Anomaly detection

ACM Computing Surveys - Tập 41 Số 3 - Trang 1-58 - 2009
Varun Chandola1, Arindam Banerjee1, Vipin Kumar1
1University of Minnesota, Minneapolis, MN

Tóm tắt

Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many anomaly detection techniques have been specifically developed for certain application domains, while others are more generic. This survey tries to provide a structured and comprehensive overview of the research on anomaly detection. We have grouped existing techniques into different categories based on the underlying approach adopted by each technique. For each category we have identified key assumptions, which are used by the techniques to differentiate between normal and anomalous behavior. When applying a given technique to a particular domain, these assumptions can be used as guidelines to assess the effectiveness of the technique in that domain. For each category, we provide a basic anomaly detection technique, and then show how the different existing techniques in that category are variants of the basic technique. This template provides an easier and more succinct understanding of the techniques belonging to each category. Further, for each category, we identify the advantages and disadvantages of the techniques in that category. We also provide a discussion on the computational complexity of the techniques since it is an important issue in real application domains. We hope that this survey will provide a better understanding of the different directions in which research has been done on this topic, and how techniques developed in one area can be applied in domains for which they were not intended to begin with.

Từ khóa


Tài liệu tham khảo

10.1145/1150402.1150459

10.1093/biomet/66.2.229

10.2307/1268821

10.1049/cp:19991239

Aeyels , D. 1991. On the dynamic behaviour of the novelty detector and the novelty filter . In Analysis of Controlled Dynamical Systems: Progress in Systems and Control Theory , B. Bonnard, B. Bride, J. Gauthier, and I. Kupka, Eds. vol. 8 . Springer , Berlin , 1--10. Aeyels, D. 1991. On the dynamic behaviour of the novelty detector and the novelty filter. In Analysis of Controlled Dynamical Systems: Progress in Systems and Control Theory, B. Bonnard, B. Bride, J. Gauthier, and I. Kupka, Eds. vol. 8. Springer, Berlin, 1--10.

10.1109/ICDM.2005.22

10.5555/1201768.1201773

10.1137/1.9781611972757.8

10.1145/375663.375668

Aggarwal , C. C. and Yu , P. S . 2008. Outlier detection with uncertain data . In Proceedings of the International Conference on Data Mining (SDM). 483--493 . Aggarwal, C. C. and Yu, P. S. 2008. Outlier detection with uncertain data. In Proceedings of the International Conference on Data Mining (SDM). 483--493.

Agovic , A. , Banerjee , A. , Ganguly , A. R. , and Protopopescu , V . 2007. Anomaly detection in transportation corridors using manifold embedding . In Proceedings of the 1st International Workshop on Knowledge Discovery from Sensor Data. ACM Press. Agovic, A., Banerjee, A., Ganguly, A. R., and Protopopescu, V. 2007. Anomaly detection in transportation corridors using manifold embedding. In Proceedings of the 1st International Workshop on Knowledge Discovery from Sensor Data. ACM Press.

Agrawal , R. and Srikant , R . 1995. Mining sequential patterns . In Proceedings of the 11th International Conference on Data Engineering. IEEE Computer Society, 3--14 . Agrawal, R. and Srikant, R. 1995. Mining sequential patterns. In Proceedings of the 11th International Conference on Data Engineering. IEEE Computer Society, 3--14.

10.5555/1609942.1609946

10.1016/S0893-6080(00)00060-5

Aleskerov , E. , Freisleben , B. , and Rao , B . 1997. Cardwatch: A neural network based database mining system for credit card fraud detection . In Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering. 220--226 . Aleskerov, E., Freisleben, B., and Rao, B. 1997. Cardwatch: A neural network based database mining system for credit card fraud detection. In Proceedings of the IEEE Conference on Computational Intelligence for Financial Engineering. 220--226.

Allan , J. , Carbonell , J. , Doddington , G. , Yamron , J. , and Yang , Y . 1998. Topic detection and tracking pilot study . In Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop. 194--218 . Allan, J., Carbonell, J., Doddington, G., Yamron, J., and Yang, Y. 1998. Topic detection and tracking pilot study. In Proceedings of the DARPA Broadcast News Transcription and Understanding Workshop. 194--218.

Anderson D. Lunt T. F. Javitz H. Tamaru A. and Valdes A. 1995. Detecting unusual program behavior using the statistical components of NIDES. Tech. rep. SRI--CSL--95--06 Computer Science Laboratory SRI International. Anderson D. Lunt T. F. Javitz H. Tamaru A. and Valdes A. 1995. Detecting unusual program behavior using the statistical components of NIDES. Tech. rep. SRI--CSL--95--06 Computer Science Laboratory SRI International.

Anderson D. Frivold T. Tamaru A. and Valdes A. 1994. Next-generation intrusion detection expert system (NIDES) software users manual beta-update release. Tech. rep. SRI--CSL--95--07 Computer Science Laboratory SRI International. Anderson D. Frivold T. Tamaru A. and Valdes A. 1994. Next-generation intrusion detection expert system (NIDES) software users manual beta-update release. Tech. rep. SRI--CSL--95--07 Computer Science Laboratory SRI International.

10.1109/ICDM.2007.53

Angiulli , F. and Pizzuti , C . 2002. Fast outlier detection in high dimensional spaces . In Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery. Springer-Verlag, 15--26 . Angiulli, F. and Pizzuti, C. 2002. Fast outlier detection in high dimensional spaces. In Proceedings of the 6th European Conference on Principles of Data Mining and Knowledge Discovery. Springer-Verlag, 15--26.

10.1080/00401706.1960.10489888

Arning , A. , Agrawal , R. , and Raghavan , P . 1996. A linear method for deviation detection in large databases . In Proceedings of the 2nd International Conference of Knowledge Discovery and Data Mining. 164--169 . Arning, A., Agrawal, R., and Raghavan, P. 1996. A linear method for deviation detection in large databases. In Proceedings of the 2nd International Conference of Knowledge Discovery and Data Mining. 164--169.

10.1080/01431160110055804

Bakar , Z. , Mohemad , R. , Ahmad , A. , and Deris , M . 2006. A comparative study for outlier detection techniques in data mining . Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems. 1--6. Bakar, Z., Mohemad, R., Ahmad, A., and Deris, M. 2006. A comparative study for outlier detection techniques in data mining. Proceedings of the IEEE Conference on Cybernetics and Intelligent Systems. 1--6.

Baker , D. , Hofmann , T. , McCallum , A. , and Yang , Y . 1999. A hierarchical probabilistic model for novelty detection in text . In Proceedings of the International Conference on Machine Learning. Baker, D., Hofmann, T., McCallum, A., and Yang, Y. 1999. A hierarchical probabilistic model for novelty detection in text. In Proceedings of the International Conference on Machine Learning.

10.1145/604264.604268

Barbara , D. , Couto , J. , Jajodia , S. , and Wu , N . 2001b. Detecting novel network intrusions using Bayes estimators . In Proceedings of the 1st SIAM International Conference on Data Mining. Barbara, D., Couto, J., Jajodia, S., and Wu, N. 2001b. Detecting novel network intrusions using Bayes estimators. In Proceedings of the 1st SIAM International Conference on Data Mining.

10.1145/952532.952616

10.2307/2344839

Barnett V. and Lewis T. 1994. Outliers in Statistical Data. John Wiley. Barnett V. and Lewis T. 1994. Outliers in Statistical Data. John Wiley.

Barson , P. , Davey , N. , Field , S. D. H. , Frank , R. J. , and McAskie , G. 1996 . The detection of fraud in mobile phone networks . Neural Netw. World 6 , 4 . Barson, P., Davey, N., Field, S. D. H., Frank, R. J., and McAskie, G. 1996. The detection of fraud in mobile phone networks. Neural Netw. World 6, 4.

10.1145/1014052.1014062

10.5555/3225643.3225840

10.1145/956750.956758

Beckman , R. J. and Cook , R. D. 1983 . Outlier...s . Technometrics 25 , 2, 119 -- 149 . Beckman, R. J. and Cook, R. D. 1983. Outlier...s. Technometrics 25, 2, 119--149.

10.1093/bioinformatics/17.1.23

10.1145/361002.361007

10.1002/for.768

10.1049/ip-vis:19941330

10.1002/qj.49712353910

Bolton , R. and Hand , D . 1999. Unsupervised profiling methods for fraud detection . In Proceedings of the Conference on Credit Scoring and Credit Control VII. Bolton, R. and Hand, D. 1999. Unsupervised profiling methods for fraud detection. In Proceedings of the Conference on Credit Scoring and Credit Control VII.

Boriah , S. , Chandola , V. , and Kumar , V . 2008. Similarity measures for categorical data: A comparative evaluation . In Proceedings of the 8th SIAM International Conference on Data Mining. 243--254 . Boriah, S., Chandola, V., and Kumar, V. 2008. Similarity measures for categorical data: A comparative evaluation. In Proceedings of the 8th SIAM International Conference on Data Mining. 243--254.

10.1016/S0303-2647(00)00131-3

10.1093/biomet/55.1.119

10.1109/ICDCS.2006.49

Brause , R. , Langsdorf , T. , and Hepp , M . 1999. Neural data mining for credit card fraud detection . In Proceedings of the IEEE International Conference on Tools with Artificial Intelligence. 103--106 . Brause, R., Langsdorf, T., and Hepp, M. 1999. Neural data mining for credit card fraud detection. In Proceedings of the IEEE International Conference on Tools with Artificial Intelligence. 103--106.

Breunig , M. M. , Kriegel , H.-P. , Ng , R. T. , and Sander , J . 1999 . Optics-of: Identifying local outliers. In Proceedings of the 3rd European Conference on Principles of Data Mining and Knowledge Discovery . Springer-Verlag , 262--270. Breunig, M. M., Kriegel, H.-P., Ng, R. T., and Sander, J. 1999. Optics-of: Identifying local outliers. In Proceedings of the 3rd European Conference on Principles of Data Mining and Knowledge Discovery. Springer-Verlag, 262--270.

10.1145/342009.335388

10.1016/S0167-7152(96)00213-1

10.2307/253535

Bronstein , A. , Das , J. , Duro , M. , Friedrich , R. , Kleyner , G. , Mueller , M. , Singhal , S. , and Cohen , I . 2001. Bayesian networks for detecting anomalies in Internet-based services . In Proceedings of the International Symposium on Integrated Network Management. Bronstein, A., Das, J., Duro, M., Friedrich, R., Kleyner, G., Mueller, M., Singhal, S., and Cohen, I. 2001. Bayesian networks for detecting anomalies in Internet-based services. In Proceedings of the International Symposium on Integrated Network Management.

Brotherton , T. and Johnson , T . 2001. Anomaly detection for advanced military aircraft using neural networks . In Proceedings of the IEEE Aerospace Conference. Brotherton, T. and Johnson, T. 2001. Anomaly detection for advanced military aircraft using neural networks. In Proceedings of the IEEE Aerospace Conference.

Brotherton , T. , Johnson , T. , and Chadderdon , G . 1998. Classification and novelty detection using linear models and a class dependent-elliptical basis function neural network . In Proceedings of the IJCNN Conference. Brotherton, T., Johnson, T., and Chadderdon, G. 1998. Classification and novelty detection using linear models and a class dependent-elliptical basis function neural network. In Proceedings of the IJCNN Conference.

Budalakoti S. Srivastava A. Akella R. and Turkov E. 2006. Anomaly detection in large sets of high-dimensional symbol sequences. Tech. rep. NASA TM-2006-214553 NASA Ames Research Center. Budalakoti S. Srivastava A. Akella R. and Turkov E. 2006. Anomaly detection in large sets of high-dimensional symbol sequences. Tech. rep. NASA TM-2006-214553 NASA Ames Research Center.

10.1080/01621459.1998.10473711

Byungho , H. and Sungzoon , C . 1999. Characteristics of autoassociative MLP as a novelty detector . In Proceedings of the IEEE International Joint Conference on Neural Networks. Vol. 5 . 3086--3091. Byungho, H. and Sungzoon, C. 1999. Characteristics of autoassociative MLP as a novelty detector. In Proceedings of the IEEE International Joint Conference on Neural Networks. Vol. 5. 3086--3091.

10.1145/604264.604269

Campbell , C. and Bennett , K . 2001. A linear programming approach to novelty detection . In Proceedings of the Conference on Advances in Neural Information Processing. vol. 14 . Cambridge Press. Campbell, C. and Bennett, K. 2001. A linear programming approach to novelty detection. In Proceedings of the Conference on Advances in Neural Information Processing. vol. 14. Cambridge Press.

Caudell , T. and Newman , D . 1993. An adaptive resonance architecture to define normality and detect novelties in time series and databases . In Proceedings of the IEEE World Congress on Neural Networks. IEEE, 166--176 . Caudell, T. and Newman, D. 1993. An adaptive resonance architecture to define normality and detect novelties in time series and databases. In Proceedings of the IEEE World Congress on Neural Networks. IEEE, 166--176.

Chakrabarti , S. , Sarawagi , S. , and Dom , B . 1998. Mining surprising patterns using temporal description length . In Proceedings of the 24rd International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 606--617 . Chakrabarti, S., Sarawagi, S., and Dom, B. 1998. Mining surprising patterns using temporal description length. In Proceedings of the 24rd International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 606--617.

Chandola V. Banerjee A. and Kumar V. 2007. Anomaly detection: A survey. Tech. rep. 07-017 Computer Science Department University of Minnesota. Chandola V. Banerjee A. and Kumar V. 2007. Anomaly detection: A survey. Tech. rep. 07-017 Computer Science Department University of Minnesota.

Chandola V. Boriah S. and Kumar V. 2008. Understanding categorical similarity measures for outlier detection. Tech. rep. 08-008 University of Minnesota. Chandola V. Boriah S. and Kumar V. 2008. Understanding categorical similarity measures for outlier detection. Tech. rep. 08-008 University of Minnesota.

Chandola V. Eilertson E. Ertoz L. Simon G. and Kumar V. 2006. Data mining for cyber security. In Data Warehousing and Data Mining Techniques for Computer Security A. Singhal Ed. Springer. Chandola V. Eilertson E. Ertoz L. Simon G. and Kumar V. 2006. Data mining for cyber security. In Data Warehousing and Data Mining Techniques for Computer Security A. Singhal Ed. Springer.

Chatzigiannakis , V. , Papavassiliou , S. , Grammatikou , M. , and Maglaris , B . 2006. Hierarchical anomaly detection in distributed large-scale sensor networks . In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society, 761--767 . Chatzigiannakis, V., Papavassiliou, S., Grammatikou, M., and Maglaris, B. 2006. Hierarchical anomaly detection in distributed large-scale sensor networks. In Proceedings of the 11th IEEE Symposium on Computers and Communications (ISCC). IEEE Computer Society, 761--767.

Chaudhary , A. , Szalay , A. S. , and Moore , A. W . 2002. Very fast outlier detection in large multidimensional data sets . In Proceedings of the ACM SIGMOD Workshop in Research Issues in Data Mining and Knowledge Discovery (DMKD). ACM Press. Chaudhary, A., Szalay, A. S., and Moore, A. W. 2002. Very fast outlier detection in large multidimensional data sets. In Proceedings of the ACM SIGMOD Workshop in Research Issues in Data Mining and Knowledge Discovery (DMKD). ACM Press.

10.1145/1007730.1007733

10.2116/analsci.21.161

Chiu , A. and Chee Fu, A. W. 2003. Enhancements on local outlier detection . In Proceedings of the 7th International Database Engineering and Applications Symposium. 298--307 . Chiu, A. and Chee Fu, A. W. 2003. Enhancements on local outlier detection. In Proceedings of the 7th International Database Engineering and Applications Symposium. 298--307.

Chow , C. and Yeung , D . -Y. 2002. Parzen-window network intrusion detectors . In Proceedings of the 16th International Conference on Pattern Recognition. vol. 4 . IEEE Computer Society, 40385. Chow, C. and Yeung, D.-Y. 2002. Parzen-window network intrusion detectors. In Proceedings of the 16th International Conference on Pattern Recognition. vol. 4. IEEE Computer Society, 40385.

10.1023/A:1009740009307

Crook , P. and Hayes , G . 2001. A robot implementation of a biologically inspired method for novelty detection . In Proceedings of the Towards Intelligent Mobile Robots Conference. Crook, P. and Hayes, G. 2001. A robot implementation of a biologically inspired method for novelty detection. In Proceedings of the Towards Intelligent Mobile Robots Conference.

Crook , P. A. , Marsland , S. , Hayes , G. , and Nehmzow , U . 2002. A tale of two filters: Online novelty detection . In Proceedings of the International Conference on Robotics and Automation. 3894--3899 . Crook, P. A., Marsland, S., Hayes, G., and Nehmzow, U. 2002. A tale of two filters: Online novelty detection. In Proceedings of the International Conference on Robotics and Automation. 3894--3899.

Cun Y. L. Boser B. Denker J. S. Howard R. E. Hubbard W. Jackel L. D. and Henderson D. 1990. Handwritten digit recognition with a back-propagation network. In Advances in Neural Information Processing Systems. 396--404. Morgan Koufamann. Cun Y. L. Boser B. Denker J. S. Howard R. E. Hubbard W. Jackel L. D. and Henderson D. 1990. Handwritten digit recognition with a back-propagation network. In Advances in Neural Information Processing Systems. 396--404. Morgan Koufamann.

10.1145/1281192.1281219

Dasgupta , D. and Majumdar , N . 2002. Anomaly detection in multidimensional data using negative selection algorithm . In Proceedings of the IEEE Conference on Evolutionary Computation. 1039--1044 . Dasgupta, D. and Majumdar, N. 2002. Anomaly detection in multidimensional data using negative selection algorithm. In Proceedings of the IEEE Conference on Evolutionary Computation. 1039--1044.

Dasgupta , D. and Nino , F . 2000. A comparison of negative and positive selection algorithms in novel pattern detection . In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. vol. 1 . 125--130. Dasgupta, D. and Nino, F. 2000. A comparison of negative and positive selection algorithms in novel pattern detection. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. vol. 1. 125--130.

Davy , M. and Godsill , S . 2002. Detection of abrupt spectral changes using support vector machines, an application to audio signal segmentation . In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing. Davy, M. and Godsill, S. 2002. Detection of abrupt spectral changes using support vector machines, an application to audio signal segmentation. In Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing.

Debar , H. , Dacier , M. , Nassehi , M. , and Wespi , A . 1998. Fixed vs. variable-length patterns for detecting suspicious process behavior . In Proceedings of the 5th European Symposium on Research in Computer Security. Springer-Verlag, 1--15 . Debar, H., Dacier, M., Nassehi, M., and Wespi, A. 1998. Fixed vs. variable-length patterns for detecting suspicious process behavior. In Proceedings of the 5th European Symposium on Research in Computer Security. Springer-Verlag, 1--15.

10.1109/TSE.1987.232894

Desforges , M. , Jacob , P. , and Cooper , J . 1998. Applications of probability density estimation to the detection of abnormal conditions in engineering . In Proceedings of the Institute of the Mechanical Engineers. vol. 212 . 687--703. Desforges, M., Jacob, P., and Cooper, J. 1998. Applications of probability density estimation to the detection of abnormal conditions in engineering. In Proceedings of the Institute of the Mechanical Engineers. vol. 212. 687--703.

Diaz , I. and Hollmen , J . 2002. Residual generation and visualization for understanding novel process conditions . In Proceedings of the IEEE International Joint Conference on Neural Networks. IEEE , 2070--2075. Diaz, I. and Hollmen, J. 2002. Residual generation and visualization for understanding novel process conditions. In Proceedings of the IEEE International Joint Conference on Neural Networks. IEEE, 2070--2075.

Diehl , C. and Hampshire , J . 2002. Real-time object classification and novelty detection for collaborative video surveillance . In Proceedings of the IEEE International Joint Conference on Neural Networks. IEEE. Diehl, C. and Hampshire, J. 2002. Real-time object classification and novelty detection for collaborative video surveillance. In Proceedings of the IEEE International Joint Conference on Neural Networks. IEEE.

10.1145/1014052.1014100

10.1109/72.595879

10.1016/j.jpdc.2005.12.011

Duda R. O. Hart P. E. and Stork D. G. 2000. Pattern Classification 2nd Ed. Wiley-Interscience. Duda R. O. Hart P. E. and Stork D. G. 2000. Pattern Classification 2nd Ed. Wiley-Interscience.

Dutta , H. , Giannella , C. , Borne , K. , and Kargupta , H . 2007. Distributed top-k outlier detection in astronomy catalogs using the DEMAC system . In Proceedings of the 7th SIAM International Conference on Data Mining. Dutta, H., Giannella, C., Borne, K., and Kargupta, H. 2007. Distributed top-k outlier detection in astronomy catalogs using the DEMAC system. In Proceedings of the 7th SIAM International Conference on Data Mining.

10.1080/14786448708628471

10.1109/ICASSP.2000.860253

10.5555/784589.784654

Ertoz L. Eilertson E. Lazarevic A. Tan P.-N. Kumar V. Srivastava J. and Dokas P. 2004. MINDS—Minnesota Intrusion Detection System. In Data Mining—Next Generation Challenges and Future Directions. MIT Press. Ertoz L. Eilertson E. Lazarevic A. Tan P.-N. Kumar V. Srivastava J. and Dokas P. 2004. MINDS—Minnesota Intrusion Detection System. In Data Mining—Next Generation Challenges and Future Directions. MIT Press.

Ertöz L. Steinbach M. and Kumar V. 2003. Finding topics in collections of documents: A shared nearest neighbor approach. In Clustering and Information Retrieval. 83--104. Ertöz L. Steinbach M. and Kumar V. 2003. Finding topics in collections of documents: A shared nearest neighbor approach. In Clustering and Information Retrieval. 83--104.

Escalante , H. J. 2005 . A comparison of outlier detection algorithms for machine learning . In Proceedings of the International Conference on Communications in Computing. Escalante, H. J. 2005. A comparison of outlier detection algorithms for machine learning. In Proceedings of the International Conference on Communications in Computing.

Eskin , E. 2000 . Anomaly detection over noisy data using learned probability distributions . In Proceedings of the 17th International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 255--262 . Eskin, E. 2000. Anomaly detection over noisy data using learned probability distributions. In Proceedings of the 17th International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 255--262.

Eskin , E. , Arnold , A. , Prerau , M. , Portnoy , L. , and Stolfo , S . 2002. A geometric framework for unsupervised anomaly detection . In Proceedings of the Conference on Applications of Data Mining in Computer Security. Kluwer Academics, 78--100 . Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo, S. 2002. A geometric framework for unsupervised anomaly detection. In Proceedings of the Conference on Applications of Data Mining in Computer Security. Kluwer Academics, 78--100.

Eskin , E. , Lee , W. , and Stolfo , S . 2001. Modeling system call for intrusion detection using dynamic window sizes . In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX). Eskin, E., Lee, W., and Stolfo, S. 2001. Modeling system call for intrusion detection using dynamic window sizes. In Proceedings of DARPA Information Survivability Conference and Exposition (DISCEX).

Ester , M. , Kriegel , H.-P. , Sander , J. , and Xu , X . 1996. A density-based algorithm for discovering clusters in large spatial databases with noise . In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, E. Simoudis, J. Han, and U. Fayyad, Eds. AAAI Press, 226--231 . Ester, M., Kriegel, H.-P., Sander, J., and Xu, X. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proceedings of the 2nd International Conference on Knowledge Discovery and Data Mining, E. Simoudis, J. Han, and U. Fayyad, Eds. AAAI Press, 226--231.

Fan , W. , Miller , M. , Stolfo , S. J. , Lee , W. , and Chan , P. K . 2001. Using artificial anomalies to detect unknown and known network intrusions . In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 123--130 . Fan, W., Miller, M., Stolfo, S. J., Lee, W., and Chan, P. K. 2001. Using artificial anomalies to detect unknown and known network intrusions. In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 123--130.

10.1145/312129.312195

Forrest , S. , D'haeseleer , P. , and Helman , P . 1996a. An immunological approach to change detection: Algorithms, analysis and implications . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 110 . Forrest, S., D'haeseleer, P., and Helman, P. 1996a. An immunological approach to change detection: Algorithms, analysis and implications. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 110.

10.1109/TSMCB.2003.817026

Forrest , S. , Hofmeyr , S. A. , Somayaji , A. , and Longstaff , T. A . 1996b. A sense of self for unix processes . In Proceedings of the IEEE ISRSP. 120--128 . Forrest, S., Hofmeyr, S. A., Somayaji, A., and Longstaff, T. A. 1996b. A sense of self for unix processes. In Proceedings of the IEEE ISRSP. 120--128.

Forrest , S. , Perelson , A. S. , Allen , L. , and Cherukuri , R . 1994. Self-nonself discrimination in a computer . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 202 . Forrest, S., Perelson, A. S., Allen, L., and Cherukuri, R. 1994. Self-nonself discrimination in a computer. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 202.

Forrest , S. , Warrender , C. , and Pearlmutter , B . 1999. Detecting intrusions using system calls: Alternate data models . In Proceedings of the IEEE ISRSP. IEEE Computer Society, 133--145 . Forrest, S., Warrender, C., and Pearlmutter, B. 1999. Detecting intrusions using system calls: Alternate data models. In Proceedings of the IEEE ISRSP. IEEE Computer Society, 133--145.

10.1111/j.2517-6161.1972.tb00912.x

10.1145/1081870.1081917

Galeano P. Pea D. and Tsay R. S. 2004. Outlier detection in multivariate time series via projection pursuit. Statistics and econometrics working articles ws044211 Departamento de Estadïstica y Econometrïca Universidad Carlos III. Galeano P. Pea D. and Tsay R. S. 2004. Outlier detection in multivariate time series via projection pursuit. Statistics and econometrics working articles ws044211 Departamento de Estadïstica y Econometrïca Universidad Carlos III.

Ghosh , A. K. , Schwartzbard , A. , and Schatz , M . 1999a. Learning program behavior profiles for intrusion detection . In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring. 51--62 . Ghosh, A. K., Schwartzbard, A., and Schatz, M. 1999a. Learning program behavior profiles for intrusion detection. In Proceedings of the 1st USENIX Workshop on Intrusion Detection and Network Monitoring. 51--62.

Ghosh , A. K. , Schwartzbard , A. , and Schatz , M . 1999b. Using program behavior profiles for intrusion detection . In Proceedings of the SANS 3rd Conference and Workshop on Intrusion Detection and Response. Ghosh, A. K., Schwartzbard, A., and Schatz, M. 1999b. Using program behavior profiles for intrusion detection. In Proceedings of the SANS 3rd Conference and Workshop on Intrusion Detection and Response.

Ghosh , A. K. , Wanken , J. , and Charron , F . 1998. Detecting anomalous and unknown intrusions against programs . In Proceedings of the 14th Annual Computer Security Applications Conference. IEEE Computer Society, 259 . Ghosh, A. K., Wanken, J., and Charron, F. 1998. Detecting anomalous and unknown intrusions against programs. In Proceedings of the 14th Annual Computer Security Applications Conference. IEEE Computer Society, 259.

Ghosh , S. and Reilly , D. L . 1994. Credit card fraud detection with a neural-network . In Proceedings of the 27th Annual Hawaii International Conference on System Science. vol. 3 . Ghosh, S. and Reilly, D. L. 1994. Credit card fraud detection with a neural-network. In Proceedings of the 27th Annual Hawaii International Conference on System Science. vol. 3.

Ghoting , A. , Parthasarathy , S. , and Otey , M . 2006. Fast mining of distance-based outliers in high dimensional datasets . In Proceedings of the SIAM International Conference on Data Mining. Ghoting, A., Parthasarathy, S., and Otey, M. 2006. Fast mining of distance-based outliers in high dimensional datasets. In Proceedings of the SIAM International Conference on Data Mining.

Gibbons , R. D. 1994. Statistical Methods for Groundwater Monitoring . John Wiley & amp; Sons, Inc. Gibbons, R. D. 1994. Statistical Methods for Groundwater Monitoring. John Wiley & Sons, Inc.

10.1161/01.CIR.101.23.e215

10.1023/A:1026195112518

10.1080/00401706.1969.10490657

10.1016/S0306-4379(00)00022-3

10.5555/1314498.1314562

10.1109/60.749142

Gwadera , R. , Atallah , M. J. , and Szpankowski , W . 2004. Detection of significant sets of episodes in event sequences . In Proceedings of the 4th IEEE International Conference on Data Mining. IEEE Computer Society, 3--10 . Gwadera, R., Atallah, M. J., and Szpankowski, W. 2004. Detection of significant sets of episodes in event sequences. In Proceedings of the 4th IEEE International Conference on Data Mining. IEEE Computer Society, 3--10.

Gwadera , R. , Atallah , M. J. , and Szpankowski , W . 2005a. Markov models for identification of significant episodes . In Proceedings of the 5th SIAM International Conference on Data Mining. Gwadera, R., Atallah, M. J., and Szpankowski, W. 2005a. Markov models for identification of significant episodes. In Proceedings of the 5th SIAM International Conference on Data Mining.

10.5555/2993952.2994022

Harris T. 1993. Neural network in machine health monitoring. Professional Engin. Harris T. 1993. Neural network in machine health monitoring. Professional Engin.

10.2307/2346830

Hautamaki , V. , Karkkainen , I. , and Franti , P . 2004. Outlier detection using k-nearest neighbour graph . In Proceedings of the 17th International Conference on Pattern Recognition. vol. 3 . IEEE Computer Society, 430--433. Hautamaki, V., Karkkainen, I., and Franti, P. 2004. Outlier detection using k-nearest neighbour graph. In Proceedings of the 17th International Conference on Pattern Recognition. vol. 3. IEEE Computer Society, 430--433.

Hawkins , D. 1980. Identification of Outliers . Chapman and Hall , London and New York. Hawkins, D. 1980. Identification of Outliers. Chapman and Hall, London and New York.

10.1080/01621459.1974.10482950

Hawkins , S. , He , H. , Williams , G. J. , and Baxter , R. A . 2002. Outlier detection using replicator neural networks . In Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery. Springer-Verlag, 170--180 . Hawkins, S., He, H., Williams, G. J., and Baxter, R. A. 2002. Outlier detection using replicator neural networks. In Proceedings of the 4th International Conference on Data Warehousing and Knowledge Discovery. Springer-Verlag, 170--180.

Hazel , G. G. 2000 . Multivariate Gaussian MRF for multi-spectral scene segmentation and anomaly detection . GeoRS 38 , 3, 1199 -- 1211 . Hazel, G. G. 2000. Multivariate Gaussian MRF for multi-spectral scene segmentation and anomaly detection. GeoRS 38, 3, 1199--1211.

10.1016/S0957-4174(97)00045-6

He , Z. , Deng , S. , and Xu , X . 2002. Outlier detection integrating semantic knowledge . In Proceedings of the 3rd International Conference on Advances in Web-Age Information Management. Springer-Verlag, 126--131 . He, Z., Deng, S., and Xu, X. 2002. Outlier detection integrating semantic knowledge. In Proceedings of the 3rd International Conference on Advances in Web-Age Information Management. Springer-Verlag, 126--131.

10.1007/11731139_67

10.1016/S0167-8655(03)00003-5

10.1007/11538059_42

He Z. Xu X. Huang J. Z. and Deng S. 2004a. A Frequent Pattern Discovery Method for Outlier Detection. Springer 726--732. He Z. Xu X. Huang J. Z. and Deng S. 2004a. A Frequent Pattern Discovery Method for Outlier Detection. Springer 726--732.

He Z. Xu X. Huang J. Z. and Deng S. 2004b. Mining Class Outliers: Concepts Algorithms and Applications. Springer 588--589. He Z. Xu X. Huang J. Z. and Deng S. 2004b. Mining Class Outliers: Concepts Algorithms and Applications. Springer 588--589.

Heller , K. A. , Svore , K. M. , Keromytis , A. D. , and Stolfo , S. J . 2003. One class support vector machines for detecting anomalous windows registry accesses . In Proceedings of the Workshop on Data Mining for Computer Security. Heller, K. A., Svore, K. M., Keromytis, A. D., and Stolfo, S. J. 2003. One class support vector machines for detecting anomalous windows registry accesses. In Proceedings of the Workshop on Data Mining for Computer Security.

Helman , P. and Bhangoo , J . 1997. A statistically-based system for prioritizing information exploration under uncertainty . In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. vol. 27 . IEEE, 449--466. Helman, P. and Bhangoo, J. 1997. A statistically-based system for prioritizing information exploration under uncertainty. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. vol. 27. IEEE, 449--466.

Helmer , G. , Wong , J. , Honavar , V. , and Miller , L . 1998. Intelligent agents for intrusion detection . In Proceedings of the IEEE Information Technology Conference. 121--124 . Helmer, G., Wong, J., Honavar, V., and Miller, L. 1998. Intelligent agents for intrusion detection. In Proceedings of the IEEE Information Technology Conference. 121--124.

Hickinbotham , S. J. and Austin , J . 2000a. Novelty detection in airframe strain data . In Proceedings of the 15th International Conference on Pattern Recognition. Vol. 2 . 536--539. Hickinbotham, S. J. and Austin, J. 2000a. Novelty detection in airframe strain data. In Proceedings of the 15th International Conference on Pattern Recognition. Vol. 2. 536--539.

Hickinbotham , S. J. and Austin , J . 2000b. Novelty detection in airframe strain data . In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. vol. 6 . 24--27. Hickinbotham, S. J. and Austin, J. 2000b. Novelty detection in airframe strain data. In Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. vol. 6. 24--27.

Ho , L. L. , Macey , C. J. , and Hiller , R . 1999. A distributed and reliable platform for adaptive anomaly detection in IP networks . In Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management. Springer-Verlag, 33--46 . Ho, L. L., Macey, C. J., and Hiller, R. 1999. A distributed and reliable platform for adaptive anomaly detection in IP networks. In Proceedings of the 10th IFIP/IEEE International Workshop on Distributed Systems: Operations and Management. Springer-Verlag, 33--46.

10.5555/646257.685234

Ho , T. V. and Rouat , J . 1998. Novelty detection based on relaxation time of a network of integrate-and-fire neurons . In Proceedings of the 2nd IEEE World Congress on Computational Intelligence. 1524--1529 . Ho, T. V. and Rouat, J. 1998. Novelty detection based on relaxation time of a network of integrate-and-fire neurons. In Proceedings of the 2nd IEEE World Congress on Computational Intelligence. 1524--1529.

10.1023/B:AIRE.0000045502.10941.a9

10.5555/1298081.1298084

Hollier , G. and Austin , J . 2002. Novelty detection for strain-gauge degradation using maximally correlated components . In Proceedings of the European Symposium on Artificial Neural Networks. 257--262--539 . Hollier, G. and Austin, J. 2002. Novelty detection for strain-gauge degradation using maximally correlated components. In Proceedings of the European Symposium on Artificial Neural Networks. 257--262--539.

Hollmen , J. and Tresp , V . 1999. Call-based fraud detection in mobile communication networks using a hierarchical regime-switching model . In Proceedings of the Conference on Advances in Neural Information Processing Systems II. MIT Press, 889--895 . Hollmen, J. and Tresp, V. 1999. Call-based fraud detection in mobile communication networks using a hierarchical regime-switching model. In Proceedings of the Conference on Advances in Neural Information Processing Systems II. MIT Press, 889--895.

10.1093/clinchem/47.12.2137

Hu , W. , Liao , Y. , and Vemuri , V. R . 2003. Robust anomaly detection using support vector machines . In Proceedings of the International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 282--289 . Hu, W., Liao, Y., and Vemuri, V. R. 2003. Robust anomaly detection using support vector machines. In Proceedings of the International Conference on Machine Learning. Morgan Kaufmann Publishers Inc., 282--289.

Huber , P. 1974. Robust Statistics . Wiley , New York . Huber, P. 1974. Robust Statistics. Wiley, New York.

10.1214/aos/1176349519

10.1145/1014052.1014102

10.1109/ICDM.2007.12

10.1145/1150402.1150428

10.1109/32.372146

Jagadish , H. V. , Koudas , N. , and Muthukrishnan , S . 1999. Mining deviants in a time series database . In Proceedings of the 25th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 102--113 . Jagadish, H. V., Koudas, N., and Muthukrishnan, S. 1999. Mining deviants in a time series database. In Proceedings of the 25th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 102--113.

10.1109/IJCNN.1991.155491

Jain A. K. and Dubes R. C. 1988. Algorithms for Clustering Data. Prentice-Hall Inc. Jain A. K. and Dubes R. C. 1988. Algorithms for Clustering Data. Prentice-Hall Inc.

Jakubek , S. and Strasser , T . 2002. Fault-diagnosis using neural networks with ellipsoidal basis functions . In Proceedings of the American Control Conference. vol. 5 . 3846--3851. Jakubek, S. and Strasser, T. 2002. Fault-diagnosis using neural networks with ellipsoidal basis functions. In Proceedings of the American Control Conference. vol. 5. 3846--3851.

Janakiram , D. , Reddy , V. , and Kumar , A . 2006. Outlier detection in wireless sensor networks using Bayesian belief networks . In Proceedings of the 1st International Conference on Communication System Software and Middleware. 1--6. Janakiram, D., Reddy, V., and Kumar, A. 2006. Outlier detection in wireless sensor networks using Bayesian belief networks. In Proceedings of the 1st International Conference on Communication System Software and Middleware. 1--6.

Japkowicz , N. , Myers , C. , and Gluck , M. A . 1995. A novelty detection approach to classification . In Proceedings of the International Joint Conference on Artificial Intelligence. 518--523 . Japkowicz, N., Myers, C., and Gluck, M. A. 1995. A novelty detection approach to classification. In Proceedings of the International Joint Conference on Artificial Intelligence. 518--523.

Javitz , H. S. and Valdes , A . 1991. The SRI IDES statistical anomaly detector . In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society. Javitz, H. S. and Valdes, A. 1991. The SRI IDES statistical anomaly detector. In Proceedings of the IEEE Symposium on Research in Security and Privacy. IEEE Computer Society.

10.1016/S0167-8655(00)00131-8

10.1145/502512.502554

10.1145/1150402.1150429

Jolliffe , I. T. 2002. Principal Component Analysis , 2 nd Ed. Springer . Jolliffe, I. T. 2002. Principal Component Analysis, 2nd Ed. Springer.

10.1145/375663.375673

10.1145/775047.775092

10.1273/cbij.3.30

10.1006/jpdc.1997.1404

Kearns , M. J. 1990. Computational Complexity of Machine Learning . MIT Press . Kearns, M. J. 1990. Computational Complexity of Machine Learning. MIT Press.

10.5555/1201768.1201772

10.1145/775047.775128

10.1145/1014052.1014077

Keogh , E. and Smyth , P . 1997. A probabilistic approach to fast pattern matching in time series databases . In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, D. Heckerman, H. Mannila, D. Pregibon, and R. Uthurusamy, Eds. AAAI Press, 24--30 . Keogh, E. and Smyth, P. 1997. A probabilistic approach to fast pattern matching in time series databases. In Proceedings of the 3rd International Conference on Knowledge Discovery and Data Mining, D. Heckerman, H. Mannila, D. Pregibon, and R. Uthurusamy, Eds. AAAI Press, 24--30.

King , S. , King , D., P. Anuzis , K. A. , Tarassenko , L. , Hayton , P. , and Utete , S . 2002. The use of novelty detection techniques for monitoring high-integrity plant . In Proceedings of the International Conference on Control Applications. vol. 1 ., 221--226. King, S., King, D., P. Anuzis, K. A., Tarassenko, L., Hayton, P., and Utete, S. 2002. The use of novelty detection techniques for monitoring high-integrity plant. In Proceedings of the International Conference on Control Applications. vol. 1., 221--226.

10.1080/00401706.1979.10489749

Knorr , E. M. and Ng , R. T . 1997. A unified approach for mining outliers . In Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research. IBM Press, 11 . Knorr, E. M. and Ng, R. T. 1997. A unified approach for mining outliers. In Proceedings of the Conference of the Centre for Advanced Studies on Collaborative Research. IBM Press, 11.

Knorr , E. M. and Ng , R. T . 1998. Algorithms for mining distance-based outliers in large datasets . In Proceedings of the 24rd International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 392--403 . Knorr, E. M. and Ng, R. T. 1998. Algorithms for mining distance-based outliers in large datasets. In Proceedings of the 24rd International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 392--403.

Knorr E. M. and Ng R. T. 1999. Finding intensional knowledge of distance-based outliers. VLDB J. 211--222. Knorr E. M. and Ng R. T. 1999. Finding intensional knowledge of distance-based outliers. VLDB J. 211--222.

10.1007/s007780050006

10.1109/72.870046

Kohonen , T. , Ed. 1997. Self-Organizing Maps . Springer-Verlag . Kohonen, T., Ed. 1997. Self-Organizing Maps. Springer-Verlag.

Kojima , K. and Ito , K . 1999. Autonomous learning of novel patterns by utilizing chaotic dynamics . In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Vol. 1 . IEEE, 284--289. Kojima, K. and Ito, K. 1999. Autonomous learning of novel patterns by utilizing chaotic dynamics. In Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics. Vol. 1. IEEE, 284--289.

10.1109/52.605929

Kou , Y. , Lu , C.-T. , and Chen , D . 2006. Spatial weighted outlier detection . In Proceedings of the SIAM Conference on Data Mining. Kou, Y., Lu, C.-T., and Chen, D. 2006. Spatial weighted outlier detection. In Proceedings of the SIAM Conference on Data Mining.

Kruegel , C. , Mutz , D. , Robertson , W. , and Valeur , F . 2003. Bayesian event classification for intrusion detection . In Proceedings of the 19th Annual Computer Security Applications Conference. IEEE Computer Society, 14 . Kruegel, C., Mutz, D., Robertson, W., and Valeur, F. 2003. Bayesian event classification for intrusion detection. In Proceedings of the 19th Annual Computer Security Applications Conference. IEEE Computer Society, 14.

10.1145/508791.508835

10.1145/948109.948144

10.1109/MDSO.2005.53

Labib , K. and Vemuri , R . 2002 . NSOM: A real-time network-based intrusion detection using self-organizing maps. Netw. Security. Labib, K. and Vemuri, R. 2002. NSOM: A real-time network-based intrusion detection using self-organizing maps. Netw. Security.

10.1145/1080091.1080118

Lane , T. and Brodley , C. E . 1997a. An application of machine learning to anomaly detection . In Proceedings of the Conference on 20th NIST-NCSC National Information Systems Security Conference. 366--380 . Lane, T. and Brodley, C. E. 1997a. An application of machine learning to anomaly detection. In Proceedings of the Conference on 20th NIST-NCSC National Information Systems Security Conference. 366--380.

Lane , T. and Brodley , C. E . 1997b. Sequence matching and learning in anomaly detection for computer security . In Proceedings of the Conference on AI Approaches to Fraud Detection and Risk Management, Fawcett, Haimowitz, Provost, and Stolfo, Eds. AAAI Press, 43--49 . Lane, T. and Brodley, C. E. 1997b. Sequence matching and learning in anomaly detection for computer security. In Proceedings of the Conference on AI Approaches to Fraud Detection and Risk Management, Fawcett, Haimowitz, Provost, and Stolfo, Eds. AAAI Press, 43--49.

10.1145/322510.322526

10.5555/645328.650009

Laurikkala , J. , Juhola , M. , and Kentala ., E. 2000 . Informal identification of outliers in medical data . In Proceedings of the 5<sup>th</sup> International Workshop on Intelligent Data Analysis in Medicine and Pharmacology. 20--24 . Laurikkala, J., Juhola, M., and Kentala., E. 2000. Informal identification of outliers in medical data. In Proceedings of the 5<sup>th</sup> International Workshop on Intelligent Data Analysis in Medicine and Pharmacology. 20--24.

Lazarevic , A. , Ertoz , L. , Kumar , V. , Ozgur , A. , and Srivastava , J . 2003. A comparative study of anomaly detection schemes in network intrusion detection . In Proceedings of the SIAM International Conference on Data Mining. (SIAM). Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., and Srivastava, J. 2003. A comparative study of anomaly detection schemes in network intrusion detection. In Proceedings of the SIAM International Conference on Data Mining. (SIAM).

Lee , W. and Stolfo , S . 1998. Data mining approaches for intrusion detection . In Proceedings of the 7th USENIX Security Symposium. Lee, W. and Stolfo, S. 1998. Data mining approaches for intrusion detection. In Proceedings of the 7th USENIX Security Symposium.

Lee , W. , Stolfo , S. , and Chan , P . 1997. Learning patterns from UNIX process execution traces for intrusion detection . In Proceedings of the AAAI Workshop on AI Methods in Fraud and Risk Management. Lee, W., Stolfo, S., and Chan, P. 1997. Learning patterns from UNIX process execution traces for intrusion detection. In Proceedings of the AAAI Workshop on AI Methods in Fraud and Risk Management.

10.1023/A:1006624031083

Lee , W. and Xiang , D . 2001. Information-theoretic measures for anomaly detection . In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 130 . Lee, W. and Xiang, D. 2001. Information-theoretic measures for anomaly detection. In Proceedings of the IEEE Symposium on Security and Privacy. IEEE Computer Society, 130.

Li M. and Vitanyi P. M. B. 1993. An Introduction to Kolmogorov Complexity and Its Applications. Springer-Verlag. Li M. and Vitanyi P. M. B. 1993. An Introduction to Kolmogorov Complexity and Its Applications. Springer-Verlag.

10.1016/S0167-8655(01)00133-7

10.1109/CBMS.2005.34

Lin , S. and Brown , D. E . 2003. An outlier-based data association method for linking criminal incidents . In Proceedings of the 3rd SIAM Data Mining Conference. Lin, S. and Brown, D. E. 2003. An outlier-based data association method for linking criminal incidents. In Proceedings of the 3rd SIAM Data Mining Conference.

10.1002/sim.4780100906

Lu , C.-T. , Chen , D. , and Kou , Y . 2003. Algorithms for spatial outlier detection . In Proceedings of the 3rd International Conference on Data Mining. 597--600 . Lu, C.-T., Chen, D., and Kou, Y. 2003. Algorithms for spatial outlier detection. In Proceedings of the 3rd International Conference on Data Mining. 597--600.

10.1145/956750.956828

Ma , J. and Perkins , S . 2003b. Time-series novelty detection using one-class support vector machines . In Proceedings of the International Joint Conference on Neural Networks. Vol. 3 . 1741--1745. Ma, J. and Perkins, S. 2003b. Time-series novelty detection using one-class support vector machines. In Proceedings of the International Joint Conference on Neural Networks. Vol. 3. 1741--1745.

10.1093/bioinformatics/btl433

10.1145/775047.775102

Mahoney , M. V. and Chan , P. K . 2003. Learning rules for anomaly detection of hostile network traffic . In Proceedings of the 3rd IEEE International Conference on Data Mining. IEEE Computer Society, 601 . Mahoney, M. V. and Chan, P. K. 2003. Learning rules for anomaly detection of hostile network traffic. In Proceedings of the 3rd IEEE International Conference on Data Mining. IEEE Computer Society, 601.

Mahoney M. V. Chan P. K. and Arshad M. H. 2003. A machine learning approach to anomaly detection. Tech. rep. CS--2003--06 Department of Computer Science Florida Institute of Technology Melbourne. Mahoney M. V. Chan P. K. and Arshad M. H. 2003. A machine learning approach to anomaly detection. Tech. rep. CS--2003--06 Department of Computer Science Florida Institute of Technology Melbourne.

Manevitz , L. M. and Yousef , M . 2000. Learning from positive data for document classification using neural networks . In Proceedings of the 2nd Bar-Ilan Workshop on Knowledge Discovery and Learning. Manevitz, L. M. and Yousef, M. 2000. Learning from positive data for document classification using neural networks. In Proceedings of the 2nd Bar-Ilan Workshop on Knowledge Discovery and Learning.

10.5555/944790.944808

10.1109/MCOM.2002.1039860

Manson , G. 2002 . Identifying damage sensitive, environment insensitive features for damage detection . In Proceedings of IES Conference. Manson, G. 2002. Identifying damage sensitive, environment insensitive features for damage detection. In Proceedings of IES Conference.

Manson , G. , Pierce , G. , and Worden , K . 2001. On the long-term stability of normal conditions for damage detection in a composite panel . In Proceedings of the 4th International Conference on Damage Assessment of Structures . Cardiff, UK. Manson, G., Pierce, G., and Worden, K. 2001. On the long-term stability of normal conditions for damage detection in a composite panel. In Proceedings of the 4th International Conference on Damage Assessment of Structures. Cardiff, UK.

Manson , G. , Pierce , S. G. , Worden , K. , Monnier , T. , Guy , P. , and Atherton , K . 2000. Long-term stability of normal condition data for novelty detection . In Proceedings of the Conference on Smart Structures and Integrated Systems. 323--334 . Manson, G., Pierce, S. G., Worden, K., Monnier, T., Guy, P., and Atherton, K. 2000. Long-term stability of normal condition data for novelty detection. In Proceedings of the Conference on Smart Structures and Integrated Systems. 323--334.

10.1145/366173.366197

10.5555/647593.728889

10.1016/j.sigpro.2003.07.018

10.1016/j.sigpro.2003.07.019

Marsland , S. , Nehmzow , U. , and Shapiro , J . 1999. A model of habituation applied to mobile robots . In Proceedings of Towards Intelligent Mobile Robots Conference. Department of Computer Science , Manchester University, Technical rep. UMCS-99-3-1. Marsland, S., Nehmzow, U., and Shapiro, J. 1999. A model of habituation applied to mobile robots. In Proceedings of Towards Intelligent Mobile Robots Conference. Department of Computer Science, Manchester University, Technical rep. UMCS-99-3-1.

Marsland , S. , Nehmzow , U. , and Shapiro , J . 2000a. Novelty detection for robot neotaxis . In Proceedings of the 2nd International Symposium on Neural Compuatation. 554--559 . Marsland, S., Nehmzow, U., and Shapiro, J. 2000a. Novelty detection for robot neotaxis. In Proceedings of the 2nd International Symposium on Neural Compuatation. 554--559.

Marsland , S. , Nehmzow , U. , and Shapiro , J . 2000b. A real-time novelty detector for a mobile robot . In Proceedings of the EUREL Conference on Advanced Robotics Systems. Marsland, S., Nehmzow, U., and Shapiro, J. 2000b. A real-time novelty detector for a mobile robot. In Proceedings of the EUREL Conference on Advanced Robotics Systems.

10.1109/81.269061

10.1109/72.661127

10.1145/347090.347123

McNeil A. 1999. Extreme value theory for risk managers. In Internal Modelling and CAD II 93--113. McNeil A. 1999. Extreme value theory for risk managers. In Internal Modelling and CAD II 93--113.

Mingming , N. Y. 2000 . Probabilistic networks with undirected links for anomaly detection . In Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop. 175--179 . Mingming, N. Y. 2000. Probabilistic networks with undirected links for anomaly detection. In Proceedings of the IEEE Systems, Man, and Cybernetics Information Assurance and Security Workshop. 175--179.

Motulsky , H. 1995 . Intuitive Biostatistics: Choosing a Statistical Test . Oxford University Press , Chapter 37. Motulsky, H. 1995. Intuitive Biostatistics: Choosing a Statistical Test. Oxford University Press, Chapter 37.

Moya , M. , Koch , M. , and Hostetler , L . 1993. One-class classifier networks for target recognition applications . In Proceedings of the World Congress on Neural Networks, International Neural Network Society. 797--801 . Moya, M., Koch, M., and Hostetler, L. 1993. One-class classifier networks for target recognition applications. In Proceedings of the World Congress on Neural Networks, International Neural Network Society. 797--801.

10.1016/S0893-6080(01)00097-1

Nairac , A. , Corbett-Clark , T. , Ripley , R. , Townsend , N. , and Tarassenko , L . 1997. Choosing an appropriate model for novelty detection . In Proceedings of the 5th IEEE International Conference on Artificial Neural Networks. 227--232 . Nairac, A., Corbett-Clark, T., Ripley, R., Townsend, N., and Tarassenko, L. 1997. Choosing an appropriate model for novelty detection. In Proceedings of the 5th IEEE International Conference on Artificial Neural Networks. 227--232.

10.5555/1275794.1275800

Ng , R. T. and Han , J . 1994. Efficient and effective clustering methods for spatial data mining . In Proceedings of the 20th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 144--155 . Ng, R. T. and Han, J. 1994. Efficient and effective clustering methods for spatial data mining. In Proceedings of the 20th International Conference on Very Large Data Bases. Morgan Kaufmann Publishers Inc., 144--155.

10.1145/956750.956831

Odin , T. and Addison , D . 2000. Novelty detection using neural network technology . In Proceedings of the COMADEN Conference. Odin, T. and Addison, D. 2000. Novelty detection using neural network technology. In Proceedings of the COMADEN Conference.

10.1145/956750.956847

10.1007/s10618-005-0014-6

10.1007/11604655_61

Papadimitriou , S. , Kitagawa , H. , Gibbons , P. B. , and Faloutsos , C . 2002 . Loci: Fast outlier detection using the local correlation integral. Tech. rep. IRP-TR-02-09, Intel Research Laboratory. Papadimitriou, S., Kitagawa, H., Gibbons, P. B., and Faloutsos, C. 2002. Loci: Fast outlier detection using the local correlation integral. Tech. rep. IRP-TR-02-09, Intel Research Laboratory.

10.1162/neco.1996.8.2.260

10.1214/aoms/1177704472

10.1016/j.comnet.2007.02.001

Petsche , T. , Marcantonio , A. , Darken , C. , Hanson , S. , Kuhn , G. , and Santoso , I . 1996. A neural network autoassociator for induction motor failure prediction . In Proceedings of the Conference on Advances in Neural Information Processing. vol. 8 . 924--930. Petsche, T., Marcantonio, A., Darken, C., Hanson, S., Kuhn, G., and Santoso, I. 1996. A neural network autoassociator for induction motor failure prediction. In Proceedings of the Conference on Advances in Neural Information Processing. vol. 8. 924--930.

Phoha , V. V. 2002. The Springer Internet Security Dictionary . Springer-Verlag . Phoha, V. V. 2002. The Springer Internet Security Dictionary. Springer-Verlag.

10.1145/1007730.1007738

10.1007/11760146_111

10.1214/aos/1176343003

Pires , A. and Santos-Pereira , C . 2005. Using clustering and robust estimators to detect outliers in multivariate data . In Proceedings of the International Conference on Robust Statistics. Pires, A. and Santos-Pereira, C. 2005. Using clustering and robust estimators to detect outliers in multivariate data. In Proceedings of the International Conference on Robust Statistics.

Platt , J. 2000. Probabilistic Outputs for Support Vector Machines and Comparison to Regularized Likelihood Methods . In Advances in Large Margin Classifiers , A. Smola, P. Bartlett, B. Schoelkopf, and D. Schuurmans, Eds. MIT Press , 61--74. Platt, J. 2000. Probabilistic Outputs for Support Vector Machines and Comparison to Regularized Likelihood Methods. In Advances in Large Margin Classifiers, A. Smola, P. Bartlett, B. Schoelkopf, and D. Schuurmans, Eds. MIT Press, 61--74.

Pokrajac , D. , Lazarevic , A. , and Latecki , L. J . 2007. Incremental local outlier detection for data streams . In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining. Pokrajac, D., Lazarevic, A., and Latecki, L. J. 2007. Incremental local outlier detection for data streams. In Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining.

Porras , P. A. and Neumann , P. G . 1997. EMERALD: Event monitoring enabling responses to anomalous live disturbances . In Proceedings of the 20th NIST-NCSC National Information Systems Security Conference. 353--365 . Porras, P. A. and Neumann, P. G. 1997. EMERALD: Event monitoring enabling responses to anomalous live disturbances. In Proceedings of the 20th NIST-NCSC National Information Systems Security Conference. 353--365.

Portnoy , L. , Eskin , E. , and Stolfo , S . 2001. Intrusion detection with unlabeled data using clustering . In Proceedings of the ACM Workshop on Data Mining Applied to Security. Portnoy, L., Eskin, E., and Stolfo, S. 2001. Intrusion detection with unlabeled data using clustering. In Proceedings of the ACM Workshop on Data Mining Applied to Security.

10.1111/j.1365-2966.2006.10327.x

Qin , M. and Hwang , K . 2004. Frequent episode rules for Internet anomaly detection . In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications. IEEE Computer Society. Qin, M. and Hwang, K. 2004. Frequent episode rules for Internet anomaly detection. In Proceedings of the 3rd IEEE International Symposium on Network Computing and Applications. IEEE Computer Society.

Ramadas , M. , Ostermann , S. , and Tjaden , B. C . 2003. Detecting anomalous network traffic with self-organizing maps . In Proceedings of the Conference on Recent Advances in Intrusion Detection. 36--54 . Ramadas, M., Ostermann, S., and Tjaden, B. C. 2003. Detecting anomalous network traffic with self-organizing maps. In Proceedings of the Conference on Recent Advances in Intrusion Detection. 36--54.

10.1145/342009.335437

10.1109/TPAMI.2002.1033211

10.1049/ip-vis:19990428

Roberts , S. 2002 . Extreme value statistics for novelty detection in biomedical signal processing . In Proceedings of the 1st International Conference on Advances in Medical Signal and Information Processing. 166--172 . Roberts, S. 2002. Extreme value statistics for novelty detection in biomedical signal processing. In Proceedings of the 1st International Conference on Advances in Medical Signal and Information Processing. 166--172.

10.1162/neco.1994.6.2.270

10.1080/00401706.1983.10487848

Roth , V. 2004 . Outlier detection with one-class kernel Fisher discriminants . In Proceedings of the Conference on Advances in Neural Information Processing Systems (NIPS). Roth, V. 2004. Outlier detection with one-class kernel Fisher discriminants. In Proceedings of the Conference on Advances in Neural Information Processing Systems (NIPS).

10.1162/089976606775774679

Rousseeuw P. J. and Leroy A. M. 1987. Robust Regression and Outlier Detection. John Wiley &amp; Sons Inc. Rousseeuw P. J. and Leroy A. M. 1987. Robust Regression and Outlier Detection. John Wiley &amp; Sons Inc.

10.1145/223784.223794

Ruotolo , R. and Surace , C . 1997. A statistical approach to damage detection through vibration monitoring . In Proceedings of the 5th Pan-American Congress of Applied Mechanics. Ruotolo, R. and Surace, C. 1997. A statistical approach to damage detection through vibration monitoring. In Proceedings of the 5th Pan-American Congress of Applied Mechanics.

Salvador S. and Chan P. 2003. Learning states and rules for time-series anomaly detection. Tech. rep. CS--2003--05 Department of Computer Science Florida Institute of Technology Melbourne. Salvador S. and Chan P. 2003. Learning states and rules for time-series anomaly detection. Tech. rep. CS--2003--05 Department of Computer Science Florida Institute of Technology Melbourne.

Sarawagi , S. , Agrawal , R. , and Megiddo , N . 1998. Discovery-driven exploration of OLAP data cubes . In Proceedings of the 6th International Conference on Extending Database Technology. Springer-Verlag, 168--182 . Sarawagi, S., Agrawal, R., and Megiddo, N. 1998. Discovery-driven exploration of OLAP data cubes. In Proceedings of the 6th International Conference on Extending Database Technology. Springer-Verlag, 168--182.

Sargor , C. 1998 . Statistical anomaly detection for link-state routing protocols . In Proceedings of the 6th International Conference on Network Protocols. IEEE Computer Society, 62 . Sargor, C. 1998. Statistical anomaly detection for link-state routing protocols. In Proceedings of the 6th International Conference on Network Protocols. IEEE Computer Society, 62.

Saunders , R. and Gero , J . 2000. The importance of being emergent . In Proceedings of the Conference on Artificial Intelligence in Design. Saunders, R. and Gero, J. 2000. The importance of being emergent. In Proceedings of the Conference on Artificial Intelligence in Design.

Scarth , G. , McIntyre , M. , Wowk , B. , and Somorjai , R . 1995. Detection of novelty in functional images using fuzzy clustering . In Proceedings of the 3rd Meeting of the International Society for Magnetic Resonance in Medicine. 238 . Scarth, G., McIntyre, M., Wowk, B., and Somorjai, R. 1995. Detection of novelty in functional images using fuzzy clustering. In Proceedings of the 3rd Meeting of the International Society for Magnetic Resonance in Medicine. 238.

10.1162/089976601750264965

Scott , S. L. 2001 . Detecting network intrusion using a Markov modulated nonhomogeneous Poisson Process . Journal of the American Statistical Association. Scott, S. L. 2001. Detecting network intrusion using a Markov modulated nonhomogeneous Poisson Process. Journal of the American Statistical Association.

Sebyala , A. A. , Olukemi , T. , and Sacks , L . 2002. Active platform security through intrusion detection using naive Bayesian network for anomaly detection . In Proceedings of the London Communications Symposium. Sebyala, A. A., Olukemi, T., and Sacks, L. 2002. Active platform security through intrusion detection using naive Bayesian network for anomaly detection. In Proceedings of the London Communications Symposium.

10.1145/775047.775103

Sheikholeslami , G. , Chatterjee , S. , and Zhang , A . 1998 . Wavecluster: A multi-resolution clustering approach for very large spatial databases. In Proceedings of the 24rd International Conference on Very Large Databases . Morgan Kaufmann Publishers Inc ., 428--439. Sheikholeslami, G., Chatterjee, S., and Zhang, A. 1998. Wavecluster: A multi-resolution clustering approach for very large spatial databases. In Proceedings of the 24rd International Conference on Very Large Databases. Morgan Kaufmann Publishers Inc., 428--439.

10.1145/502512.502567

Shewhart , W. A. 1931. Economic Control of Quality of Manufactured Product . D. Van Nostrand Company . Shewhart, W. A. 1931. Economic Control of Quality of Manufactured Product. D. Van Nostrand Company.

Shyu , M.-L. , Chen , S.-C. , Sarinnapakorn , K. , and Chang , L . 2003. A novel anomaly detection scheme-based on principal component classifier . In Proceedings of the 3rd IEEE International Conference on Data Mining. 353--365 . Shyu, M.-L., Chen, S.-C., Sarinnapakorn, K., and Chang, L. 2003. A novel anomaly detection scheme-based on principal component classifier. In Proceedings of the 3rd IEEE International Conference on Data Mining. 353--365.

10.1145/967900.967992

10.1109/TKDE.2004.1269665

Smith , R. , Bivens , A. , Embrechts , M. , Palagiri , C. , and Szymanski , B . 2002. Clustering approaches for anomaly-based intrusion detection . In Proceedings of the Intelligent Engineering Systems through Artificial Neural Networks. ASME Press, 579--584 . Smith, R., Bivens, A., Embrechts, M., Palagiri, C., and Szymanski, B. 2002. Clustering approaches for anomaly-based intrusion detection. In Proceedings of the Intelligent Engineering Systems through Artificial Neural Networks. ASME Press, 579--584.

10.1109/49.339929

Sohn , H. , Worden , K. , and Farrar , C . 2001. Novelty detection under changing environmental conditions . In Proceedings of the 8th Annual SPIE International Symposium on Smart Structures and Materials. Sohn, H., Worden, K., and Farrar, C. 2001. Novelty detection under changing environmental conditions. In Proceedings of the 8th Annual SPIE International Symposium on Smart Structures and Materials.

10.1373/clinchem.2005.058339

10.1109/TSMCC.2002.807277

Song , S. , Shin , D. , and Yoon , E . 2001. Analysis of novelty detection properties of auto-associators . In Proceedings of the Conference on Condition Monitoring and Diagnostic Engineering Management. 577--584 . Song, S., Shin, D., and Yoon, E. 2001. Analysis of novelty detection properties of auto-associators. In Proceedings of the Conference on Condition Monitoring and Diagnostic Engineering Management. 577--584.

10.1109/TKDE.2007.1009

Soule , A. , Salamatian , K. , and Taft , N . 2005. Combining filtering and statistical methods for anomaly detection . In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. ACM, 1--14 . Soule, A., Salamatian, K., and Taft, N. 2005. Combining filtering and statistical methods for anomaly detection. In Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. ACM, 1--14.

Spence , C. , Parra , L. , and Sajda , P . 2001. Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model . In Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. IEEE Computer Society, 3. Spence, C., Parra, L., and Sajda, P. 2001. Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis. IEEE Computer Society, 3.

10.1109/AERO.2006.1656136

Srivastava , A. and Zane-Ulman , B . 2005. Discovering recurring anomalies in text reports regarding complex space systems . In Proceedings of the IEEE Aerospace Conference, 3853--3862 . Srivastava, A. and Zane-Ulman, B. 2005. Discovering recurring anomalies in text reports regarding complex space systems. In Proceedings of the IEEE Aerospace Conference, 3853--3862.

10.1109/5326.827457

10.1080/00401706.1972.10488930

10.5555/1046920.1058109

10.1109/60.507183

Subramaniam , S. , Palpanas , T. , Papadopoulos , D. , Kalogeraki , V. , and Gunopulos , D . 2006. Online outlier detection in sensor data using non-parametric models . In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB). VLDB Endowment, 187--198 . Subramaniam, S., Palpanas, T., Papadopoulos, D., Kalogeraki, V., and Gunopulos, D. 2006. Online outlier detection in sensor data using non-parametric models. In Proceedings of the 32nd International Conference on Very Large Data Bases (VLDB). VLDB Endowment, 187--198.

Sun , H. , Bao , Y. , Zhao , F. , Yu , G. , and Wang , D . 2004. CD-trees: An efficient index structure for outlier detection . In Proceedings of the 5th International Conference on Web-Age Information Management (WAIM). 600--609 . Sun, H., Bao, Y., Zhao, F., Yu, G., and Wang, D. 2004. CD-trees: An efficient index structure for outlier detection. In Proceedings of the 5th International Conference on Web-Age Information Management (WAIM). 600--609.

10.1109/ICDM.2005.103

Sun , J. , Xie , Y. , Zhang , H. , and Faloutsos , C . 2007. Less is more: Compact matrix representation of large sparse graphs . In Proceedings of the 7th SIAM International Conference on Data Mining. Sun, J., Xie, Y., Zhang, H., and Faloutsos, C. 2007. Less is more: Compact matrix representation of large sparse graphs. In Proceedings of the 7th SIAM International Conference on Data Mining.

Sun , P. and Chawla , S . 2004. On local spatial outliers . In Proceedings of the 4th IEEE International Conference on Data Mining. 209--216 . Sun, P. and Chawla, S. 2004. On local spatial outliers. In Proceedings of the 4th IEEE International Conference on Data Mining. 209--216.

10.1007/s10115-005-0200-2

Sun , P. , Chawla , S. , and Arunasalam , B . 2006. Mining for outliers in sequential databases . In Proceedings of the SIAM International Conference on Data Mining. Sun, P., Chawla, S., and Arunasalam, B. 2006. Mining for outliers in sequential databases. In Proceedings of the SIAM International Conference on Data Mining.

Surace , C. and Worden , K . 1998. A novelty detection method to diagnose damage in structures: An application to an offshore platform . In Proceedings of the 8th International Conference of Off-Shore and Polar Engineering. vol. 4 . Colorado, 64--70. Surace, C. and Worden, K. 1998. A novelty detection method to diagnose damage in structures: An application to an offshore platform. In Proceedings of the 8th International Conference of Off-Shore and Polar Engineering. vol. 4. Colorado, 64--70.

Surace , C. , Worden , K. , and Tomlinson , G . 1997. A novelty detection approach to diagnose damage in a cracked beam . In Proceedings of the SPIE. vol. 3089 . 947--953. Surace, C., Worden, K., and Tomlinson, G. 1997. A novelty detection approach to diagnose damage in a cracked beam. In Proceedings of the SPIE. vol. 3089. 947--953.

Suzuki , E. , Watanabe , T. , Yokoi , H. , and Takabayashi , K . 2003. Detecting interesting exceptions from medical test data with visual summarization . In Proceedings of the 3rd IEEE International Conference on Data Mining. 315--322 . Suzuki, E., Watanabe, T., Yokoi, H., and Takabayashi, K. 2003. Detecting interesting exceptions from medical test data with visual summarization. In Proceedings of the 3rd IEEE International Conference on Data Mining. 315--322.

Sykacek , P. 1997 . Equivalent error bars for neural network classifiers trained by Bayesian inference . In Proceedings of the European Symposium on Artificial Neural Networks. 121--126 . Sykacek, P. 1997. Equivalent error bars for neural network classifiers trained by Bayesian inference. In Proceedings of the European Symposium on Artificial Neural Networks. 121--126.

Tan P.-N. Steinbach M. and Kumar V. 2005. Introduction to Data Mining. Addison-Wesley. Tan P.-N. Steinbach M. and Kumar V. 2005. Introduction to Data Mining. Addison-Wesley.

10.1145/1281192.1281267

Tang , J. , Chen , Z. , chee Fu , A. W. , and W. Cheung , D. 2002. Enhancing effectiveness of outlier detections for low density patterns . In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 535--548 . Tang, J., Chen, Z., chee Fu, A. W., and W. Cheung, D. 2002. Enhancing effectiveness of outlier detections for low density patterns. In Proceedings of the Pacific-Asia Conference on Knowledge Discovery and Data Mining. 535--548.

Taniguchi , M. , Haft , M. , Hollmn , J. , and Tresp , V . 1998. Fraud detection in communications networks using neural and probabilistic methods . In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. vol. 2 . IEEE Computer Society, 1241--1244. Taniguchi, M., Haft, M., Hollmn, J., and Tresp, V. 1998. Fraud detection in communications networks using neural and probabilistic methods. In Proceedings of the IEEE International Conference on Acoustics, Speech and Signal Processing. vol. 2. IEEE Computer Society, 1241--1244.

10.1145/1150402.1150447

10.1049/cp:19950597

Tax , D. and Duin , R . 1999a. Data domain description using support vectors . In Proceedings of the European Symposium on Artificial Neural Networks, M. Verleysen, Ed., 251--256 . Tax, D. and Duin, R. 1999a. Data domain description using support vectors. In Proceedings of the European Symposium on Artificial Neural Networks, M. Verleysen, Ed., 251--256.

10.1016/S0167-8655(99)00087-2

Tax , D. M. J. 2001. One-class classification ; concept-learning in the absence of counter-examples. Ph.D. thesis, Delft University of Technology . Tax, D. M. J. 2001. One-class classification; concept-learning in the absence of counter-examples. Ph.D. thesis, Delft University of Technology.

Teng , H. , Chen , K. , and Lu , S . 1990. Adaptive real-time anomaly detection using inductively generated sequential patterns . In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, 278--284 . Teng, H., Chen, K., and Lu, S. 1990. Adaptive real-time anomaly detection using inductively generated sequential patterns. In Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy. IEEE Computer Society Press, 278--284.

Theiler , J. and Cai , D. M . 2003. Resampling approach for anomaly detection in multispectral images . In Proceedings of the SPIE. vol. 5093 , 230--240. Theiler, J. and Cai, D. M. 2003. Resampling approach for anomaly detection in multispectral images. In Proceedings of the SPIE. vol. 5093, 230--240.

Thompson , B., II, R. M. , Choi , J. , El-Sharkawi , M. , Huang , M. , and Bunje , C . 2002. Implicit learning in auto-encoder novelty assessment . In Proceedings of the International Joint Conference on Neural Networks. 2878--2883 . Thompson, B., II, R. M., Choi, J., El-Sharkawi, M., Huang, M., and Bunje, C. 2002. Implicit learning in auto-encoder novelty assessment. In Proceedings of the International Joint Conference on Neural Networks. 2878--2883.

10.1109/TSP.2003.814797

10.1093/biostatistics/kxl005

Tomlins S. A. Rhodes D. R. Perner S. Dhanasekaran S. M. Mehra R. Sun X. W. Varambally S. Cao X. Tchinda J. Kuefer R. Lee C. Montie J. E. Shah R. Pienta K. J. Rubin M. and Chinnaiyan A. M. 2005. Recurrent fusion of tmprss2 and ets transcription factor genes in prostate cancer. Science 310 5748 603--611. Tomlins S. A. Rhodes D. R. Perner S. Dhanasekaran S. M. Mehra R. Sun X. W. Varambally S. Cao X. Tchinda J. Kuefer R. Lee C. Montie J. E. Shah R. Pienta K. J. Rubin M. and Chinnaiyan A. M. 2005. Recurrent fusion of tmprss2 and ets transcription factor genes in prostate cancer. Science 310 5748 603--611.

Torr , P. and Murray , D . 1993. Outlier detection and motion segmentation . In Proceedings of the SPIE. Sensor Fusion VI, S. Schenker, Ed. vol. 2059 . 432--443. Torr, P. and Murray, D. 1993. Outlier detection and motion segmentation. In Proceedings of the SPIE. Sensor Fusion VI, S. Schenker, Ed. vol. 2059. 432--443.

10.1093/biomet/87.4.789

Vaidya , J. and Clifton , C . 2004. Privacy-preserving outlier detection . In Proceedings of the 4th IEEE International Conference on Data Mining. 233--240 . Vaidya, J. and Clifton, C. 2004. Privacy-preserving outlier detection. In Proceedings of the 4th IEEE International Conference on Data Mining. 233--240.

10.5555/645838.670720

Vapnik , V. N. 1995. The Nature of Statistical Learning Theory . Springer-Verlag . Vapnik, V. N. 1995. The Nature of Statistical Learning Theory. Springer-Verlag.

Vasconcelos , G. , Fairhurst , M. , and Bisset , D . 1994. Recognizing novelty in classification tasks . In Proceedings of the Neural Information Processing Systems Workshop on Novelty Detection and Adaptive Systems Monitoring. Vasconcelos, G., Fairhurst, M., and Bisset, D. 1994. Recognizing novelty in classification tasks. In Proceedings of the Neural Information Processing Systems Workshop on Novelty Detection and Adaptive Systems Monitoring.

10.1016/0167-8655(94)00092-H

Vilalta , R. and Ma , S . 2002. Predicting rare events in temporal domains . In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 474 . Vilalta, R. and Ma, S. 2002. Predicting rare events in temporal domains. In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 474.

Vinueza A. and Grudic G. 2004. Unsupervised outlier detection and semi-supervised learning. Tech. rep. CU-CS-976-04 University of Colorado at Boulder. Vinueza A. and Grudic G. 2004. Unsupervised outlier detection and semi-supervised learning. Tech. rep. CU-CS-976-04 University of Colorado at Boulder.

Wei , L. , Qian , W. , Zhou , A. , and Jin , W . 2003. Hot: Hypergraph-based outlier test for categorical data . In Proceedings of the 7th Pacific-Asia Conference on Knowledge and Data Discovery. 399--410 . Wei, L., Qian, W., Zhou, A., and Jin, W. 2003. Hot: Hypergraph-based outlier test for categorical data. In Proceedings of the 7th Pacific-Asia Conference on Knowledge and Data Discovery. 399--410.

10.1142/S0129065795000251

Weiss , G. M. and Hirsh , H . 1998. Learning to predict rare events in event sequences . In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, R. Agrawal, P. Stolorz, and G. Piatetsky-Shapiro, Eds. AAAI Press, 359--363 . Weiss, G. M. and Hirsh, H. 1998. Learning to predict rare events in event sequences. In Proceedings of the 4th International Conference on Knowledge Discovery and Data Mining, R. Agrawal, P. Stolorz, and G. Piatetsky-Shapiro, Eds. AAAI Press, 359--363.

Whitehead , B. and Hoyt , W . 1993. A function approximation approach to anomaly detection in propulsion system test data . In Proceedings of the 29th AIAA/SAE/ASME/ASEE Joint Propulsion Conference. IEEE Computer Society. Whitehead, B. and Hoyt, W. 1993. A function approximation approach to anomaly detection in propulsion system test data. In Proceedings of the 29th AIAA/SAE/ASME/ASEE Joint Propulsion Conference. IEEE Computer Society.

Williams , G. , Baxter , R. , He , H. , Hawkins , S. , and Gu , L . 2002. A comparative study of RNN for outlier detection in data mining . In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 709 . Williams, G., Baxter, R., He, H., Hawkins, S., and Gu, L. 2002. A comparative study of RNN for outlier detection in data mining. In Proceedings of the IEEE International Conference on Data Mining. IEEE Computer Society, 709.

Wong , W.-K. , Moore , A. , Cooper , G. , and Wagner , M . 2002. Rule-based anomaly pattern detection for detecting disease outbreaks . In Proceedings of the 18th National Conference on Artificial Intelligence. MIT Press. http://www.cs.cmu.edu/~awm/antiterror. Wong, W.-K., Moore, A., Cooper, G., and Wagner, M. 2002. Rule-based anomaly pattern detection for detecting disease outbreaks. In Proceedings of the 18th National Conference on Artificial Intelligence. MIT Press. http://www.cs.cmu.edu/~awm/antiterror.

Wong , W.-K. , Moore , A. , Cooper , G. , and Wagner , M . 2003. Bayesian network anomaly pattern detection for disease outbreaks . In Proceedings of the 20th International Conference on Machine Learning. AAAI Press, 808--815 . Wong, W.-K., Moore, A., Cooper, G., and Wagner, M. 2003. Bayesian network anomaly pattern detection for disease outbreaks. In Proceedings of the 20th International Conference on Machine Learning. AAAI Press, 808--815.

10.1006/jsvi.1996.0747

10.1145/1150402.1150501

Wu , N. and Zhang , J . 2003. Factor analysis based anomaly detection . In Proceedings of the IEEE Workshop on Information Assurance. United States Military Academy. Wu, N. and Zhang, J. 2003. Factor analysis based anomaly detection. In Proceedings of the IEEE Workshop on Information Assurance. United States Military Academy.

Yairi , T. , Kato , Y. , and Hori , K . 2001. Fault detection by mining association rules from housekeeping data . In Proceedings of the International Symposium on Artificial Intelligence, Robotics and Automation in Space. Yairi, T., Kato, Y., and Hori, K. 2001. Fault detection by mining association rules from housekeeping data. In Proceedings of the International Symposium on Artificial Intelligence, Robotics and Automation in Space.

10.1145/502512.502570

10.1023/B:DAMI.0000023676.72185.7c

10.1002/qre.392

Yi , B.-K. , Sidiropoulos , N. , Johnson , T. , Jagadish , H. V. , Faloutsos , C. , and Biliris , A . 2000. Online data mining for co-evolving time sequences . In Proceedings of the 16th International Conference on Data Engineering. IEEE Computer Society, 13 . Yi, B.-K., Sidiropoulos, N., Johnson, T., Jagadish, H. V., Faloutsos, C., and Biliris, A. 2000. Online data mining for co-evolving time sequences. In Proceedings of the 16th International Conference on Data Engineering. IEEE Computer Society, 13.

Ypma A. and Duin R. 1998. Novelty detection using self-organizing maps. In Progress in Connectionist Based Information Systems. vol. 2. Springer 1322--1325. Ypma A. and Duin R. 1998. Novelty detection using self-organizing maps. In Progress in Connectionist Based Information Systems. vol. 2. Springer 1322--1325.

10.1007/s101150200013

10.5555/3225635.3225781

Zeevi A. J. Meir R. and Adler R. 1997. Time series prediction using mixtures of experts. In Advances in Neural Information Processing. vol. 9. MIT Press. Zeevi A. J. Meir R. and Adler R. 1997. Time series prediction using mixtures of experts. In Advances in Neural Information Processing. vol. 9. MIT Press.

10.1007/s10115-006-0020-z

10.1007/978-3-540-73871-8_16

Zhang , Z. , Li , J. , Manikopoulos , C. , Jorgenson , J. , and Ucles , J . 2001. Hide: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification . In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, 85--90 . Zhang, Z., Li, J., Manikopoulos, C., Jorgenson, J., and Ucles, J. 2001. Hide: A hierarchical network intrusion detection system using statistical preprocessing and neural network classification. In Proceedings of the IEEE Workshop on Information Assurance and Security. West Point, 85--90.

Zimmermann , J. and Mohay , G . 2006. Distributed intrusion detection in clusters based on non-interference . In Proceedings of the Australasian Workshops on Grid Computing and E-Research (ACSW Frontiers). Australian Computer Society, Inc., 89--95 . Zimmermann, J. and Mohay, G. 2006. Distributed intrusion detection in clusters based on non-interference. In Proceedings of the Australasian Workshops on Grid Computing and E-Research (ACSW Frontiers). Australian Computer Society, Inc., 89--95.