Anomaly detection

Known as: Anomaly, Deviation detection, Exception detection 
In data mining, anomaly detection (also outlier detection) is the identification of items, events or observations which do not conform to an expected… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2013
Highly Cited
2013
Anomaly detection is being regarded as an unsupervised learning task as anomalies stem from adversarial or unlikely events with… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2010
Highly Cited
2010
A novel framework for anomaly detection in crowded scenes is presented. Three properties are identified as important for the… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
Identifying network anomalies is essential in enterprise and provider networks for diagnosing events, like attacks or failures… (More)
  • figure 1
  • figure 2
  • figure 3
  • table I
  • figure 4
Is this relevant?
Highly Cited
2007
Highly Cited
2007
When anomaly detection software is used as a data analysis tool, finding the hardest-to-detect anomalies is not the most critical… (More)
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Anomaly detection is an area that has received much attention in recent years. It has a wide variety of applications, including… (More)
  • figure 1
  • figure 2
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2003
Highly Cited
2003
Intrusion detection corresponds to a suite of techniques that are used to identify attacks against computers and network… (More)
Is this relevant?
Highly Cited
2003
Highly Cited
2003
The call stack of a program execution can be a very good information source for intrusion detection. There is no prior work on… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper introduces DIDUCE, a practical and effective tool that aids programmers in detecting complex program errors and… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
2001
Anomaly detection is an essential component of the protection mechanisms against novel attacks. In this paper, we propose to use… (More)
  • figure 1
  • figure 2
  • table 1
  • figure 3
Is this relevant?
Highly Cited
1999
Highly Cited
1999
The anomaly-detection problem can be formulated as one of learning to characterize the behaviors of an individual, system, or… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?