Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Anomaly detection

Known as: Anomaly, Deviation detection, Exception detection 
In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2019
Review
2019
Anomaly detection is an important problem that has been well-studied within diverse research areas and application domains. The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • table 1
Is this relevant?
Review
2019
Review
2019
Abstract Labeled data sets are necessary to train and evaluate anomaly-based network intrusion detection systems. This work… Expand
  • figure 1
  • table I
  • figure 2
  • figure 3
  • table II
Is this relevant?
Review
2019
Review
2019
Nowadays, there is a huge and growing concern about security in information and communication technology among the scientific… Expand
Is this relevant?
Review
2019
Review
2019
Abstract The comprehensive integration of instrumentation, communication, and control into physical systems has led to the study… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Review
2019
Review
2019
While machine learning and artificial intelligence have long been applied in networking research, the bulk of such works has… Expand
  • table 1
  • figure 1
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Review
2019
Review
2019
Abstract Network Anomaly Detection Systems (NADSs) are gaining a more important role in most network defense systems for… Expand
Is this relevant?
Review
2019
Review
2019
Abstract The advent of connected devices and omnipresence of Internet have paved way for intruders to attack networks, which… Expand
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Web-based vulnerabilities represent a substantial portion of the security exposures of computer networks. In order to detect… Expand
  • figure 1
  • figure 2
  • table 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
We develop anomaly detectors, i.e., detectors that do not presuppose a signature model of one or more dimensions, for three… Expand
Is this relevant?