A new measure of overall potential influence in linear regression
Computational Statistics & Data Analysis
A fully precise null extended nested relational algebra
Fundamenta Informaticae
LOF: identifying density-based local outliers
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
Efficient algorithms for mining outliers from large data sets
SIGMOD '00 Proceedings of the 2000 ACM SIGMOD international conference on Management of data
On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining
Data mining: concepts and techniques
Data mining: concepts and techniques
Mining top-n local outliers in large databases
Proceedings of the seventh ACM SIGKDD international conference on Knowledge discovery and data mining
OPTICS-OF: Identifying Local Outliers
PKDD '99 Proceedings of the Third European Conference on Principles of Data Mining and Knowledge Discovery
Algorithms for Mining Distance-Based Outliers in Large Datasets
VLDB '98 Proceedings of the 24rd International Conference on Very Large Data Bases
Outlier Detection Using Replicator Neural Networks
DaWaK 2000 Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery
Distance-based outliers: algorithms and applications
The VLDB Journal — The International Journal on Very Large Data Bases
The Journal of Machine Learning Research
Mercer kernel-based clustering in feature space
IEEE Transactions on Neural Networks
Agent-oriented network intrusion detection system using data mining approaches
International Journal of Agent-Oriented Software Engineering
On one extremal problem of adaptive machine learning for detection of anomalies
Automation and Remote Control
Overview and Framework for Data and Information Quality Research
Journal of Data and Information Quality (JDIQ)
A comprehensive survey of numeric and symbolic outlier mining techniques
Intelligent Data Analysis
Elliptical anomalies in wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Voice quality management for IP networks based on automatic change detection of monitoring data
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Similarity kernels for nearest neighbor-based outlier detection
IDA'10 Proceedings of the 9th international conference on Advances in Intelligent Data Analysis
Hyperspherical cluster based distributed anomaly detection in wireless sensor networks
Journal of Parallel and Distributed Computing
Hi-index | 0.00 |
The paper discusses outlier detection algorithms used in data mining systems. Basic approaches currently used for solving this problem are considered, and their advantages and disadvantages are discussed. A new outlier detection algorithm is suggested. It is based on methods of fuzzy set theory and the use of kernel functions and possesses a number of advantages compared to the existing methods. The performance of the algorithm suggested is studied by the example of the applied problem of anomaly detection arising in computer protection systems, the so-called intrusion detection systems.