A Hierarchical Framework Using Approximated Local Outlier Factor for Efficient Anomaly Detection
暂无分享,去创建一个
Jing Li | Yuh-Jye Lee | Lin Xu | Yi-Ren Yeh | Yuh-Jye Lee | Yi-Ren Yeh | Lin Xu | Jing Li
[1] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[2] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[3] Zengyou He,et al. Discovering cluster-based local outliers , 2003, Pattern Recognit. Lett..
[4] Amiya Kumar Rath,et al. A simple agent based model for detecting abnormal event patterns in distributed wireless sensor networks , 2011, ICCCS '11.
[5] Anil K. Jain,et al. Data clustering: a review , 1999, CSUR.
[6] Martin Lauer,et al. A Mixture Approach to Novelty Detection Using Training Data with Outliers , 2001, ECML.
[7] Mahesh Motwani,et al. Survey of clustering algorithms for MANET , 2009, ArXiv.
[8] M. Amer,et al. Nearest-Neighbor and Clustering based Anomaly Detection Algorithms for RapidMiner , 2012 .
[9] Qiong Luo,et al. Online Mining in Sensor Networks , 2004, NPC.
[10] W. R. Buckland,et al. Outliers in Statistical Data , 1979 .
[11] Eleazar Eskin,et al. A GEOMETRIC FRAMEWORK FOR UNSUPERVISED ANOMALY DETECTION: DETECTING INTRUSIONS IN UNLABELED DATA , 2002 .
[12] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[13] Hans-Peter Kriegel,et al. LOF: identifying density-based local outliers , 2000, SIGMOD '00.
[14] Sudipto Guha,et al. ROCK: a robust clustering algorithm for categorical attributes , 1999, Proceedings 15th International Conference on Data Engineering (Cat. No.99CB36337).
[15] John B. Shoven,et al. I , Edinburgh Medical and Surgical Journal.
[16] Piotr Indyk,et al. Approximate nearest neighbors: towards removing the curse of dimensionality , 1998, STOC '98.
[17] Wenjie Hu,et al. Robust support vector machine with bullet hole image classification , 2002 .
[18] Nirvana Meratnia,et al. Outlier Detection Techniques for Wireless Sensor Networks: A Survey , 2008, IEEE Communications Surveys & Tutorials.
[19] Raymond T. Ng,et al. Algorithms for Mining Distance-Based Outliers in Large Datasets , 1998, VLDB.
[20] L. Green,et al. Area under the curve as a measure of discounting. , 2001, Journal of the experimental analysis of behavior.
[21] Daniel T. Larose,et al. Discovering Knowledge in Data: An Introduction to Data Mining , 2005 .
[22] Zengyou He,et al. Outlier Detection Integrating Semantic Knowledge , 2002, WAIM.
[23] Sushil Jajodia,et al. Detecting Novel Network Intrusions Using Bayes Estimators , 2001, SDM.
[24] Rajeev Tripathi,et al. MACHINE LEARNING APPROACH FOR ANOMALY DETECTION IN WIRELESS SENSOR DATA , 2011 .
[25] Raymond J. Mooney,et al. A probabilistic framework for semi-supervised clustering , 2004, KDD.
[26] Ronald Bremer. Outliers in Statistical Data , 1995 .
[27] Piotr Indyk,et al. Similarity Search in High Dimensions via Hashing , 1999, VLDB.
[28] Gunnar Rätsch,et al. Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification , 2002, IEEE Trans. Pattern Anal. Mach. Intell..