regions , 2004, IEEE Transactions on Knowledge and Data Engineering.
[294] Gregory Z. Grudic,et al. Unsupervised Outlier Detection and Semi-Supervised Learning ; CU-CS-976-04 , 2004 .
[295] Sanjay Chawla,et al. On local spatial outliers , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[296] Pasi Fränti,et al. Outlier detection using k-nearest neighbour graph , 2004, ICPR 2004.
[297] Adam Vinueza,et al. Unsupervised Outlier Detection and Semi-Supervised Learning , 2004 .
[298] Zengyou He,et al. A Frequent Pattern Discovery Method for Outlier Detection , 2004, WAIM.
[299] Hisashi Kashima,et al. Eigenspace-based anomaly detection in computer systems , 2004, KDD.
[300] Nitesh V. Chawla,et al. Editorial: special issue on learning from imbalanced data sets , 2004, SKDD.
[301] Mikhail J. Atallah,et al. Detection of significant sets of episodes in event sequences , 2004, Fourth IEEE International Conference on Data Mining (ICDM'04).
[302] B. Ripley,et al. Robust Statistics , 2018, Wiley Series in Probability and Statistics.
[303] Pasi Fränti,et al. Outlier Detection Using k-Nearest Neighbour Graph , 2004, ICPR.
[304] Mikhail J. Atallah,et al. Reliable detection of episodes in event sequences , 2004, Knowledge and Information Systems.
[305] Philip Chan,et al. Learning States and Rules for Time Series Anomaly Detection , 2004, FLAIRS.
[306] Daling Wang,et al. CD-Trees: An Efficient Index Structure for Outlier Detection , 2004, WAIM.
[307] Ronald J. Brachman,et al. Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud , 2004, Data Mining and Knowledge Discovery.
[308] Damminda Alahakoon,et al. Minority report in fraud detection: classification of skewed data , 2004, SKDD.
[309] Eamonn J. Keogh,et al. Towards parameter-free data mining , 2004, KDD.
[310] Graham J. Williams,et al. On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms , 2000, KDD '00.
[311] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[312] Kavé Salamatian,et al. Combining filtering and statistical methods for anomaly detection , 2005, IMC '05.
[313] J. Tchinda,et al. Recurrent fusion of TMPRSS2 and ETS transcription factor genes in prostate cancer. , 2006, Science.
[314] A.N. Srivastava,et al. Discovering recurring anomalies in text reports regarding complex space systems , 2005, 2005 IEEE Aerospace Conference.
[315] Mikhail J. Atallah,et al. Markov Models for Identification of Significant Episodes , 2005, SDM.
[316] Don R. Hush,et al. A Classification Framework for Anomaly Detection , 2005, J. Mach. Learn. Res..
[317] Deepak K. Agarwal,et al. An empirical Bayes approach to detect anomalies in dynamic multidimensional arrays , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[318] X. Shao,et al. Simultaneous Wavelength Selection and Outlier Detection in Multivariate Regression of Near-Infrared Spectra , 2005, Analytical sciences : the international journal of the Japan Society for Analytical Chemistry.
[319] J. Tchinda,et al. Recurrent Fusion of TMPRSS2 and ETS Transcription Factor Genes in Prostate Cancer , 2005, Science.
[320] Vipin Kumar,et al. Parallel and Distributed Computing for Cybersecurity , 2005, IEEE Distributed Syst. Online.
[321] P. Protopapas,et al. Finding outlier light curves in catalogues of periodic variable stars , 2005, astro-ph/0505495.
[322] Hongjun Lu,et al. Finding centric local outliers in categorical/numerical spaces , 2006, Knowledge and Information Systems.
[323] Charu C. Aggarwal,et al. On Abnormality Detection in Spuriously Populated Data Streams , 2005, SDM.
[324] Girish Keshav Palshikar. Distance-Based Outliers in Sequences , 2005, ICDCIT.
[325] Mark Crovella,et al. Mining anomalies using traffic feature distributions , 2005, SIGCOMM '05.
[326] Srinivasan Parthasarathy,et al. Fast Distributed Outlier Detection in Mixed-Attribute Data Sets , 2006, Data Mining and Knowledge Discovery.
[327] Sanjay Chawla,et al. SLOM: a new measure for local spatial outliers , 2006, Knowledge and Information Systems.
[328] Zengyou He,et al. An Optimization Model for Outlier Detection in Categorical Data , 2005, ICIC.
[329] Peng Ning,et al. LAD: localization anomaly detection for wireless sensor networks , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[330] Eamonn J. Keogh,et al. Approximations to magic: finding unusual medical time series , 2005, 18th IEEE Symposium on Computer-Based Medical Systems (CBMS'05).
[331] Carla M. Santos-Pereira,et al. Using Clustering and Robust Estimators to Detect Outliers in Multivariate Data. , 2005 .
[332] Hugo Jair Escalante,et al. A Comparison of Outlier Detection Algorithms for Machine Learning , 2005 .
[333] Jimeng Sun,et al. Neighborhood formation and anomaly detection in bipartite graphs , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[334] Tao Xiong,et al. A combined SVM and LDA approach for classification , 2005, Proceedings. 2005 IEEE International Joint Conference on Neural Networks, 2005..
[335] Philip K. Chan,et al. Modeling multiple time series for anomaly detection , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[336] Eamonn J. Keogh,et al. HOT SAX: efficiently finding the most unusual time series subsequence , 2005, Fifth IEEE International Conference on Data Mining (ICDM'05).
[337] Vipin Kumar,et al. Introduction to Data Mining, (First Edition) , 2005 .
[338] H. E. Solberg,et al. Detection of outliers in reference distributions: performance of Horn's algorithm. , 2005, Clinical chemistry.
[339] Takehisa Yairi,et al. An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.
[340] Padhraic Smyth,et al. Adaptive event detection with time-varying poisson processes , 2006, KDD '06.
[341] Eamonn J. Keogh,et al. Finding Time Series Discords Based on Haar Transform , 2006, ADMA.
[342] Debashis Ghosh,et al. COPA - cancer outlier profile analysis , 2006, Bioinform..
[343] Yufei Tao,et al. Mining distance-based outliers from large databases in any metric space , 2006, KDD '06.
[344] Young-Koo Lee,et al. An Anomaly Detection Algorithm for Detecting Attacks in Wireless Sensor Networks , 2006, ISI.
[345] Martin Meckesheimer,et al. Automatic outlier detection for time series: an application to sensor data , 2007, Knowledge and Information Systems.
[346] Reda Alhajj,et al. A comprehensive survey of numeric and symbolic outlier mining techniques , 2006, Intell. Data Anal..
[347] Eamonn J. Keogh,et al. Finding the most unusual time series subsequence: algorithms and applications , 2006, Knowledge and Information Systems.
[348] Thorsten Joachims,et al. Training linear SVMs in linear time , 2006, KDD '06.
[349] Deepak Agarwal,et al. Detecting anomalies in cross-classified streams: a Bayesian approach , 2006, Knowledge and Information Systems.
[350] George M. Mohay,et al. Distributed intrusion detection in clusters based on non-interference , 2006, ACSW.
[351] Ran Wolff,et al. Noname manuscript No. (will be inserted by the editor) In-Network Outlier Detection in Wireless Sensor Networks , 2022 .
[352] A. N. Srivastava,et al. Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences , 2006 .
[353] D. Janakiram,et al. Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.
[354] Chris Jermaine,et al. Outlier detection by sampling with accuracy guarantees , 2006, KDD '06.
[355] R. Tsay,et al. Outlier Detection in Multivariate Time Series by Projection Pursuit , 2006 .
[356] Sanjay Chawla,et al. Mining for Outliers in Sequential Databases , 2006, SDM.
[357] György J. Simon,et al. Data Mining for Cyber Security , 2006 .
[358] Bianca Zadrozny,et al. Outlier detection by active learning , 2006, KDD '06.
[359] Zengyou He,et al. A Fast Greedy Algorithm for Outlier Mining , 2005, PAKDD.
[360] A.N. Srivastava,et al. Enabling the discovery of recurring anomalies in aerospace problem reports using high-dimensional clustering techniques , 2006, 2006 IEEE Aerospace Conference.
[361] Peng Ning,et al. LAD: Localization anomaly detection for wireless sensor networks , 2006, J. Parallel Distributed Comput..
[362] Chang-Tien Lu,et al. Spatial Weighted Outlier Detection , 2006, SDM.
[363] Symeon Papavassiliou,et al. Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks , 2006, 11th IEEE Symposium on Computers and Communications (ISCC'06).
[364] Dimitrios Gunopulos,et al. Online outlier detection in sensor data using non-parametric models , 2006, VLDB.
[365] Ji Zhang,et al. Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance , 2006, Knowledge and Information Systems.
[366] G. Cox,et al. ~ " " " ' l I ~ " " -" . : -· " J , 2006 .
[367] V. Roth. Kernel Fisher Discriminants for Outlier Detection , 2006 .
[368] Volker Roth,et al. Kernel Fisher Discriminants for Outlier Detection , 2006, Neural Computation.
[369] Ran Wolff,et al. In-Network Outlier Detection in Wireless Sensor Networks , 2006, ICDCS.
[370] M.M. Deris,et al. A Comparative Study for Outlier Detection Techniques in Data Mining , 2006, 2006 IEEE Conference on Cybernetics and Intelligent Systems.
[371] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[372] Jeff G. Schneider,et al. Detecting anomalous records in categorical datasets , 2007, KDD '07.
[373] Jimeng Sun,et al. Less is More: Compact Matrix Decomposition for Large Sparse Graphs , 2007, SDM.
[374] Aleksandar Lazarevic,et al. Incremental Local Outlier Detection for Data Streams , 2007, 2007 IEEE Symposium on Computational Intelligence and Data Mining.
[375] M. V. Velzen,et al. Self-organizing maps , 2007 .
[376] Haimonti Dutta,et al. Distributed Top-K Outlier Detection from Astronomy Catalogs using the DEMAC System , 2007, SDM.
[377] Eamonn J. Keogh,et al. Disk Aware Discord Discovery: Finding Unusual Time Series in Terabyte Sized Datasets , 2007, ICDM.
[378] Eamonn J. Keogh,et al. Disk aware discord discovery: finding unusual time series in terabyte sized datasets , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[379] Arindam Banerjee,et al. Anomaly Detection in Transportation Corridors using Manifold Embedding , 2007 .
[380] Shin Ando,et al. Clustering Needles in a Haystack: An Information Theoretic Analysis of Minority and Outlier Detection , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[381] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[382] Spiros Papadimitriou,et al. Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors , 2007, Seventh IEEE International Conference on Data Mining (ICDM 2007).
[383] Rich Caruana,et al. Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, California, USA, August 12-15, 2007 , 2007, KDD.
[384] Jianzhong Li,et al. Unsupervised Outlier Detection in Sensor Networks Using Aggregation Tree , 2007, ADMA.
[385] R. Tibshirani,et al. Outlier sums for differential gene expression analysis. , 2007, Biostatistics.
[386] Jian Pei,et al. WAT: Finding Top-K Discords in Time Series Database , 2007, SDM.
[387] S. V. N. Vishwanathan,et al. Fast Iterative Kernel Principal Component Analysis , 2007, J. Mach. Learn. Res..
[388] Ulrich Nehmzow,et al. A Model of Habituation Applied to Mobile Robots , 2007 .
[389] Philip K. Chan,et al. Weighting versus pruning in rule validation for detecting network and host anomalies , 2007, KDD '07.
[390] Philip S. Yu,et al. Outlier Detection with Uncertain Data , 2008, SDM.
[391] Srinivasan Parthasarathy,et al. Fast mining of distance-based outliers in high-dimensional datasets , 2008, Data Mining and Knowledge Discovery.
[392] Vipin Kumar,et al. Similarity Measures for Categorical Data: A Comparative Evaluation , 2008, SDM.
[393] Ilya V. Kolmanovsky,et al. Predictive energy management of a power-split hybrid electric vehicle , 2009, 2009 American Control Conference.
[394] Heng Tao Shen,et al. Principal Component Analysis , 2009, Encyclopedia of Biometrics.
[395] Chandan Srivastava,et al. Support Vector Data Description , 2011 .