Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Anomaly detection

Known as: Anomaly, Deviation detection, Exception detection 
In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2014
Review
2014
Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS… Expand
  • table I
  • table II
  • figure 2
  • figure 1
  • table IV
Highly Cited
2010
Highly Cited
2010
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Review
2009
Review
2009
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many… Expand
  • figure 1
  • figure 2
  • table I
  • figure 3
  • figure 4
Review
2007
Review
2007
As advances in networking technology help to connect the distant corners of the globe and as the Internet continues to expand its… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Review
2003
Review
2003
Network anomaly detection is a vibrant research area. Researchers have approached this problem using various techniques such as… Expand
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Highly Cited
2003
Highly Cited
2003
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect… Expand
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Highly Cited
2003
Highly Cited
2003
Intrusion detection corresponds to a suite of techniques that are used to identify attacks against computers and network… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • figure 4
Highly Cited
2002
Highly Cited
2002
We develop anomaly detectors, i.e., detectors that do not presuppose a signature model of one or more dimensions, for three… Expand
Highly Cited
2002
Highly Cited
2002
Most current intrusion detection systems employ signature-based methods or data mining-based methods which rely on labeled… Expand
Highly Cited
2001
Highly Cited
2001
Anomaly detection is an essential component of protection mechanisms against novel attacks. We propose to use several information… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3