IEEE Transactions on Software Engineering - Special issue on computer security and privacy
Robust regression and outlier detection
Robust regression and outlier detection
Algorithms for clustering data
Algorithms for clustering data
Outlier detection and time series modeling
Technometrics
Handwritten digit recognition with a back-propagation network
Advances in neural information processing systems 2
An introduction to Kolmogorov complexity and its applications
An introduction to Kolmogorov complexity and its applications
A probabilistic resource allocating network for novelty detection
Neural Computation
State Transition Analysis: A Rule-Based Intrusion Detection Approach
IEEE Transactions on Software Engineering
The nature of statistical learning theory
The nature of statistical learning theory
Investigating feedforward neural networks with respect to the rejection of spurious patterns
Pattern Recognition Letters
SIGMOD '95 Proceedings of the 1995 ACM SIGMOD international conference on Management of data
Self-organizing maps
Multilevel k-way partitioning scheme for irregular graphs
Journal of Parallel and Distributed Computing
Activity monitoring: noticing interesting changes in behavior
KDD '99 Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining
Temporal sequence learning and data reduction for anomaly detection
ACM Transactions on Information and System Security (TISSEC)
LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Support vector domain description
Pattern Recognition Letters - Special issue on pattern recognition in practice VI
Proceedings of the 1998 conference on Advances in neural information processing systems II
Efficient clustering of high-dimensional data sets with application to reference matching
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
ROCK: a robust clustering algorithm for categorical attributes
Information Systems
Multidimensional binary search trees used for associative searching
Communications of the ACM
Characterizing the behavior of a program using multiple-length N-grams
Proceedings of the 2000 workshop on New security paradigms
Adaptive Intrusion Detection: A Data Mining Approach
Artificial Intelligence Review - Issues on the application of data mining
Outlier detection for high dimensional data
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Mining needle in a haystack: classifying rare classes via two-phase rule induction
SIGMOD '01 Proceedings of the 2001 ACM SIGMOD international conference on Management of data
Two-phase clustering process for outliers detection
Pattern Recognition Letters
Mining top-n local outliers in large databases
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Detecting graph-based spatial outliers: algorithms and applications (a summary of results)
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
Service specific anomaly detection for network intrusion detection
Proceedings of the 2002 ACM symposium on Applied computing
Computational Complexity of Machine Learning
Computational Complexity of Machine Learning
Brief Application Description; Visual Data Mining: Recognizing Telephone Calling Fraud
Data Mining and Knowledge Discovery
Intrusion Detection via System Call Traces
IEEE Software
Constructing Boosting Algorithms from SVMs: An Application to One-Class Classification
IEEE Transactions on Pattern Analysis and Machine Intelligence
Findout: finding outliers in very large datasets
Knowledge and Information Systems
Discovery-Driven Exploration of OLAP Data Cubes
EDBT '98 Proceedings of the 6th International Conference on Extending Database Technology: Advances in Database Technology
ICDE '95 Proceedings of the Eleventh International Conference on Data Engineering
Using Artificial Anomalies to Detect Unknown and Known Network Intrusions
ICDM '01 Proceedings of the 2001 IEEE International Conference on Data Mining
Anomaly Detection over Noisy Data using Learned Probability Distributions
ICML '00 Proceedings of the Seventeenth International Conference on Machine Learning
OPTICS-OF: Identifying Local Outliers
PKDD '99 Proceedings of the Third European Conference on Principles of Data Mining and Knowledge Discovery
Fast Outlier Detection in High Dimensional Spaces
PKDD '02 Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery
Mining Surprising Patterns Using Temporal Description Length
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Algorithms for Mining Distance-Based Outliers in Large Datasets
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
WaveCluster: A Multi-Resolution Clustering Approach for Very Large Spatial Databases
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Finding Intensional Knowledge of Distance-Based Outliers
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Efficient and Effective Clustering Methods for Spatial Data Mining
VLDB '94 Proceedings of the 20th International Conference on Very Large Data Bases
Outlier Detection Integrating Semantic Knowledge
WAIM '02 Proceedings of the Third International Conference on Advances in Web-Age Information Management
Outlier Detection Using Replicator Neural Networks
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
A Novelty Detector Using a Network of Integrate and Fire Neurons
ICANN '97 Proceedings of the 7th International Conference on Artificial Neural Networks
Enhancing Effectiveness of Outlier Detections for Low Density Patterns
PAKDD '02 Proceedings of the 6th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining
Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior
ESORICS '98 Proceedings of the 5th European Symposium on Research in Computer Security
Learning Program Behavior Profiles for Intrusion Detection
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
A Statistical Method for Profiling Network Traffic
Proceedings of the Workshop on Intrusion Detection and Network Monitoring
Mining Deviants in a Time Series Database
VLDB '99 Proceedings of the 25th International Conference on Very Large Data Bases
Distance-based outliers: algorithms and applications
The VLDB Journal — The International Journal on Very Large Data Bases
Discovering cluster-based local outliers
Pattern Recognition Letters
Internet security dictionary
Predicting rare classes: can boosting make any weak learner strong?
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Learning nonstationary models of normal network traffic for detecting novel attacks
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
ADMIT: anomaly-based data mining for intrusions
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Finding surprising patterns in a time series database in linear time and space
Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining
Rule-based anomaly pattern detection for detecting disease outbreaks
Eighteenth national conference on Artificial intelligence
A unified approach for mining outliers
CASCON '97 Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative research
Intrusion Detection Applying Machine Learning to Solaris Audit Data
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Detecting Anomalous and Unknown Intrusions Against Programs
ACSAC '98 Proceedings of the 14th Annual Computer Security Applications Conference
Predicting Rare Events In Temporal Domains
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
A Comparative Study of RNN for Outlier Detection in Data Mining
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
Online Data Mining for Co-Evolving Time Sequences
ICDE '00 Proceedings of the 16th International Conference on Data Engineering
Parzen-Window Network Intrusion Detectors
ICPR '02 Proceedings of the 16 th International Conference on Pattern Recognition (ICPR'02) Volume 4 - Volume 4
Neural Data Mining for Credit Card Fraud Detection
ICTAI '99 Proceedings of the 11th IEEE International Conference on Tools with Artificial Intelligence
Statistical Anomaly Detection for Link-State Routing Protocols
ICNP '98 Proceedings of the Sixth International Conference on Network Protocols
MMBIA '01 Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis (MMBIA'01)
Self-Nonself Discrimination in a Computer
SP '94 Proceedings of the 1994 IEEE Symposium on Security and Privacy
An Immunological Approach to Change Detection: Algorithms, Analysis and Implications
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
A Sense of Self for Unix Processes
SP '96 Proceedings of the 1996 IEEE Symposium on Security and Privacy
Information-Theoretic Measures for Anomaly Detection
SP '01 Proceedings of the 2001 IEEE Symposium on Security and Privacy
One-class svms for document classification
The Journal of Machine Learning Research
Anomaly Detection Using Real-Valued Negative Selection
Genetic Programming and Evolvable Machines
Anomaly detection of web-based attacks
Proceedings of the 10th ACM conference on Computer and communications security
Algorithms for Spatial Outlier Detection
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Learning Rules for Anomaly Detection of Hostile Network Traffic
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Detecting Interesting Exceptions from Medical Test Data with Visual Summarization
ICDM '03 Proceedings of the Third IEEE International Conference on Data Mining
Bootstrapping a data mining intrusion detection system
Proceedings of the 2003 ACM symposium on Applied computing
Pattern Classification (2nd Edition)
Pattern Classification (2nd Edition)
Bayesian Event Classification for Intrusion Detection
ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
Mining distance-based outliers in near linear time with randomization and a simple pruning rule
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Online novelty detection on temporal sequences
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Towards NIC-based intrusion detection
Proceedings of the ninth ACM SIGKDD international conference on Knowledge discovery and data mining
Novelty detection: a review—part 1: statistical approaches
Signal Processing
Novelty detection: a review—part 2: neural network based approaches
Signal Processing
Towards multisensor data fusion for DoS detection
Proceedings of the 2004 ACM symposium on Applied computing
An Approach to Novelty Detection Applied to the Classification of Image Regions
IEEE Transactions on Knowledge and Data Engineering
On-Line Unsupervised Outlier Detection Using Finite Mixtures with Discounting Learning Algorithms
Data Mining and Knowledge Discovery
Editorial: special issue on learning from imbalanced data sets
ACM SIGKDD Explorations Newsletter - Special issue on learning from imbalanced datasets
Minority report in fraud detection: classification of skewed data
ACM SIGKDD Explorations Newsletter - Special issue on learning from imbalanced datasets
A probabilistic framework for semi-supervised clustering
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Towards parameter-free data mining
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Early detection of insider trading in option markets
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Eigenspace-based anomaly detection in computer systems
Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier Detection Using k-Nearest Neighbour Graph
ICPR '04 Proceedings of the Pattern Recognition, 17th International Conference on (ICPR'04) Volume 3 - Volume 03
Frequent Episode Rules for Internet Anomaly Detection
NCA '04 Proceedings of the Network Computing and Applications, Third IEEE International Symposium
A Survey of Outlier Detection Methodologies
Artificial Intelligence Review
Detection of Significant Sets of Episodes in Event Sequences
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Privacy-Preserving Outlier Detection
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
A Classification Framework for Anomaly Detection
The Journal of Machine Learning Research
Reliable detection of episodes in event sequences
Knowledge and Information Systems
Approximations to Magic: Finding Unusual Medical Time Series
CBMS '05 Proceedings of the 18th IEEE Symposium on Computer-Based Medical Systems
Mining anomalies using traffic feature distributions
Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications
An approach to spacecraft anomaly detection problem using kernel feature space
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Introduction to Data Mining, (First Edition)
Introduction to Data Mining, (First Edition)
Parallel and Distributed Computing for Cybersecurity
IEEE Distributed Systems Online
Neighborhood Formation and Anomaly Detection in Bipartite Graphs
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
An Empirical Bayes Approach to Detect Anomalies in Dynamic Multidimensional Arrays
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
Kernel Fisher Discriminants for Outlier Detection
Neural Computation
Estimating the Support of a High-Dimensional Distribution
Neural Computation
Fast Distributed Outlier Detection in Mixed-Attribute Data Sets
Data Mining and Knowledge Discovery
LAD: localization anomaly detection for wireless sensor networks
Journal of Parallel and Distributed Computing - 19th International parallel and distributed processing symposium
Adaptive event detection with time-varying poisson processes
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Training linear SVMs in linear time
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Mining distance-based outliers from large databases in any metric space
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier detection by active learning
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier detection by sampling with accuracy guarantees
Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining
Distributed intrusion detection in clusters based on non-interference
ACSW Frontiers '06 Proceedings of the 2006 Australasian workshops on Grid computing and e-research - Volume 54
In-Network Outlier Detection in Wireless Sensor Networks
ICDCS '06 Proceedings of the 26th IEEE International Conference on Distributed Computing Systems
Hierarchical Anomaly Detection in Distributed Large-Scale Sensor Networks
ISCC '06 Proceedings of the 11th IEEE Symposium on Computers and Communications
SLOM: a new measure for local spatial outliers
Knowledge and Information Systems
Finding centric local outliers in categorical/numerical spaces
Knowledge and Information Systems
Online outlier detection in sensor data using non-parametric models
VLDB '06 Proceedings of the 32nd international conference on Very large data bases
Detecting outlying subspaces for high-dimensional data: the new task, algorithms, and performance
Knowledge and Information Systems
COPA---cancer outlier profile analysis
Bioinformatics
Finding the most unusual time series subsequence: algorithms and applications
Knowledge and Information Systems
Detecting anomalies in cross-classified streams: a Bayesian approach
Knowledge and Information Systems
Automatic outlier detection for time series: an application to sensor data
Knowledge and Information Systems - Special Issue on Mining Low-Quality Data
Combining filtering and statistical methods for anomaly detection
IMC '05 Proceedings of the 5th ACM SIGCOMM conference on Internet Measurement
Anomaly detection in multidimensional data using negative selection algorithm
CEC '02 Proceedings of the Evolutionary Computation on 2002. CEC '02. Proceedings of the 2002 Congress - Volume 02
Robust clustering of acoustic emission signals using the Kohonen network
ICASSP '00 Proceedings of the Acoustics, Speech, and Signal Processing, 2000. on IEEE International Conference - Volume 06
IEEE Transactions on Knowledge and Data Engineering
Data mining approaches for intrusion detection
SSYM'98 Proceedings of the 7th conference on USENIX Security Symposium - Volume 7
An overview of anomaly detection techniques: Existing solutions and latest technological trends
Computer Networks: The International Journal of Computer and Telecommunications Networking
A System for the Analysis of Jet Engine Vibration Data
Integrated Computer-Aided Engineering
Detecting anomalous records in categorical datasets
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Weighting versus pruning in rule validation for detecting network and host anomalies
Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining
Intrusion detection using sequences of system calls
Journal of Computer Security
Fast Iterative Kernel Principal Component Analysis
The Journal of Machine Learning Research
Computing Correlation Anomaly Scores Using Stochastic Nearest Neighbors
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
ICDM '07 Proceedings of the 2007 Seventh IEEE International Conference on Data Mining
A comprehensive survey of numeric and symbolic outlier mining techniques
Intelligent Data Analysis
A novelty detection approach to classification
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
HOT: hypergraph-based outlier test for categorical data
PAKDD'03 Proceedings of the 7th Pacific-Asia conference on Advances in knowledge discovery and data mining
A fast greedy algorithm for outlier mining
PAKDD'06 Proceedings of the 10th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining
An anomaly detection algorithm for detecting attacks in wireless sensor networks
ISI'06 Proceedings of the 4th IEEE international conference on Intelligence and Security Informatics
An optimization model for outlier detection in categorical data
ICIC'05 Proceedings of the 2005 international conference on Advances in Intelligent Computing - Volume Part I
Distance-Based outliers in sequences
ICDCIT'05 Proceedings of the Second international conference on Distributed Computing and Internet Technology
Anomaly detection in IP networks
IEEE Transactions on Signal Processing
To reject or not to reject: that is the question-an answer in caseof neural classifiers
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Robust support vector machine with bullet hole image classification
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
A formal framework for positive and negative detection schemes
IEEE Transactions on Systems, Man, and Cybernetics, Part B: Cybernetics
Network intrusion and fault detection: a statistical anomaly approach
IEEE Communications Magazine
Neural fraud detection in credit card operations
IEEE Transactions on Neural Networks
Neural tree density estimation for novelty detection
IEEE Transactions on Neural Networks
Dynamical behavior of autoassociative memory performing novelty filtering for signal enhancement
IEEE Transactions on Neural Networks
CoCo: coding cost for parameter-free outlier detection
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
Large human communication networks: patterns and a utility-driven generator
Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining
A Comparative Study of Outlier Detection Algorithms
MLDM '09 Proceedings of the 6th International Conference on Machine Learning and Data Mining in Pattern Recognition
Structure Correlation in Mobile Call Networks
ADMA '09 Proceedings of the 5th International Conference on Advanced Data Mining and Applications
Exploiting dynamicity in graph-based traffic analysis: techniques and applications
Proceedings of the 5th international conference on Emerging networking experiments and technologies
EbAT: online methods for detecting utility cloud anomalies
Proceedings of the 6th Middleware Doctoral Symposium
SMS-Watchdog: Profiling Social Behaviors of SMS Users for Anomaly Detection
RAID '09 Proceedings of the 12th International Symposium on Recent Advances in Intrusion Detection
OMFP: An Approach for Online Mass Flow Prediction in CFB Boilers
DS '09 Proceedings of the 12th International Conference on Discovery Science
Anomaly Detection from Call Data Records
PReMI '09 Proceedings of the 3rd International Conference on Pattern Recognition and Machine Intelligence
Machine learning despite unknown classes
SMC'09 Proceedings of the 2009 IEEE international conference on Systems, Man and Cybernetics
Data stream anomaly detection through principal subspace tracking
Proceedings of the 2010 ACM Symposium on Applied Computing
TOD: Temporal outlier detection by using quasi-functional temporal dependencies
Data & Knowledge Engineering
Computer Networks: The International Journal of Computer and Telecommunications Networking
Online mass flow prediction in CFB boilers with explicit detection of sudden concept drift
ACM SIGKDD Explorations Newsletter
Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services: Social Networks and Beyond
Relevance feature mapping for content-based image retrieval
Proceedings of the Tenth International Workshop on Multimedia Data Mining
Detecting contextual anomalies of crowd motion in surveillance video
ICIP'09 Proceedings of the 16th IEEE international conference on Image processing
Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems
Conformal prediction for distribution-independent anomaly detection in streaming vessel data
Proceedings of the First International Workshop on Novel Data Stream Pattern Mining Techniques
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Metric forensics: a multi-level approach for mining volatile graphs
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Unsupervised transfer classification: application to text categorization
Proceedings of the 16th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier detection for simple default theories
Artificial Intelligence
Relational network-service clustering analysis with set evidences
Proceedings of the 3rd ACM workshop on Artificial intelligence and security
On detecting clustered anomalies using SCiForest
ECML PKDD'10 Proceedings of the 2010 European conference on Machine learning and knowledge discovery in databases: Part II
Enforcing secure object initialization in java
ESORICS'10 Proceedings of the 15th European conference on Research in computer security
UPBOT: a testbed for cyber-physical systems
CSET'10 Proceedings of the 3rd international conference on Cyber security experimentation and test
CollSec'10 Proceedings of the 2010 international conference on Collaborative methods for security and privacy
Negative selection algorithms on strings with efficient training and linear-time classification
Theoretical Computer Science
Anomalous video event detection using spatiotemporal context
Computer Vision and Image Understanding
Effective multimodel anomaly detection using cooperative negotiation
GameSec'10 Proceedings of the First international conference on Decision and game theory for security
Active learning and subspace clustering for anomaly detection
Intelligent Data Analysis
A novel two-stage phased modeling framework for early fraud detection in online auctions
Expert Systems with Applications: An International Journal
CHI '11 Extended Abstracts on Human Factors in Computing Systems
Anomaly detection in wireless sensor networks: A survey
Journal of Network and Computer Applications
Anomaly Detection in Dynamic Systems Using Weak Estimators
ACM Transactions on Internet Technology (TOIT)
Anomaly detection techniques for a web defacement monitoring service
Expert Systems with Applications: An International Journal
Self-adaptive software system monitoring for performance anomaly localization
Proceedings of the 8th ACM international conference on Autonomic computing
Alert correlation in collaborative intelligent intrusion detection systems-A survey
Applied Soft Computing
Algorithms for speeding up distance-based outlier detection
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Anomaly localization for network data streams with graph joint sparse PCA
Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining
Outlier analysis for plastic card fraud detection a hybridized and multi-objective approach
HAIS'11 Proceedings of the 6th international conference on Hybrid artificial intelligent systems - Volume Part II
Pervasive'11 Proceedings of the 9th international conference on Pervasive computing
Neighborhood based clustering method for arbitrary shaped clusters
ISMIS'11 Proceedings of the 19th international conference on Foundations of intelligent systems
Online anomaly detection in unmanned vehicles
The 10th International Conference on Autonomous Agents and Multiagent Systems - Volume 1
Finding fraud in health insurance data with two-layer outlier detection approach
DaWaK'11 Proceedings of the 13th international conference on Data warehousing and knowledge discovery
Parameter-free anomaly detection for categorical data
MLDM'11 Proceedings of the 7th international conference on Machine learning and data mining in pattern recognition
Automated construction of a false digital alibi
ARES'11 Proceedings of the IFIP WG 8.4/8.9 international cross domain conference on Availability, reliability and security for business, enterprise and health information systems
Anomaly detection using ensembles
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
Pruned random subspace method for one-class classifiers
MCS'11 Proceedings of the 10th international conference on Multiple classifier systems
A self-adaptive monitoring framework for component-based software systems
ECSA'11 Proceedings of the 5th European conference on Software architecture
Combining structure and appearance for anomaly detection in wire ropes
CAIP'11 Proceedings of the 14th international conference on Computer analysis of images and patterns - Volume Part II
A survey of outlier detection methodologies and their applications
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part I
Anomaly detection in categorical datasets using bayesian networks
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
Mining at most top-K% spatio-temporal outlier based context: a summary of results
AICI'11 Proceedings of the Third international conference on Artificial intelligence and computational intelligence - Volume Part II
MIDeA: a multi-parallel intrusion detection architecture
Proceedings of the 18th ACM conference on Computer and communications security
Proceedings of the VLDB Endowment
IBM Journal of Research and Development
Wiki-Watchdog: Anomaly Detection in Wikipedia Through a Distributional Lens
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
WI-IAT '11 Proceedings of the 2011 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology - Volume 01
Detection of text quality flaws as a one-class classification problem
Proceedings of the 20th ACM international conference on Information and knowledge management
Traffic dispersion graph based anomaly detection
Proceedings of the Second Symposium on Information and Communication Technology
The inductive software engineering manifesto: principles for industrial data mining
Proceedings of the International Workshop on Machine Learning Technologies in Software Engineering
A suspicious behaviour detection using a context space model for smart surveillance systems
Computer Vision and Image Understanding
Two effective methods to detect anomalies in embedded systems
Microelectronics Journal
Three-way analysis of structural health monitoring data
Neurocomputing
Multi-scale and real-time non-parametric approach for anomaly detection and localization
Computer Vision and Image Understanding
STPMiner: a highperformance spatiotemporal pattern mining toolbox
Proceedings of the 2nd international workshop on Petascal data analytics: challenges and opportunities
The early bird gets the buzz: detecting anomalies and emerging trends in information networks
Proceedings of the fifth ACM international conference on Web search and data mining
"Andromaly": a behavioral malware detection framework for android devices
Journal of Intelligent Information Systems
Greener aviation with virtual sensors: a case study
Data Mining and Knowledge Discovery
Introduction to data mining for sustainability
Data Mining and Knowledge Discovery
On the dataset shift problem in software engineering prediction models
Empirical Software Engineering
Isolation-Based Anomaly Detection
ACM Transactions on Knowledge Discovery from Data (TKDD)
Monitoring industrial processes with SOM-based dissimilarity maps
Expert Systems with Applications: An International Journal
Noisy data elimination using mutual k-nearest neighbor for classification mining
Journal of Systems and Software
Color anomaly detection and suggestion for wilderness search and rescue
HRI '12 Proceedings of the seventh annual ACM/IEEE international conference on Human-Robot Interaction
Automated quality control for mobile data collection
Proceedings of the 2nd ACM Symposium on Computing for Development
Similarity kernels for nearest neighbor-based outlier detection
IDA'10 Proceedings of the 9th international conference on Advances in Intelligent Data Analysis
Novelty detection in projected spaces for structural health monitoring
IDA'10 Proceedings of the 9th international conference on Advances in Intelligent Data Analysis
A model for detecting "global footprint anomalies" in a grid environment
PAISI'10 Proceedings of the 2010 Pacific Asia conference on Intelligence and Security Informatics
Improved anomaly detection using block-matching denoising
Computer Communications
Ensemble based sensing anomaly detection in wireless sensor networks
Expert Systems with Applications: An International Journal
An adaptive model for online detection of relevant state changes in Internet-based systems
Performance Evaluation
Live BI: a framework for real time operations management
DNIS'11 Proceedings of the 7th international conference on Databases in Networked Information Systems
An algorithm for sample and data dimensionality reduction using fast simulated annealing
ADMA'11 Proceedings of the 7th international conference on Advanced Data Mining and Applications - Volume Part I
FRaC: a feature-modeling approach for semi-supervised and unsupervised anomaly detection
Data Mining and Knowledge Discovery
Combining visual block programming and graph manipulation for clinical alert rule building
CHI '12 Extended Abstracts on Human Factors in Computing Systems
Detection of Outlier Residues for Improving Interface Prediction in Protein Heterocomplexes
IEEE/ACM Transactions on Computational Biology and Bioinformatics (TCBB)
Detection of variable length anomalous subsequences in data streams
International Journal of Intelligent Information and Database Systems
Reliable client accounting for P2P-infrastructure hybrids
NSDI'12 Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation
Novelty detection in wildlife scenes through semantic context modelling
Pattern Recognition
Profiler: integrated statistical analysis and visualization for data quality assessment
Proceedings of the International Working Conference on Advanced Visual Interfaces
Fast anomaly detection for streaming data
IJCAI'11 Proceedings of the Twenty-Second international joint conference on Artificial Intelligence - Volume Volume Two
Data & Knowledge Engineering
Non-negative residual matrix factorization: problem definition, fast solutions, and applications
Statistical Analysis and Data Mining
Efficient classifiers for multi-class classification problems
Decision Support Systems
Event-based classification of social media streams
Proceedings of the 2nd ACM International Conference on Multimedia Retrieval
Integrating community matching and outlier detection for mining evolutionary community outliers
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
RainMon: an integrated approach to mining bursty timeseries monitoring data
Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining
SHARD: a framework for sequential, hierarchical anomaly ranking and detection
PAKDD'12 Proceedings of the 16th Pacific-Asia conference on Advances in Knowledge Discovery and Data Mining - Volume Part II
An effective unsupervised network anomaly detection method
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
A minimum spanning tree-inspired clustering-based outlier detection technique
ICDM'12 Proceedings of the 12th Industrial conference on Advances in Data Mining: applications and theoretical aspects
Anomaly detection via coupled gaussian kernels
Canadian AI'12 Proceedings of the 25th Canadian conference on Advances in Artificial Intelligence
Automatic description of context-altering services through observational learning
Pervasive'12 Proceedings of the 10th international conference on Pervasive Computing
Algorithms for detecting outliers via clustering and ranks
IEA/AIE'12 Proceedings of the 25th international conference on Industrial Engineering and Other Applications of Applied Intelligent Systems: advanced research in applied artificial intelligence
Automatic network intrusion detection: Current techniques and open issues
Computers and Electrical Engineering
ACM Computing Surveys (CSUR)
Proceedings of the 5th ACM workshop on Security and artificial intelligence
Location-based reasoning about complex multi-agent behavior
Journal of Artificial Intelligence Research
A-GHSOM: An adaptive growing hierarchical self organizing map for network anomaly detection
Journal of Parallel and Distributed Computing
A survey on unsupervised outlier detection in high-dimensional numerical data
Statistical Analysis and Data Mining
Towards an advanced system for real-time event detection in high-volume data streams
Proceedings of the 5th Ph.D. workshop on Information and knowledge
Proceedings of the 21st ACM international conference on Information and knowledge management
Probabilistic distance based abnormal pattern detection in uncertain series data
Knowledge-Based Systems
Mining coherent anomaly collections on web data
Proceedings of the 21st ACM international conference on Information and knowledge management
Drift detection and characterization for fault diagnosis and prognosis of dynamical systems
SUM'12 Proceedings of the 6th international conference on Scalable Uncertainty Management
Community trend outlier detection using soft temporal pattern mining
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
OutRules: a framework for outlier descriptions in multiple context spaces
ECML PKDD'12 Proceedings of the 2012 European conference on Machine Learning and Knowledge Discovery in Databases - Volume Part II
Review: An intrusion detection and prevention system in cloud computing: A systematic review
Journal of Network and Computer Applications
A comparative study of negative selection based anomaly detection in sequence data
ICARIS'12 Proceedings of the 11th international conference on Artificial Immune Systems
MultiAspectForensics: mining large heterogeneous networks using tensor
International Journal of Web Engineering and Technology
A finite state machine-based characterization of building entities for monitoring and control
BuildSys '12 Proceedings of the Fourth ACM Workshop on Embedded Sensing Systems for Energy-Efficiency in Buildings
A study of anomaly detection in data from urban sensor networks
MDAI'12 Proceedings of the 9th international conference on Modeling Decisions for Artificial Intelligence
An efficient algorithm for anomaly detection in a flight system using dynamic bayesian networks
ICONIP'12 Proceedings of the 19th international conference on Neural Information Processing - Volume Part III
Identifying anomalous social contexts from mobile proximity data using binomial mixture models
IDA'12 Proceedings of the 11th international conference on Advances in Intelligent Data Analysis
IDA'12 Proceedings of the 11th international conference on Advances in Intelligent Data Analysis
Outlier detection for patient monitoring and alerting
Journal of Biomedical Informatics
Resolving anomalies in configuration knowledge bases
ISMIS'12 Proceedings of the 20th international conference on Foundations of Intelligent Systems
ACM Transactions on Intelligent Systems and Technology (TIST) - Special section on agent communication, trust in multiagent systems, intelligent tutoring and coaching systems
Multi-level relationship outlier detection
International Journal of Business Intelligence and Data Mining
Inconsistency-Induced Learning for Perpetual Learners
International Journal of Software Science and Computational Intelligence
Personal and Ubiquitous Computing
Analysing 3G radio network performance with fuzzy methods
Neurocomputing
Anomaly management using complex event processing: extending data base technology paper
Proceedings of the 16th International Conference on Extending Database Technology
Outskewer: Using Skewness to Spot Outliers in Samples and Time Series
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Quantum adiabatic machine learning
Quantum Information Processing
Enhanced anomaly detection in wire ropes by combining structure and appearance
Pattern Recognition Letters
Machine-oriented biometrics and cocooning for dynamic network defense
Proceedings of the Eighth Annual Cyber Security and Information Intelligence Research Workshop
On-line bayesian context change detection in web service systems
Proceedings of the 2013 international workshop on Hot topics in cloud services
Root cause detection in a service-oriented architecture
Proceedings of the ACM SIGMETRICS/international conference on Measurement and modeling of computer systems
Run-time validation of knowledge-based systems
Proceedings of the seventh international conference on Knowledge capture
Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues
Information Sciences: an International Journal
A semi-supervised graph-based algorithm for detecting outliers in online-social-networks
Proceedings of the 28th Annual ACM Symposium on Applied Computing
STONE: a stream-based DDoS defense framework
Proceedings of the 28th Annual ACM Symposium on Applied Computing
Outlier ensembles: position paper
ACM SIGKDD Explorations Newsletter
Risk visualization and alerting system: architecture and proof-of-concept implementation
Proceedings of the first international workshop on Security in embedded systems and smartphones
Event identification for local areas using social media streaming data
Proceedings of the ACM SIGMOD Workshop on Databases and Social Networks
Robust novelty detection in the framework of a contamination neighbourhood
International Journal of Intelligent Information and Database Systems
Sensor fault detection and diagnosis for autonomous systems
Proceedings of the 2013 international conference on Autonomous agents and multi-agent systems
Machine learning-based anomaly detection for post-silicon bug diagnosis
Proceedings of the Conference on Design, Automation and Test in Europe
Robust novelty detection in the framework of a contamination neighbourhood
International Journal of Intelligent Information and Database Systems
Autonomously reviewing and validating the knowledge base of a never-ending learning system
Proceedings of the 22nd international conference on World Wide Web companion
Knowledge discovery from massive healthcare claims data
Proceedings of the 19th ACM SIGKDD international conference on Knowledge discovery and data mining
Model-based validation of streaming data: (industry article)
Proceedings of the 7th ACM international conference on Distributed event-based systems
A probabilistic graphical model for brand reputation assessment in social networks
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Detecting changes in content and posting time distributions in social media
Proceedings of the 2013 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
FLEAD: online frequency likelihood estimation anomaly detection for mobile sensing
Proceedings of the 2013 ACM conference on Pervasive and ubiquitous computing adjunct publication
Enhancing one-class support vector machines for unsupervised anomaly detection
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description
Systematic construction of anomaly detection benchmarks from real data
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description
Latent outlier detection and the low precision problem
Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description
Robust estimation of location and scatter by pruning the minimum spanning tree
Journal of Multivariate Analysis
Clustering-based anomaly detection in multi-view data
Proceedings of the 22nd ACM international conference on Conference on information & knowledge management
Toward supervised anomaly detection
Journal of Artificial Intelligence Research
Pattern Recognition
One-class classification with Gaussian processes
Pattern Recognition
Expert Systems with Applications: An International Journal
A survey on concept drift adaptation
ACM Computing Surveys (CSUR)
ISNN'13 Proceedings of the 10th international conference on Advances in Neural Networks - Volume Part I
On detection of emerging anomalous traffic patterns using GPS data
Data & Knowledge Engineering
On-line anomaly detection and resilience in classifier ensembles
Pattern Recognition Letters
Causal inference with rare events in large-scale time-series data
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
One-class conditional random fields for sequential anomaly detection
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
IJCAI'13 Proceedings of the Twenty-Third international joint conference on Artificial Intelligence
Robotics and Autonomous Systems
A methodological overview on anomaly detection
DataTraffic Monitoring and Analysis
Anomaly detection in large-scale data stream networks
Data Mining and Knowledge Discovery
Data Mining and Knowledge Discovery
Support vector regression for anomaly detection from measurement histories
Advanced Engineering Informatics
A neuromorphic architecture for anomaly detection in autonomous large-area traffic monitoring
Proceedings of the International Conference on Computer-Aided Design
Geometrical and computational aspects of Spectral Support Estimation for novelty detection
Pattern Recognition Letters
Information Sciences: an International Journal
Adaptive fuzzy clustering based anomaly data detection in energy system of steel industry
Information Sciences: an International Journal
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
Journal of Parallel and Distributed Computing
Diagnosis mechanism for accurate monitoring in critical infrastructure protection
Computer Standards & Interfaces
A plug-in approach to neyman-pearson classification
The Journal of Machine Learning Research
Sparse representation for robust abnormality detection in crowded scenes
Pattern Recognition
Workload-aware anomaly detection for Web applications
Journal of Systems and Software
Fake View Analytics in Online Video Services
Proceedings of Network and Operating System Support on Digital Audio and Video Workshop
Efficient location aware intrusion detection to protect mobile devices
Personal and Ubiquitous Computing
Data Mining and Knowledge Discovery
Detecting correlation between server resources for system management
Journal of Computer and System Sciences
A least-squares approach to anomaly detection in static and sequential data
Pattern Recognition Letters
Review: A review of novelty detection
Signal Processing
Exploiting domain knowledge to detect outliers
Data Mining and Knowledge Discovery
Robust estimation of a global Gaussian mixture by decentralized aggregations of local models
Web Intelligence and Agent Systems
Journal of Information Science
Ensembles for unsupervised outlier detection: challenges and research questions a position paper
ACM SIGKDD Explorations Newsletter
Research issues in outlier detection for data streams
ACM SIGKDD Explorations Newsletter
A ranking-based algorithm for detection of outliers in categorical data
International Journal of Hybrid Intelligent Systems
Key roles of closed sets and minimal generators in concise representations of frequent patterns
Intelligent Data Analysis
Real-time analysis and management of big time-series data
IBM Journal of Research and Development
Hi-index | 0.01 |
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques in that category are variants of the basic technique. This template provides an easier and more succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this survey will provide a better understanding of the different directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.