A massively parallel architecture for a self-organizing neural pattern recognition machine
Computer Vision, Graphics, and Image Processing
BIRCH: an efficient data clustering method for very large databases
SIGMOD '96 Proceedings of the 1996 ACM SIGMOD international conference on Management of data
LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Distributed Denial of Service Attacks and the Zombie Ant Effect
IT Professional
Mining Surveillance Video for Independent Motion Detection
ICDM '02 Proceedings of the 2002 IEEE International Conference on Data Mining
A Survey of Outlier Detection Methodologies
Artificial Intelligence Review
ICDM '04 Proceedings of the Fourth IEEE International Conference on Data Mining
Feature bagging for outlier detection
Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining
Parallel Algorithms for Distance-Based and Density-Based Outliers
ICDM '05 Proceedings of the Fifth IEEE International Conference on Data Mining
A System for the Analysis of Jet Engine Vibration Data
Integrated Computer-Aided Engineering
Forecasting skewed biased stochastic ozone days: analyses, solutions and beyond
Knowledge and Information Systems
International Journal of Intelligent Systems Technologies and Applications
ACM Computing Surveys (CSUR)
A comprehensive survey of numeric and symbolic outlier mining techniques
Intelligent Data Analysis
A novelty detection approach to classification
IJCAI'95 Proceedings of the 14th international joint conference on Artificial intelligence - Volume 1
Hi-index | 0.00 |
Data Mining is the process of extracting interesting information from large sets of data. Outliers are defined as events that occur very infrequently. Detecting outliers before they escalate with potentially catastrophic consequences is very important for various real life applications such as in the field of fraud detection, network robustness analysis, and intrusion detection. This paper presents a comprehensive analysis of three outlier detection methods Extensible Markov Model (EMM), Local Outlier Factor (LOF) and LCS-Mine, where algorithm analysis shows the time complexity analysis and outlier detection accuracy. The experiments conducted with Ozone level Detection, IR video trajectories, and 1999 and 2000 DARPA DDoS datasets demonstrate that EMM outperforms both LOF and LSC-Mine in both time and outlier detection accuracy.