Skip to search formSkip to main contentSkip to account menu

Anomaly detection

Known as: Anomaly, Deviation detection, Exception detection 
In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The… 
Review
2014
Review
2014
Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS… 
Highly Cited
2012
Highly Cited
2012
Anomalies are data points that are few and different. As a result of these properties, we show that, anomalies are susceptible to… 
Highly Cited
2010
Highly Cited
2010
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the… 
Review
2009
Review
2009
Anomaly detection is an important problem that has been researched within diverse research areas and application domains. Many… 
Review
2003
Review
2003
  • M. ThottanC. Ji
  • IEEE Transactions on Signal Processing
  • 2003
  • Corpus ID: 18144675
Network anomaly detection is a vibrant research area. Researchers have approached this problem using various techniques such as… 
Highly Cited
2003
Highly Cited
2003
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect… 
Highly Cited
2003
Highly Cited
2003
Intrusion detection corresponds to a suite of techniques that are used to identify attacks against computers and network… 
Highly Cited
2002
Highly Cited
2002
We develop anomaly detectors, i.e., detectors that do not presuppose a signature model of one or more dimensions, for three… 
Highly Cited
2002
Highly Cited
2002
Most current intrusion detection systems employ signature-based methods or data mining-based methods which rely on labeled…