Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,778,859 papers from all fields of science
Search
Sign In
Create Free Account
Anomaly detection
Known as:
Anomaly
, Deviation detection
, Exception detection
In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
32 relations
Artificial immune system
Association rule learning
Cluster analysis
Computer forensics
Expand
Broader (2)
Data mining
Data security
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
A Posteriori Hyperspectral Anomaly Detection for Unlabeled Classification
Yulei Wang
,
Li-Chien Lee
,
+5 authors
Chein-I. Chang
IEEE Transactions on Geoscience and Remote…
2018
Corpus ID: 44070781
Anomaly detection (AD) generally finds targets that are spectrally distinct from their surrounding neighborhoods but cannot…
Expand
Highly Cited
2013
Highly Cited
2013
On minimal Z' explanations of the B->K*mu+mu- anomaly
R. Gauld
,
F. Goertz
,
U. Haisch
2013
Corpus ID: 118739716
Recently LHCb has announced a discrepancy of 3.7 sigma in one of the theoretically clean observables accessible through studies…
Expand
Highly Cited
2007
Highly Cited
2007
Regular Article – Experimental Physics THE EUROPEAN PHYSICAL JOURNAL C
2007
Corpus ID: 12469569
Highly Cited
2006
Highly Cited
2006
Applying Data Mining of Fuzzy Association Rules to Network Intrusion Detection
A. El-Semary
,
Janica Edmonds
,
Jesús González-Pino
,
Mauricio Papa
IEEE Information Assurance Workshop
2006
Corpus ID: 6233286
This paper describes the use of fuzzy logic in the implementation of an intelligent intrusion detection system. The system uses a…
Expand
Highly Cited
2006
Highly Cited
2006
Improving Quality of Search Results Clustering with Approximate Matrix Factorisations
S. Osinski
European Conference on Information Retrieval
2006
Corpus ID: 15330831
In this paper we show how approximate matrix factorisations can be used to organise document summaries returned by a search…
Expand
Highly Cited
2002
Highly Cited
2002
Indigenous exegesis: Exploring the interface between missionary methods and the rhetorical rhythms of Africa: Locating local reading resources in the academy
G. West
2002
Corpus ID: 190084506
What sense does it make to speak of indigenous exegesis? In some sense this article is an exegesis of this question and this…
Expand
Highly Cited
2000
Highly Cited
2000
RECENT DEEP EXPLORATION RESULTS AT THE MARGINS OF THE LARDERELLO TRAVALE GEOTHERMAL SYSTEM
A. Barelli
,
G. Bertini
,
G. Buonasorte
,
G. Cappetti
,
A. Fiordelisi
2000
Corpus ID: 73712379
Within the framework of research in the marginal areas of the Larderello–Travale geothermal system, several exploration wells…
Expand
Highly Cited
1991
Highly Cited
1991
Is there a low-pT “anomaly” in the pion momentum spectra from relativistic nuclear collisions?
J. Sollfrank
,
P. Koch
,
U. Heinz
1991
Corpus ID: 102486884
The influence of resonance production in relativistic hadron-hadron and nucleus-nucleus collisions, and their role in explaining…
Expand
Highly Cited
1989
Highly Cited
1989
Rockall Trough—Cretaceous or Late Palaeozoic?
D. Smythe
Scottish Journal of Geology
1989
Corpus ID: 73517257
Synopsis The Rockall Trough is the most southerly and widest part of the pre-Tertiary ‘proto North Atlantic’ rift zone running…
Expand
Highly Cited
1979
Highly Cited
1979
Low-Energy Pion Production at 0' with Heavy Ions from 125 to 400 MeV/Nucleon
W. Benenson
,
G. Bertsch
,
+10 authors
T. Ward
1979
Corpus ID: 56141941
The results of a systematic study of 0/sup 0/ pion production by heavy ions from 125 to 400 MeV/nucleon are presented. The…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE