Machine Learning for Anomaly Detection: A Systematic Review
暂无分享,去创建一个
Qassim Nasir | Ali Bou Nassif | Manar Abu Talib | Fatima Mohamad Dakalbab | A. B. Nassif | Q. Nasir | M. A. Talib | F. Dakalbab
[1] Guofei Gu,et al. Using an Ensemble of One-Class SVM Classifiers to Harden Payload-based Anomaly Detection Systems , 2006, Sixth International Conference on Data Mining (ICDM'06).
[2] Victoria J. Hodge,et al. A Survey of Outlier Detection Methodologies , 2004, Artificial Intelligence Review.
[3] Mohammad Zulkernine,et al. Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection , 2006, 2006 IEEE International Conference on Communications.
[4] Takehisa Yairi,et al. An Anomaly Detection Method for Spacecraft Using Relevance Vector Learning , 2005, PAKDD.
[5] Rachel Greenstadt,et al. Using Machine Learning for Behavior-Based Access Control: Scalable Anomaly Detection on TCP Connections and HTTP Requests , 2013, MILCOM 2013 - 2013 IEEE Military Communications Conference.
[6] Sahin Albayrak,et al. Monitoring Smartphones for Anomaly Detection , 2008, Mob. Networks Appl..
[7] Christopher Leckie,et al. High-dimensional and large-scale anomaly detection using a linear one-class SVM with deep learning , 2016, Pattern Recognit..
[8] Mahmood Fathy,et al. Deep-anomaly: Fully convolutional neural network for fast anomaly detection in crowded scenes , 2016, Comput. Vis. Image Underst..
[9] Amir H. Gandomi,et al. Optimal virtual machine selection for anomaly detection using a swarm intelligence approach , 2019, Appl. Soft Comput..
[10] Marimuthu Palaniswami,et al. Centered Hyperspherical and Hyperellipsoidal One-Class Support Vector Machines for Anomaly Detection in Sensor Networks , 2010, IEEE Transactions on Information Forensics and Security.
[11] Tuomo Sipola,et al. Anomaly Detection from Network Logs Using Diffusion Maps , 2011, EANN/AIAI.
[12] Carla E. Brodley,et al. Anomaly Detection Using an Ensemble of Feature Models , 2010, 2010 IEEE International Conference on Data Mining.
[13] Vasant Honavar,et al. Learning Classifiers for Misuse Detection Using a Bag of System Calls Representation , 2005, ISI.
[14] Abdallah Shami,et al. Data Mining Techniques in Intrusion Detection Systems: A Systematic Literature Review , 2018, IEEE Access.
[15] Gang He,et al. Anomaly Detection for Key Performance Indicators Through Machine Learning , 2018, 2018 International Conference on Network Infrastructure and Digital Content (IC-NIDC).
[16] Shikha Agrawal,et al. Survey on Anomaly Detection using Data Mining Techniques , 2015, KES.
[17] Peter Filzmoser,et al. Robust feature selection and robust PCA for internet traffic anomaly detection , 2012, 2012 Proceedings IEEE INFOCOM.
[18] Marimuthu Palaniswami,et al. CESVM: Centered Hyperellipsoidal Support Vector Machine Based Anomaly Detection , 2008, 2008 IEEE International Conference on Communications.
[19] Davide Cozzolino,et al. Single-image splicing localization through autoencoder-based anomaly detection , 2016, 2016 IEEE International Workshop on Information Forensics and Security (WIFS).
[20] Li Guo,et al. Network anomaly detection based on TCM-KNN algorithm , 2007, ASIACCS '07.
[21] Ioannis Lambadaris,et al. Network traffic anomaly detection using clustering techniques and performance comparison , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[22] Fang Dong,et al. A hybrid unsupervised clustering-based anomaly detection method , 2021, Tsinghua Science and Technology.
[23] Amutha Prabakar Muniyandi,et al. Network Anomaly Detection by Cascading K-Means Clustering and C4.5 Decision Tree algorithm , 2012 .
[24] Yi Du,et al. Anomaly detection in traffic using L1-norm minimization extreme learning machine , 2015, Neurocomputing.
[25] Jung-Min Park,et al. An overview of anomaly detection techniques: Existing solutions and latest technological trends , 2007, Comput. Networks.
[26] Amy Loutfi,et al. Sleep Stage Classification Using Unsupervised Feature Learning , 2012, Adv. Artif. Neural Syst..
[27] Fabio A. González,et al. Anomaly Detection Using Real-Valued Negative Selection , 2003, Genetic Programming and Evolvable Machines.
[28] Ahmed Dawoud,et al. Deep Learning for Network Anomalies Detection , 2018, 2018 International Conference on Machine Learning and Data Engineering (iCMLDE).
[29] Vrizlynn L. L. Thing,et al. IEEE 802.11 Network Anomaly Detection and Attack Classification: A Deep Learning Approach , 2017, 2017 IEEE Wireless Communications and Networking Conference (WCNC).
[30] Mohammed Samaka,et al. Machine Learning for Anomaly Detection and Categorization in Multi-Cloud Environments , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[31] Valeria Bertacco,et al. Machine learning-based anomaly detection for post-silicon bug diagnosis , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[32] Muhammad Munwar Iqbal,et al. Enhanced Network Anomaly Detection Based on Deep Neural Networks , 2018, IEEE Access.
[33] Lance Sherry,et al. Anomaly detection in aircraft data using Recurrent Neural Networks (RNN) , 2016, 2016 Integrated Communications Navigation and Surveillance (ICNS).
[34] D. Ashok Kumar,et al. A Novel Algorithm for Network Anomaly Detection Using Adaptive Machine Learning , 2018 .
[35] Lovekesh Vig,et al. Anomaly detection in ECG time signals via deep long short-term memory networks , 2015, 2015 IEEE International Conference on Data Science and Advanced Analytics (DSAA).
[36] Heesung Kwon,et al. Kernel Eigenspace Separation Transform for Subspace Anomaly Detection in Hyperspectral Imagery , 2007, IEEE Geoscience and Remote Sensing Letters.
[37] Maghsoud Abbaspour,et al. An anomaly-based botnet detection approach for identifying stealthy botnets , 2011, 2011 IEEE International Conference on Computer Applications and Industrial Electronics (ICCAIE).
[38] Nathalie Japkowicz,et al. Frequency-based anomaly detection for the automotive CAN bus , 2015, 2015 World Congress on Industrial Control Systems Security (WCICSS).
[39] Mohammad Esmalifalak,et al. A data mining approach for fault diagnosis: An application of anomaly detection algorithm , 2014 .
[40] Antonio Liotta,et al. Spatial anomaly detection in sensor networks using neighborhood information , 2017, Inf. Fusion.
[41] H. Dai,et al. Applying both positive and negative selection to supervised learning for anomaly detection , 2005, GECCO '05.
[42] Salim Hariri,et al. Wireless Anomaly Detection Based on IEEE 802.11 Behavior Analysis , 2015, IEEE Transactions on Information Forensics and Security.
[43] Xin Xu,et al. Sequential anomaly detection based on temporal-difference learning: Principles, models and case studies , 2010, Appl. Soft Comput..
[44] Mohammad Zulkernine,et al. An anomaly intrusion detection method using the CSI-KNN algorithm , 2008, SAC '08.
[45] Jack Beuth,et al. Anomaly Detection and Classification in a Laser Powder Bed Additive Manufacturing Process using a Trained Computer Vision Algorithm , 2018 .
[46] Namita Mittal,et al. Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques , 2012 .
[47] Yu-Xin Meng,et al. The practice on using machine learning for network anomaly intrusion detection , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[48] Rommel N. Carvalho,et al. Deep Learning Anomaly Detection as Support Fraud Investigation in Brazilian Exports and Anti-Money Laundering , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[49] Xiaobo Zhou,et al. A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection , 2012, J. Parallel Distributed Comput..
[50] Sufyan T. Faraj Al-Janabi,et al. A Neural Network Based Anomaly Intrusion Detection System , 2011, 2011 Developments in E-systems Engineering.
[51] Taeshik Shon,et al. A hybrid machine learning approach to network anomaly detection , 2007, Inf. Sci..
[52] Marcus Chang,et al. Mote-Based Online Anomaly Detection Using Echo State Networks , 2009, DCOSS.
[53] Alfonso Valdes,et al. Anomaly Detection in Electrical Substation Circuits via Unsupervised Machine Learning , 2016, 2016 IEEE 17th International Conference on Information Reuse and Integration (IRI).
[54] Y. Kawahara,et al. Telemetry-mining: a machine learning approach to anomaly detection and fault diagnosis for space systems , 2006, 2nd IEEE International Conference on Space Mission Challenges for Information Technology (SMC-IT'06).
[55] Yuan-Kai Wang,et al. Real-time camera anomaly detection for real-world video surveillance , 2011, 2011 International Conference on Machine Learning and Cybernetics.
[56] M. M. A. Hashem,et al. Attack and anomaly detection in IoT sensors in IoT sites using machine learning approaches , 2019, Internet Things.
[57] Sushil Jajodia,et al. Applications of Data Mining in Computer Security , 2002, Advances in Information Security.
[58] Ganesh Kumar,et al. Anomaly Detection System in Cloud Environment Using Fuzzy Clustering Based ANN , 2015, Mobile Networks and Applications.
[59] B. Muthukumar,et al. Intrusion Detection System (IDS): Anomaly Detection Using Outlier Detection Approach , 2015 .
[60] Wei Li,et al. Transferred Deep Learning for Anomaly Detection in Hyperspectral Imagery , 2017, IEEE Geoscience and Remote Sensing Letters.
[61] Shuicheng Yan,et al. Detecting Anomaly in Videos from Trajectory Similarity Analysis , 2007, 2007 IEEE International Conference on Multimedia and Expo.
[62] Luiz Eduardo Soares de Oliveira,et al. Toward a reliable anomaly-based intrusion detection in real-world environments , 2017, Comput. Networks.
[63] Georg Langs,et al. Unsupervised Anomaly Detection with Generative Adversarial Networks to Guide Marker Discovery , 2017, IPMI.
[64] Li Ma,et al. Anomaly Detection for Hyperspectral Images Based on Robust Locally Linear Embedding , 2010 .
[65] Gianluca Dini,et al. MADAM: A Multi-level Anomaly Detector for Android Malware , 2012, MMM-ACNS.
[66] Sangho Choe,et al. Anomaly Detection in Power Quality Measurements Using Proximity-Based Unsupervised Machine Learning Techniques , 2019, 2019 Electric Power Quality and Supply Reliability Conference (PQ) & 2019 Symposium on Electrical Engineering and Mechatronics (SEEM).
[67] Shilin He,et al. Experience Report: System Log Analysis for Anomaly Detection , 2016, 2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE).
[68] Carla E. Brodley,et al. FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection , 2012, Data Mining and Knowledge Discovery.
[69] Göran Falkman,et al. Online Learning and Sequential Anomaly Detection in Trajectories , 2014, IEEE Transactions on Pattern Analysis and Machine Intelligence.
[70] Rania A. Mokhtar,et al. Anomaly detection approach using hybrid algorithm of data mining technique , 2017, 2017 International Conference on Communication, Control, Computing and Electronics Engineering (ICCCCEE).
[71] Erik Elmroth,et al. Performance Anomaly Detection and Bottleneck Identification , 2015, ACM Comput. Surv..
[72] Juntae Kim,et al. The Anomaly Detection by Using DBSCAN Clustering with Multiple Parameters , 2011, 2011 International Conference on Information Science and Applications.
[73] Sandeep Sharma,et al. Anomaly Detection in Medical Wireless Sensor Networks using Machine Learning Algorithms , 2015 .
[74] Asok Ray,et al. Symbolic time series analysis for anomaly detection: A comparative evaluation , 2005, Signal Process..
[75] Miriam A. M. Capretz,et al. An ensemble learning framework for anomaly detection in building energy consumption , 2017 .
[76] Dan Pei,et al. Opprentice: Towards Practical and Automatic Anomaly Detection Through Machine Learning , 2015, Internet Measurement Conference.
[77] Xue-Qin Zhang,et al. CH-SVM Based Network Anomaly Detection , 2007, 2007 International Conference on Machine Learning and Cybernetics.
[78] Francesco Palmieri,et al. Network anomaly detection through nonlinear analysis , 2010, Comput. Secur..
[79] Faisal Muhammad Shah,et al. An ensemble framework of anomaly detection using hybridized feature selection approach (HFSA) , 2015, 2015 SAI Intelligent Systems Conference (IntelliSys).
[80] Yang Wang,et al. A Deep Learning Approach for Network Anomaly Detection Based on AMF-LSTM , 2018, NPC.
[81] Yuchong Li,et al. Network-Wide Traffic Anomaly Detection and Localization Based on Robust Multivariate Probabilistic Calibration Model , 2015 .
[82] S. Venkatesan,et al. Anomaly Detection in IPv4 and IPv6 networks using machine learning , 2015, 2015 Annual IEEE India Conference (INDICON).
[83] Yusheng Ji,et al. Weighting technique on multi-timeline for machine learning-based anomaly detection system , 2015, 2015 International Conference on Computing, Communication and Security (ICCCS).
[84] Hans Wehn,et al. 2015 Ieee International Conference on Big Data (big Data) Maritime Situation Analysis Framework Vessel Interaction Classification and Anomaly Detection , 2022 .
[85] Anukool Lakhina,et al. Multivariate Online Anomaly Detection Using Kernel Recursive Least Squares , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[86] E. Sivasankar,et al. Anomaly Detection on Shuttle data using Unsupervised Learning Techniques , 2019, 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE).
[87] Ejaz Ahmed,et al. Real-time big data processing for anomaly detection: A Survey , 2019, Int. J. Inf. Manag..
[88] Aashis Tiwari,et al. Anomaly detection in IIoT: a case study using machine learning , 2018, COMAD/CODS.
[89] Larry J. Greenstein,et al. ALDO: An Anomaly Detection Framework for Dynamic Spectrum Access Networks , 2009, IEEE INFOCOM 2009.
[90] Sylvio Barbon Junior,et al. Anomaly detection using the correlational paraconsistent machine with digital signatures of network segment , 2017, Inf. Sci..
[91] Lyudmila Sukhostat,et al. Anomaly detection in network traffic using extreme learning machine , 2016, 2016 IEEE 10th International Conference on Application of Information and Communication Technologies (AICT).
[92] Zheng Huang,et al. Anomaly detection in electronic invoice systems based on machine learning , 2020, Inf. Sci..
[93] Sung-Bae Cho,et al. Evolutionary neural networks for anomaly detection based on the behavior of a program , 2005, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).
[94] Vir V. Phoha,et al. K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods , 2007, IEEE Transactions on Knowledge and Data Engineering.
[95] Sung-Bae Cho,et al. Evolutionary Learning Program's Behavior in Neural Networks for Anomaly Detection , 2004, ICONIP.
[96] Song Fu,et al. Adaptive Anomaly Identification by Exploring Metric Subspace in Cloud Computing Infrastructures , 2013, 2013 IEEE 32nd International Symposium on Reliable Distributed Systems.
[97] Kai Ming Ting,et al. Defying the gravity of learning curve: a characteristic of nearest neighbour anomaly detectors , 2016, Machine Learning.
[98] Andy Brown,et al. Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection , 2018, Proceedings of the First Workshop on Machine Learning for Computing Systems.
[99] Seref Sagiroglu,et al. Big data analytics for network anomaly detection from netflow data , 2017, 2017 International Conference on Computer Science and Engineering (UBMK).
[100] Jinoh Kim,et al. An Empirical Evaluation of Deep Learning for Network Anomaly Detection , 2018, 2018 International Conference on Computing, Networking and Communications (ICNC).
[101] Andrew Walenstein,et al. A Survey of Anomaly Detection for Connected Vehicle Cybersecurity and Safety , 2018, 2018 IEEE Intelligent Vehicles Symposium (IV).
[102] Hong-Zheng Fang,et al. Anomaly detection of spacecraft based on least squares support vector machine , 2011, 2011 Prognostics and System Health Managment Confernece.
[103] Mary Shaw,et al. Semantic anomaly detection in online data sources , 2002, ICSE '02.
[104] Chun-De Yang,et al. Using Immune Algorithm to Optimize Anomaly Detection Based on SVM , 2006, 2006 International Conference on Machine Learning and Cybernetics.
[105] Ali Alqazzaz,et al. AD-IoT: Anomaly Detection of IoT Cyberattacks in Smart City Using Machine Learning , 2019, 2019 IEEE 9th Annual Computing and Communication Workshop and Conference (CCWC).
[106] Joel J. P. C. Rodrigues,et al. A comprehensive survey on network anomaly detection , 2018, Telecommunication Systems.
[107] Leandros A. Maglaras,et al. Intrusion detection in SCADA systems using machine learning techniques , 2014, 2014 Science and Information Conference.
[108] Nizar Bouguila,et al. Unsupervised Anomaly Intrusion Detection via Localized Bayesian Feature Selection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[109] V. Rao Vemuri,et al. Adaptive anomaly detection with evolving connectionist systems , 2007, J. Netw. Comput. Appl..
[110] Gian Antonio Susto,et al. Anomaly Detection through on-line Isolation Forest: An application to plasma etching , 2017, 2017 40th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).
[111] Alfredo De Santis,et al. Network anomaly detection with the restricted Boltzmann machine , 2013, Neurocomputing.
[112] Valeria V. Krzhizhanovskaya,et al. Anomaly detection in earth dam and levee passive seismic data using support vector machines and automatic feature selection , 2017, J. Comput. Sci..
[113] C. Purdy,et al. Reducing calculation requirements in FPGA implementation of deep learning algorithms for online anomaly intrusion detection , 2017, 2017 IEEE National Aerospace and Electronics Conference (NAECON).
[114] Wei-Yang Lin,et al. Intrusion detection by machine learning: A review , 2009, Expert Syst. Appl..
[115] Yuh-Jye Lee,et al. A study on anomaly detection ensembles , 2017, J. Appl. Log..
[116] Gisung Kim,et al. A novel hybrid intrusion detection method integrating anomaly detection with misuse detection , 2014, Expert Syst. Appl..
[117] Lei Shi,et al. MAD-GAN: Multivariate Anomaly Detection for Time Series Data with Generative Adversarial Networks , 2019, ICANN.
[118] R. Zuo. Machine Learning of Mineralization-Related Geochemical Anomalies: A Review of Potential Methods , 2017, Natural Resources Research.
[119] J. Albert Mayan,et al. Anomaly Detection by Using CFS Subset and Neural Network with WEKA Tools , 2019 .
[120] Ling Huang,et al. ANTIDOTE: understanding and defending against poisoning of anomaly detectors , 2009, IMC '09.
[121] Amit K. Roy-Chowdhury,et al. Context-Aware Activity Recognition and Anomaly Detection in Video , 2013, IEEE Journal of Selected Topics in Signal Processing.
[122] Yongdae Kim,et al. A machine learning framework for network anomaly detection using SVM and GA , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[123] Marius Kloft,et al. Image Anomaly Detection with Generative Adversarial Networks , 2018, ECML/PKDD.
[124] Seyed Mojtaba Hosseini Bamakan,et al. Ramp loss one-class support vector machine; A robust and effective approach to anomaly detection problems , 2018, Neurocomputing.
[125] Kehua Miao,et al. Detecting Anomalies in Application Performance Management System with Machine Learning Algorihms , 2019, 2019 3rd International Conference on Electronic Information Technology and Computer Engineering (EITCE).
[126] Miguel Nicolau,et al. A Hybrid Autoencoder and Density Estimation Model for Anomaly Detection , 2016, PPSN.
[127] Xiao‐Hai Yan,et al. Estimation of subsurface temperature anomaly in the Indian Ocean during recent global surface warming hiatus from satellite measurements: A support vector machine approach , 2015 .
[128] Ljiljana Trajkovic,et al. Performance evaluation of BGP anomaly classifiers , 2015, 2015 Third International Conference on Digital Information, Networking, and Wireless Communications (DINWC).
[129] Yugyung Lee,et al. Real-time network anomaly detection system using machine learning , 2015, 2015 11th International Conference on the Design of Reliable Communication Networks (DRCN).
[130] Murat Can Ganiz,et al. An anomaly detection framework for BGP , 2011, 2011 International Symposium on Innovations in Intelligent Systems and Applications.
[131] Meijuan Yin,et al. Network Anomaly Detection Using Random Forests and Entropy of Traffic Features , 2012, 2012 Fourth International Conference on Multimedia Information Networking and Security.
[132] Antonio Liotta,et al. Anomaly Detection in Sensor Systems Using Lightweight Machine Learning , 2013, 2013 IEEE International Conference on Systems, Man, and Cybernetics.
[133] Joel J. P. C. Rodrigues,et al. Hybrid Deep-Learning-Based Anomaly Detection Scheme for Suspicious Flow Detection in SDN: A Social Multimedia Perspective , 2019, IEEE Transactions on Multimedia.
[134] Ira Assent,et al. AnyOut: Anytime Outlier Detection on Streaming Data , 2012, DASFAA.
[135] Ryohei Fujimaki,et al. Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis , 2008, 2008 Eighth IEEE International Conference on Data Mining.
[136] Ali Gökhan Yavuz,et al. Network Anomaly Detection with Stochastically Improved Autoencoder Based Models , 2017, 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud).
[137] Xi Chen,et al. Direct Robust Matrix Factorizatoin for Anomaly Detection , 2011, 2011 IEEE 11th International Conference on Data Mining.
[138] Amaury Lendasse,et al. Anomaly-Based Intrusion Detection Using Extreme Learning Machine and Aggregation of Network Traffic Statistics in Probability Space , 2018, Cognitive Computation.
[139] Emin Anarim,et al. An intelligent intrusion detection system (IDS) for anomaly and misuse detection in computer networks , 2005, Expert Syst. Appl..
[140] Shikha Agrawal,et al. A Survey on Anomaly Detection in Network Intrusion Detection System Using Particle Swarm Optimization Based Machine Learning Techniques , 2013 .
[141] Slim Abdennadher,et al. Enhancing one-class support vector machines for unsupervised anomaly detection , 2013, ODD '13.
[142] Abdallah Moubayed,et al. Clustering Enabled Classification using Ensemble Feature Selection for Intrusion Detection , 2019, 2019 International Conference on Computing, Networking and Communications (ICNC).
[143] Milos Manic,et al. Fuzzy logic based anomaly detection for embedded network security cyber sensor , 2011, 2011 IEEE Symposium on Computational Intelligence in Cyber Security (CICS).
[144] Yong Feng,et al. An unsupervised anomaly intrusion detection algorithm based on swarm intelligence , 2005, 2005 International Conference on Machine Learning and Cybernetics.
[145] Yizhou Yu,et al. Anomaly detection in GPS data based on visual analytics , 2010, 2010 IEEE Symposium on Visual Analytics Science and Technology.
[146] Randy C. Paffenroth,et al. Anomaly Detection with Robust Deep Autoencoders , 2017, KDD.
[147] Qing Li,et al. Multi-Scale LSTM Model for BGP Anomaly Classification , 2018, IEEE Transactions on Services Computing.
[148] Konstantinos Demertzis,et al. A Hybrid Network Anomaly and Intrusion Detection Approach Based on Evolving Spiking Neural Network Classification , 2013, e-Democracy.
[149] Borko Furht,et al. Sensor fault and patient anomaly detection and classification in medical wireless sensor networks , 2013, 2013 IEEE International Conference on Communications (ICC).
[150] Pedro Casas,et al. Stream-based Machine Learning for Network Security and Anomaly Detection , 2018, Big-DAMA@SIGCOMM.
[151] R. Jha,et al. Anomaly detection in network traffic using K-mean clustering , 2016, 2016 3rd International Conference on Recent Advances in Information Technology (RAIT).
[152] Georgios Kambourakis,et al. The best of both worlds: a framework for the synergistic operation of host and cloud anomaly-based IDS for smartphones , 2014, EuroSec '14.
[153] RadhaKanta Mahapatra,et al. Business data mining - a machine learning perspective , 2001, Inf. Manag..
[154] Jun Sun,et al. Anomaly Detection for a Water Treatment System Using Unsupervised Machine Learning , 2017, 2017 IEEE International Conference on Data Mining Workshops (ICDMW).
[155] Thomas G. Dietterich,et al. Systematic construction of anomaly detection benchmarks from real data , 2013, ODD '13.
[156] D. Dasgupta,et al. Combining negative selection and classification techniques for anomaly detection , 2002, Proceedings of the 2002 Congress on Evolutionary Computation. CEC'02 (Cat. No.02TH8600).
[157] Dong Seong Kim,et al. Fusions of GA and SVM for Anomaly Detection in Intrusion Detection System , 2005, ISNN.
[158] Carla Purdy,et al. Toward an Online Anomaly Intrusion Detection System Based on Deep Learning , 2016, 2016 15th IEEE International Conference on Machine Learning and Applications (ICMLA).
[159] Martin Cooney,et al. A holistic smart home demonstrator for anomaly detection and response , 2015, 2015 IEEE International Conference on Pervasive Computing and Communication Workshops (PerCom Workshops).
[160] Sung Deok Cha,et al. SAD: web session anomaly detection based on parameter estimation , 2004, Comput. Secur..
[161] Jun Morimoto,et al. Nonlinear structure of escape-times to falls for a passive dynamic walker on an irregular slope: Anomaly detection using multi-class support vector machine and latent state extraction by canonical correlation analysis , 2011, 2011 IEEE/RSJ International Conference on Intelligent Robots and Systems.
[162] Nhien-An Le-Khac,et al. Collective Anomaly Detection Based on Long Short-Term Memory Recurrent Neural Networks , 2016, FDSE.
[163] Hartmut König,et al. Towards Learning Normality for Anomaly Detection in Industrial Control Networks , 2013, AIMS.
[164] S. Srinoy,et al. Anomaly-Based Intrusion Detection using Fuzzy Rough Clustering , 2006, 2006 International Conference on Hybrid Information Technology.
[165] Mohammad Zulkernine,et al. Efficacy of Hidden Markov Models Over Neural Networks in Anomaly Intrusion Detection , 2006, 30th Annual International Computer Software and Applications Conference (COMPSAC'06).
[166] Qinghong Yang,et al. An anomaly prediction framework for financial IT systems using hybrid machine learning methods , 2019 .
[167] Jinoh Kim,et al. A survey of deep learning-based network anomaly detection , 2017, Cluster Computing.
[168] Martin Knahl,et al. Anomaly Detection in IaaS Clouds , 2013, 2013 IEEE 5th International Conference on Cloud Computing Technology and Science.
[169] Balachander Krishnamurthy,et al. Rule-Based Anomaly Detection on IP Flows , 2009, IEEE INFOCOM 2009.
[170] Martial Hebert,et al. A Discriminative Framework for Anomaly Detection in Large Videos , 2016, ECCV.
[171] Raman K. Mehra,et al. Ensemble methods for anomaly detection and distributed intrusion detection in Mobile Ad-Hoc Networks , 2008, Inf. Fusion.
[172] Claudia Eckert,et al. Is negative selection appropriate for anomaly detection? , 2005, GECCO '05.
[173] Iqbal Gondal,et al. Unitary Anomaly Detection for Ubiquitous Safety in Machine Health Monitoring , 2012, ICONIP.
[174] Shadi Aljawarneh,et al. Anomaly-based intrusion detection system through feature selection analysis and building hybrid efficient model , 2017, J. Comput. Sci..
[175] Anton van den Hengel,et al. Deep Anomaly Detection with Deviation Networks , 2019, KDD.
[176] Guifa Teng,et al. Unsupervised SVM Based on p-kernels for Anomaly Detection , 2006, First International Conference on Innovative Computing, Information and Control - Volume I (ICICIC'06).
[177] Vipin Kumar,et al. Anomaly Detection for Discrete Sequences: A Survey , 2012, IEEE Transactions on Knowledge and Data Engineering.
[178] Giulio Di Gravio,et al. Machine learning for anomaly detection and process phase classification to improve safety and maintenance activities , 2020, Journal of Manufacturing Systems.
[179] Chen Shen,et al. Spatio-Temporal AutoEncoder for Video Anomaly Detection , 2017, ACM Multimedia.
[180] Fatemeh Barani,et al. ManetSVM: Dynamic anomaly detection using one-class support vector machine in MANETs , 2013, 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC).
[181] Andrew S. Miner,et al. Anomaly intrusion detection using one class SVM , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..
[182] Sanjay Ranka,et al. Conditional Anomaly Detection , 2007, IEEE Transactions on Knowledge and Data Engineering.
[183] Salvatore J. Stolfo,et al. Anomaly Detection in Computer Security and an Application to File System Accesses , 2005, ISMIS.
[184] Brian Litt,et al. Semi-Supervised Anomaly Detection for EEG Waveforms Using Deep Belief Nets , 2010, 2010 Ninth International Conference on Machine Learning and Applications.
[185] Mingyan Teng,et al. Anomaly detection on time series , 2010, 2010 IEEE International Conference on Progress in Informatics and Computing.
[186] Jugal K. Kalita,et al. Network Anomaly Detection: Methods, Systems and Tools , 2014, IEEE Communications Surveys & Tutorials.
[187] Huang Chuanhe,et al. Anomaly detection using Support Vector Machine classification with k-Medoids clustering , 2012, 2012 Third Asian Himalayas International Conference on Internet.
[188] Dong Il Kim,et al. Network traffic anomalies detection and identification with flow monitoring , 2008, 2008 5th IFIP International Conference on Wireless and Optical Communications Networks (WOCN '08).
[189] Pedro Casas,et al. RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic Measurements , 2018, SIGCOMM Posters and Demos.
[190] Yves Le Traon,et al. A training-resistant anomaly detection system , 2018, Comput. Secur..
[191] Deepan Muthirayan,et al. Hierarchical Temporal Memory Based Machine Learning for Real-Time, Unsupervised Anomaly Detection in Smart Grid: WiP Abstract , 2020, 2020 ACM/IEEE 11th International Conference on Cyber-Physical Systems (ICCPS).
[192] Chu-Hsing Lin,et al. Anomaly Detection Using LibSVM Training Tools , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).
[193] Hong Gu,et al. Anomaly detection combining one-class SVMs and particle swarm optimization algorithms , 2010 .
[194] Subutai Ahmad,et al. Unsupervised real-time anomaly detection for streaming data , 2017, Neurocomputing.
[195] Oliver Obst,et al. Spatiotemporal Anomaly Detection in Gas Monitoring Sensor Networks , 2008, EWSN.
[196] Stefano Zanero,et al. Seeing the invisible: forensic uses of anomaly detection and machine learning , 2008, OPSR.
[197] Michael J. Chapple,et al. System Anomaly Detection: Mining Firewall Logs , 2006, 2006 Securecomm and Workshops.
[198] Radu State,et al. Machine Learning Approach for IP-Flow Record Anomaly Detection , 2011, Networking.
[199] Takehisa Yairi,et al. An approach to spacecraft anomaly detection problem using kernel feature space , 2005, KDD '05.
[200] Qusay H. Mahmoud,et al. A hybrid model for anomaly-based intrusion detection in SCADA networks , 2017, 2017 IEEE International Conference on Big Data (Big Data).
[201] Song Fu,et al. Performance Metric Selection for Autonomic Anomaly Detection on Cloud Computing Systems , 2011, 2011 IEEE Global Telecommunications Conference - GLOBECOM 2011.
[202] Sung-Bae Cho,et al. Web traffic anomaly detection using C-LSTM neural networks , 2018, Expert Syst. Appl..
[203] Ling Huang,et al. Stealthy poisoning attacks on PCA-based anomaly detectors , 2009, SIGMETRICS Perform. Evaluation Rev..
[204] Lalu Banoth,et al. A Survey of Data Mining and Machine Learning Methods for Cyber Security Intrusion Detection , 2017 .
[205] David J. Hill,et al. Anomaly detection in streaming environmental sensor data: A data-driven modeling approach , 2010, Environ. Model. Softw..
[206] Marimuthu Palaniswami,et al. Quarter Sphere Based Distributed Anomaly Detection in Wireless Sensor Networks , 2007, 2007 IEEE International Conference on Communications.
[207] Zhenghong Xiao,et al. An Anomaly Detection Scheme Based on Machine Learning for WSN , 2009, 2009 First International Conference on Information Science and Engineering.
[208] Song Fu,et al. An Anomaly Detection Framework for Autonomic Management of Compute Cloud Systems , 2010, 2010 IEEE 34th Annual Computer Software and Applications Conference Workshops.
[209] Kriangkrai Limthong,et al. Network traffic anomaly detection using machine learning approaches , 2012, 2012 IEEE Network Operations and Management Symposium.
[210] Mohammad Teshnehlab,et al. An anomaly detection method to detect web attacks using Stacked Auto-Encoder , 2018, 2018 6th Iranian Joint Congress on Fuzzy and Intelligent Systems (CFIS).
[211] Konrad Rieck,et al. A close look on n-grams in intrusion detection: anomaly detection vs. classification , 2013, AISec.
[212] Olfa Nasraoui,et al. Anomaly detection based on unsupervised niche clustering with application to network intrusion detection , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).
[213] Min Wu,et al. Adaptive Cost-Sensitive Online Classification , 2018, IEEE Transactions on Knowledge and Data Engineering.
[214] Fekadu Yihunie,et al. Applying Machine Learning to Anomaly-Based Intrusion Detection Systems , 2019, 2019 IEEE Long Island Systems, Applications and Technology Conference (LISAT).
[215] Qi Wang,et al. Online Anomaly Detection in Crowd Scenes via Structure Analysis , 2015, IEEE Transactions on Cybernetics.
[216] Peter W. Tse,et al. Anomaly Detection Through a Bayesian Support Vector Machine , 2010, IEEE Transactions on Reliability.
[217] Hitesh Shah,et al. An anomaly detection in smart cities modeled as wireless sensor network , 2016, 2016 International Conference on Signal and Information Processing (IConSIP).
[218] Jiankun Hu,et al. Towards reliable data feature retrieval and decision engine in host-based anomaly detection systems , 2015, 2015 IEEE 10th Conference on Industrial Electronics and Applications (ICIEA).
[219] Johnny S. Wong,et al. On the symbiosis of specification-based and anomaly-based detection , 2010, Comput. Secur..
[220] Jugal K. Kalita,et al. A Survey of Outlier Detection Methods in Network Anomaly Identification , 2011, Comput. J..
[221] Gisung Kim,et al. Self-adaptive and dynamic clustering for online anomaly detection , 2011, Expert Syst. Appl..
[222] Yaroslav M. Linder,et al. Unsupervised Anomaly Detection in Time Series Using LSTM-Based Autoencoders , 2019, 2019 IEEE International Conference on Advanced Trends in Information Theory (ATIT).
[223] Mahesh Chandra Govil,et al. A comparative analysis of SVM and its stacking with other classification algorithm for intrusion detection , 2016, 2016 International Conference on Advances in Computing, Communication, & Automation (ICACCA) (Spring).
[224] Diane J. Cook,et al. Enhancing Anomaly Detection Using Temporal Pattern Discovery , 2009 .
[225] Philip K. Chan,et al. Learning rules for anomaly detection of hostile network traffic , 2003, Third IEEE International Conference on Data Mining.
[226] Berend Jan van der Zwaag,et al. RoADS: A Road Pavement Monitoring System for Anomaly Detection Using Smart Phones , 2015, MSM/MUSE/SenseML.
[227] Philip K. Chan,et al. Learning Rules and Clusters for Anomaly Detection in Network Traffic , 2005 .
[228] Leman Akoglu,et al. Less is More: Building Selective Anomaly Ensembles , 2015 .
[229] James R. Gattiker,et al. Anomaly Detection Enhanced Classification in Computer Intrusion Detection , 2002, SVM.
[230] Eleazar Eskin,et al. Detecting Errors within a Corpus using Anomaly Detection , 2000, ANLP.
[231] Sridhar Adepu,et al. Anomaly Detection in Cyber Physical Systems Using Recurrent Neural Networks , 2017, 2017 IEEE 18th International Symposium on High Assurance Systems Engineering (HASE).
[232] Avishai Wool,et al. Control variable classification, modeling and anomaly detection in Modbus/TCP SCADA systems , 2015, Int. J. Crit. Infrastructure Prot..
[233] Yasser Yasami,et al. A novel unsupervised classification approach for network anomaly detection by k-Means clustering and ID3 decision tree learning methods , 2010, The Journal of Supercomputing.
[234] Xinbo Gao,et al. Robust tensor subspace learning for anomaly detection , 2011, Int. J. Mach. Learn. Cybern..
[235] VARUN CHANDOLA,et al. Anomaly detection: A survey , 2009, CSUR.
[236] Kevin B. Korb,et al. Anomaly detection in vessel tracks using Bayesian networks , 2014, Int. J. Approx. Reason..
[237] Roberto Proietti,et al. Self-Taught Anomaly Detection With Hybrid Unsupervised/Supervised Machine Learning in Optical Networks , 2019, Journal of Lightwave Technology.
[238] Manish Marwah,et al. Thermal anomaly prediction in data centers , 2010, 2010 12th IEEE Intersociety Conference on Thermal and Thermomechanical Phenomena in Electronic Systems.
[239] Zina Chkirbene,et al. Hybrid Machine Learning for Network Anomaly Intrusion Detection , 2020, 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT).
[240] Saadiah Yahya,et al. Anomaly detection based on profile signature in network using machine learning technique , 2016, 2016 IEEE Region 10 Symposium (TENSYMP).
[241] Naruemon Wattanapongsakorn,et al. Network intrusion detection with Fuzzy Genetic Algorithm for unknown attacks , 2013, The International Conference on Information Networking 2013 (ICOIN).
[242] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[243] Carlos García Garino,et al. An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection , 2012, Expert Syst. Appl..
[244] Salvatore J. Stolfo,et al. A Geometric Framework for Unsupervised Anomaly Detection , 2002, Applications of Data Mining in Computer Security.
[245] Hans D. Schotten,et al. Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set , 2018, ARES.
[246] Leon Reznik,et al. Machine Learning in Anomaly Detection: Example of Colluded Applications Attack in Android Devices , 2019, 2019 18th IEEE International Conference On Machine Learning And Applications (ICMLA).
[247] Anup Ghosh,et al. Simple, state-based approaches to program-based anomaly detection , 2002, TSEC.
[248] Weizhong Yan,et al. One-class extreme learning machines for gas turbine combustor anomaly detection , 2016, 2016 International Joint Conference on Neural Networks (IJCNN).
[249] Brett J. Borghetti,et al. A Review of Anomaly Detection in Automated Surveillance , 2012, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).
[250] Le Thanh Sach,et al. An anomaly-based network intrusion detection system using Deep learning , 2017, 2017 International Conference on System Science and Engineering (ICSSE).
[251] Pere Barlet-Ros,et al. Practical anomaly detection based on classifying frequent traffic patterns , 2012, 2012 Proceedings IEEE INFOCOM Workshops.
[252] Mohammed J. Zaki,et al. ADMIT: anomaly-based data mining for intrusions , 2002, KDD.
[253] R. Remya,et al. A hybrid method based on genetic algorithm, self-organised feature map, and support vector machine for better network anomaly detection , 2013, 2013 Fourth International Conference on Computing, Communications and Networking Technologies (ICCCNT).
[254] Baojiang Cui,et al. Anomaly Detection Model Based on Hadoop Platform and Weka Interface , 2016, 2016 10th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS).
[255] Markus Schneider,et al. Expected similarity estimation for large-scale batch and streaming anomaly detection , 2016, Machine Learning.
[256] Albert Y. Zomaya,et al. NHAD: Neuro-Fuzzy Based Horizontal Anomaly Detection in Online Social Networks , 2018, IEEE Transactions on Knowledge and Data Engineering.
[257] Yuefei Zhu,et al. A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks , 2017, IEEE Access.
[258] Wei Xu,et al. Improving one-class SVM for anomaly detection , 2003, Proceedings of the 2003 International Conference on Machine Learning and Cybernetics (IEEE Cat. No.03EX693).
[259] Tinoosh Mohsenin,et al. Real-Time Anomaly Detection Framework for Many-Core Router through Machine-Learning Techniques , 2016, JETC.
[260] Gholamhossein Dastghaibyfard,et al. Two-tier network anomaly detection model: a machine learning approach , 2017, Journal of Intelligent Information Systems.
[261] Yingbing Yu,et al. A survey of anomaly intrusion detection techniques , 2012 .
[262] Mohamed Farouk,et al. A framework for efficient network anomaly intrusion detection with features selection , 2018, 2018 9th International Conference on Information and Communication Systems (ICICS).
[263] Zhibo Pang,et al. Anomaly detection based on machine learning in IoT-based vertical plant wall for indoor climate control , 2020, Building and Environment.
[264] Saeed Amizadeh,et al. Generic and Scalable Framework for Automated Time-series Anomaly Detection , 2015, KDD.
[265] Dipika Narsingyani,et al. Optimizing false positive in anomaly based intrusion detection using Genetic algorithm , 2015, 2015 IEEE 3rd International Conference on MOOCs, Innovation and Technology in Education (MITE).
[266] Marc Sebban,et al. Efficient Top Rank Optimization with Gradient Boosting for Supervised Anomaly Detection , 2017, ECML/PKDD.
[267] James Zhang,et al. Anomaly detection in wide area network meshes using two machine learning algorithms , 2019, Future Gener. Comput. Syst..
[268] Xiaoqiang Lu,et al. Learning deep event models for crowd anomaly detection , 2017, Neurocomputing.
[269] C. A. Kumar,et al. An analysis of supervised tree based classifiers for intrusion detection system , 2013, 2013 International Conference on Pattern Recognition, Informatics and Mobile Engineering.
[270] Jiankun Hu,et al. An efficient hidden Markov model training scheme for anomaly intrusion detection of server applications based on system calls , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[271] Wei Cong,et al. Anomaly intrusion detection based on PLS feature extraction and core vector machine , 2013, Knowl. Based Syst..
[272] Chou-Yuan Lee,et al. An intelligent algorithm with feature selection and decision rules applied to anomaly intrusion detection , 2012, Appl. Soft Comput..
[273] Haixun Wang,et al. Online Anomaly Prediction for Robust Cluster Systems , 2009, 2009 IEEE 25th International Conference on Data Engineering.
[274] Xia Wang,et al. Cross-Layer Based Anomaly Detection in Wireless Mesh Networks , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[275] Kyriakos Stefanidis,et al. An HMM-Based Anomaly Detection Approach for SCADA Systems , 2016, WISTP.
[276] Feifei Li,et al. DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning , 2017, CCS.
[277] Wei Li,et al. Using Naive Bayes with AdaBoost to Enhance Network Anomaly Intrusion Detection , 2010, 2010 Third International Conference on Intelligent Networks and Intelligent Systems.
[278] Jianli Gu,et al. Machine learning and transport simulations for groundwater anomaly detection , 2020, J. Comput. Appl. Math..
[279] Fei Wang,et al. A Model Based on Hybrid Support Vector Machine and Self-Organizing Map for Anomaly Detection , 2010, 2010 International Conference on Communications and Mobile Computing.
[280] B. Paramasivan,et al. Anomaly detection in wireless sensor network using machine learning algorithm , 2020, Comput. Commun..
[281] Toby P. Breckon,et al. GANomaly: Semi-Supervised Anomaly Detection via Adversarial Training , 2018, ACCV.
[282] Hiroki Takakura,et al. Toward a more practical unsupervised anomaly detection system , 2013, Inf. Sci..
[283] Aboul Ella Hassanien,et al. Genetic algorithm with different feature selection techniques for anomaly detectors generation , 2013, 2013 Federated Conference on Computer Science and Information Systems.
[284] Wail S. Elkilani,et al. A hybrid approach for efficient anomaly detection using metaheuristic methods , 2014, Journal of advanced research.
[285] Mansour Sheikhan,et al. Flow-based anomaly detection in high-speed links using modified GSA-optimized neural network , 2012, Neural Computing and Applications.
[286] Miad Faezipour,et al. Deep and Machine Learning Approaches for Anomaly-Based Intrusion Detection of Imbalanced Network Traffic , 2019, IEEE Sensors Letters.
[287] Pedro Casas,et al. Ensemble-learning Approaches for Network Security and Anomaly Detection , 2017, Big-DAMA@SIGCOMM.
[288] Félix J. García Clemente,et al. A Self-Adaptive Deep Learning-Based System for Anomaly Detection in 5G Networks , 2018, IEEE Access.
[289] Donald F. Towsley,et al. Detecting anomalies in network traffic using maximum entropy estimation , 2005, IMC '05.
[290] Sanjay Chawla,et al. Group Anomaly Detection using Deep Generative Models , 2018, ECML/PKDD.
[291] R. Nagaraj,et al. Anomaly Detection via Online Oversampling Principal Component Analysis , 2014 .
[292] Pengju Liu,et al. Network Traffic Anomaly Detection Based on Information Gain and Deep Learning , 2019, ICISDM.
[293] Xiaohui Gu,et al. UBL: unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems , 2012, ICAC '12.
[294] Gary B. Wills,et al. Unsupervised Clustering Approach for Network Anomaly Detection , 2012, NDT.
[295] Simone Calderara,et al. Detecting anomalies in people's trajectories using spectral graph analysis , 2011, Comput. Vis. Image Underst..
[296] Bo Du,et al. A Robust Nonlinear Hyperspectral Anomaly Detection Approach , 2014, IEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing.
[297] Ruy Luiz Milidiú,et al. Data stream anomaly detection through principal subspace tracking , 2010, SAC '10.
[298] Plamen Angelov,et al. Anomaly detection based on eccentricity analysis , 2014, 2014 IEEE Symposium on Evolving and Autonomous Learning Systems (EALS).
[299] Gao Yan,et al. Network Anomaly Traffic Detection Method Based on Support Vector Machine , 2016, 2016 International Conference on Smart City and Systems Engineering (ICSCSE).
[300] Joni da Silva Fraga,et al. Octopus-IIDS: An anomaly based intelligent intrusion detection system , 2010, The IEEE symposium on Computers and Communications.
[301] Dhruba Kumar Bhattacharyya,et al. Anomaly based intrusion detection using meta ensemble classifier , 2012, SIN '12.
[302] Pedro Casas,et al. Network security and anomaly detection with Big-DAMA, a big data analytics framework , 2017, 2017 IEEE 6th International Conference on Cloud Networking (CloudNet).
[303] Tanja Zseby,et al. Analysis of network traffic features for anomaly detection , 2014, Machine Learning.
[304] Md. Rafiqul Islam,et al. A survey of anomaly detection techniques in financial domain , 2016, Future Gener. Comput. Syst..
[305] Abdallah Shami,et al. Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[306] T. V. Lakshman,et al. Unsupervised machine learning for network-centric anomaly detection in IoT , 2019, Big-DAMA@CoNEXT.
[307] Ali Bou Nassif,et al. Dimensionality reduction with IG-PCA and ensemble classifier for network intrusion detection , 2019, Comput. Networks.