-
1
-
-
68049121093
-
Anomaly detection - A survey
-
July
-
V. Chandola, A. Banerjee, and V. Kumar, "Anomaly Detection -A Survey," ACM Computing Surveys, vol. 41, no. 3, pp. 1-58, July 2009.
-
(2009)
ACM Computing Surveys
, vol.41
, Issue.3
, pp. 1-58
-
-
Chandola, V.1
Banerjee, A.2
Kumar, V.3
-
2
-
-
7544223741
-
A survey of outlier detection methodologies
-
V. Hodge and J. Austin, "A Survey of Outlier Detection Methodologies," Artificial Intelligence Rev., vol. 22, no. 2, pp. 85-126, 2004.
-
(2004)
Artificial Intelligence Rev
, vol.22
, Issue.2
, pp. 85-126
-
-
Hodge, V.1
Austin, J.2
-
3
-
-
32344452166
-
A comparative study of anomaly detection schemes in network intrusion detection
-
A. Lazarevic, L. Ertoz, V. Kumar, A. Ozgur, and J. Srivastava, "A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection," Proc. SIAM Int'l Conf. Data Mining, May 2003.
-
(2003)
Proc. SIAM Int'l Conf. Data Mining, May
-
-
Lazarevic, A.1
Ertoz, L.2
Kumar, V.3
Ozgur, A.4
Srivastava, J.5
-
4
-
-
84880174811
-
Detecting intrusions using system calls: Alternate data models
-
S. Forrest, C. Warrender, and B. Pearlmutter, "Detecting Intrusions Using System Calls: Alternate Data Models," Proc. IEEE Symp. Security and Privacy (ISRSP), pp. 133-145, 1999.
-
(1999)
Proc. IEEE Symp. Security and Privacy (ISRSP)
, pp. 133-145
-
-
Forrest, S.1
Warrender, C.2
Pearlmutter, B.3
-
5
-
-
0032313923
-
Intrusion detection using sequences of system calls
-
citeseer.ist.psu.edu/hofmeyr98intrusion.html
-
S.A. Hofmeyr, S. Forrest, and A. Somayaji, "Intrusion Detection Using Sequences of System Calls," J. Computer Security, vol. 6, no. 3, pp. 151-180, citeseer.ist.psu.edu/hofmeyr98intrusion.html, 1998.
-
(1998)
J. Computer Security
, vol.6
, Issue.3
, pp. 151-180
-
-
Hofmeyr, S.A.1
Forrest, S.2
Somayaji, A.3
-
9
-
-
3543106606
-
Anomaly detection using real-valued negative selection
-
DOI 10.1023/A:1026195112518
-
F.A. Gonzalez and D. Dasgupta, "Anomaly Detection Using Real-Valued Negative Selection," Genetic Programming and Evolvable Machines, vol. 4, no. 4, pp. 383-403, 2003. (Pubitemid 37283494)
-
(2003)
Genetic Programming and Evolvable Machines
, vol.4
, Issue.4
, pp. 383-403
-
-
Gonzalez, F.A.1
Dasgupta, D.2
-
10
-
-
0036928078
-
Hmms (hidden markov models) based on anomaly intrusion detection method
-
B. Gao, H.-Y. Ma, and Y.-H. Yang, "Hmms (Hidden Markov Models) Based on Anomaly Intrusion Detection Method," Proc. Int'l Conf. Machine Learning and Cybernetics, pp. 381-385, 2002.
-
(2002)
Proc. Int'l Conf. Machine Learning and Cybernetics
, pp. 381-385
-
-
Gao, B.1
Ma, H.-Y.2
Yang, Y.-H.3
-
11
-
-
67049085174
-
Anomaly detection in large sets of high-dimensional symbol sequences
-
S. Budalakoti, A. Srivastava, R. Akella, and E. Turkov, "Anomaly Detection in Large Sets of High-Dimensional Symbol Sequences," Technical Report NASA TM-2006-214553, NASA Ames Research Center, 2006.
-
(2006)
Technical Report NASA TM-2006-214553, NASA Ames Research Center
-
-
Budalakoti, S.1
Srivastava, A.2
Akella, R.3
Turkov, E.4
-
12
-
-
79952022688
-
Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety
-
S. Budalakoti, A. Srivastava, and M. Otey, "Anomaly Detection and Diagnosis Algorithms for Discrete Symbol Sequences with Applications to Airline Safety," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 37, no. 6, 2007.
-
(2007)
Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics
, vol.37
, Issue.6
-
-
Budalakoti, S.1
Srivastava, A.2
Otey, M.3
-
16
-
-
0029716418
-
A sense of self for unix processes
-
citeseer.ist.psu.edu/ forrest96sense.html
-
S. Forrest, S.A. Hofmeyr, A. Somayaji, and T.A. Longstaff, "A Sense of Self for Unix Processes," Proc. IEEE Symp. Security and Privacy (ISRSP '96), pp. 120-128, citeseer.ist.psu.edu/ forrest96sense.html, 1996.
-
(1996)
Proc. IEEE Symp. Security and Privacy (ISRSP '96)
, pp. 120-128
-
-
Forrest, S.1
Hofmeyr, S.A.2
Somayaji, A.3
Longstaff, T.A.4
-
18
-
-
77949731575
-
Temporal sequence learning and data reduction for anomaly detection
-
T. Lane and C.E. Brodley, "Temporal Sequence Learning and Data Reduction for Anomaly Detection," ACM Trans. Information Systems and Security, vol. 2, no. 3, pp. 295-331, 1999.
-
(1999)
ACM Trans. Information Systems and Security
, vol.2
, Issue.3
, pp. 295-331
-
-
Lane, T.1
Brodley, C.E.2
-
19
-
-
0033536041
-
Sequence anomalies in the Cag7 gene of the Helicobacter pylori pathogenicity island
-
DOI 10.1073/pnas.96.12.7011
-
G. Liu, T.K. McDaniel, S. Falkow, and S. Karlin, "Sequence Anomalies in the cag7 Gene of the Helicobacter Pylori Pathogenicity Island," Proc. Nat'l Academy of Sciences USA, vol. 96, no. 12, pp. 7011-7016, 1999. (Pubitemid 29275001)
-
(1999)
Proceedings of the National Academy of Sciences of the United States of America
, vol.96
, Issue.12
, pp. 7011-7016
-
-
Liu, G.1
Mcdaniel, T.K.2
Falkow, S.3
Karlin, S.4
-
21
-
-
0002758989
-
Mining surprising patterns using temporal description length
-
S. Chakrabarti, S. Sarawagi, and B. Dom, "Mining Surprising Patterns Using Temporal Description Length," Proc. 24th Int'l Conf. Very Large Data Bases, pp. 606-617, 1998.
-
(1998)
Proc. 24th Int'l Conf. Very Large Data Bases
, pp. 606-617
-
-
Chakrabarti, S.1
Sarawagi, S.2
Dom, B.3
-
23
-
-
38849167682
-
Sequence modeling with mixtures of conditional maximum entropy distributions
-
D. Pavlov, "Sequence Modeling with Mixtures of Conditional Maximum Entropy Distributions," Proc. Third IEEE Int'l Conf. Data Mining, pp. 251-258, 2003.
-
(2003)
Proc. Third IEEE Int'l Conf. Data Mining
, pp. 251-258
-
-
Pavlov, D.1
-
24
-
-
0039845384
-
Efficient algorithms for mining outliers from large data sets
-
S. Ramaswamy, R. Rastogi, and K. Shim, "Efficient Algorithms for Mining Outliers from Large Data Sets," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 427-438, 2000.
-
(2000)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 427-438
-
-
Ramaswamy, S.1
Rastogi, R.2
Shim, K.3
-
25
-
-
0141797880
-
A geometric framework for unsupervised anomaly detection
-
Kluwer Academics
-
E. Eskin, A. Arnold, M. Prerau, L. Portnoy, and S. Stolfo, "A Geometric Framework for Unsupervised Anomaly Detection," Applications of Data Mining in Computer Security, pp. 78-100, Kluwer Academics, 2002.
-
(2002)
Applications of Data Mining in Computer Security
, pp. 78-100
-
-
Eskin, E.1
Arnold, A.2
Prerau, M.3
Portnoy, L.4
Stolfo, S.5
-
27
-
-
0345359233
-
CLUSEQ: Efficient and effective sequence clustering
-
J. Yang and W. Wang, "CLUSEQ: Efficient and Effective Sequence Clustering," Proc. Int'l Conf. Data Eng., pp. 101-112, 2003.
-
(2003)
Proc. Int'l Conf. Data Eng
, pp. 101-112
-
-
Yang, J.1
Wang, W.2
-
28
-
-
0030282113
-
The power of amnesia: Learning probabilistic automata with variable memory length
-
D. Ron, Y. Singer, and N. Tishby, "The Power of Amnesia: Learning Probabilistic Automata with Variable Memory Length," Machine Learning, vol. 25, nos. 2/3, pp. 117-149, 1996. (Pubitemid 126724391)
-
(1996)
Machine Learning
, vol.25
, Issue.2-3
, pp. 117-149
-
-
Ron, D.1
Singer, Y.2
Tishby, N.3
-
29
-
-
0034593106
-
Visualization of navigation patterns on a web site using model-based clustering
-
I. Cadez, D. Heckerman, C. Meek, P. Smyth, and S. White, "Visualization of Navigation Patterns on a Web Site Using Model-Based Clustering," Proc. Sixth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 280-284, 2000.
-
(2000)
Proc. Sixth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 280-284
-
-
Cadez, I.1
Heckerman, D.2
Meek, C.3
Smyth, P.4
White, S.5
-
31
-
-
0000825481
-
A Statistical method for evaluating systematic relationships
-
R.R. Sokal and C.D. Michener, "A Statistical Method for Evaluating Systematic Relationships," Univ. of Kansas Scientific Bull., vol. 38, pp. 1409-1438, 1958.
-
(1958)
Univ. of Kansas Scientific Bull
, vol.38
, pp. 1409-1438
-
-
Sokal, R.R.1
Michener, C.D.2
-
32
-
-
0017492836
-
A fast algorithm for computing longest common subsequences
-
J.W. Hunt and T.G. Szymanski, "A Fast Algorithm for Computing Longest Common Subsequences," Comm. ACM, vol. 20, no. 5, pp. 350-353, 1977.
-
(1977)
Comm. ACM
, vol.20
, Issue.5
, pp. 350-353
-
-
Hunt, J.W.1
Szymanski, T.G.2
-
33
-
-
84880090937
-
Time-series bitmaps: A practical visualization tool for working with large time series databases
-
N. Kumar, V.N. Lolla, E.J. Keogh, S. Lonardi, and C.A. Ratanamahatana, "Time-Series Bitmaps: A Practical Visualization Tool for Working with Large Time Series Databases," Proc. SIAM Int'l Conf. Data Mining (SDM), 2005.
-
(2005)
Proc. SIAM Int'l Conf. Data Mining (SDM)
-
-
Kumar, N.1
Lolla, V.N.2
Keogh, E.J.3
Lonardi, S.4
Ratanamahatana, C.A.5
-
34
-
-
0001858279
-
Sequence matching and learning in anomaly detection for computer security
-
Fawcett, Haimowitz, Provost, and Stolfo, eds
-
T. Lane and C.E. Brodley, "Sequence Matching and Learning in Anomaly Detection for Computer Security," Proc. AI Approaches to Fraud Detection and Risk Management, Fawcett, Haimowitz, Provost, and Stolfo, eds., pp. 43-49, 1997.
-
(1997)
Proc. AI Approaches to Fraud Detection and Risk Management
, pp. 43-49
-
-
Lane, T.1
Brodley, C.E.2
-
35
-
-
0039253819
-
Lof: Identifying density-based local outliers
-
M.M. Breunig, H.-P. Kriegel, R.T. Ng, and J. Sander, "Lof: Identifying Density-Based Local Outliers," Proc. ACM SIGMOD Int'l Conf. Management of Data, pp. 93-104, 2000.
-
(2000)
Proc. ACM SIGMOD Int'l Conf. Management of Data
, pp. 93-104
-
-
Breunig, M.M.1
Kriegel, H.-P.2
Ng, R.T.3
Sander, J.4
-
36
-
-
85036529638
-
Intrusion detection: Applying machine learning to solaris audit data
-
D. Endler, "Intrusion Detection: Applying Machine Learning to Solaris Audit Data," Proc. 14th Ann. Computer Security Applications Conf., pp. 268-279, 1998.
-
(1998)
Proc. 14th Ann. Computer Security Applications Conf
, pp. 268-279
-
-
Endler, D.1
-
37
-
-
84958752009
-
Fixed vs. Variable-length patterns for detecting suspicious process behavior
-
H. Debar, M. Dacier, M. Nassehi, and A. Wespi, "Fixed vs. Variable-Length Patterns for Detecting Suspicious Process Behavior," Proc. Fifth European Symp. Research in Computer Security, pp. 1-15, 1998.
-
(1998)
Proc. Fifth European Symp. Research in Computer Security
, pp. 1-15
-
-
Debar, H.1
Dacier, M.2
Nassehi, M.3
Wespi, A.4
-
39
-
-
85042797742
-
Learning program behavior profiles for intrusion detection
-
Apr
-
A. Ghosh, A. Schwartzbard, and M. Schatz, "Learning Program Behavior Profiles for Intrusion Detection," Proc. First USENIX Workshop Intrusion Detection and Network Monitoring, pp. 51-62, Apr. 1999.
-
(1999)
Proc. First USENIX Workshop Intrusion Detection and Network Monitoring
, pp. 51-62
-
-
Ghosh, A.1
Schwartzbard, A.2
Schatz, M.3
-
40
-
-
0142222738
-
Detection and classification of intrusions and faults using sequences of system calls
-
J.B.D. Cabrera, L. Lewis, and R.K. Mehra, "Detection and Classification of Intrusions and Faults Using Sequences of System Calls," SIGMOD Record, vol. 30, no. 4, pp. 25-34, 2001.
-
(2001)
SIGMOD Record
, vol.30
, Issue.4
, pp. 25-34
-
-
Cabrera, J.B.D.1
Lewis, L.2
Mehra, R.K.3
-
41
-
-
0031233430
-
Intrusion detection via system call traces
-
Sept./Oct
-
A.P. Kosoresow and S.A. Hofmeyr, "Intrusion Detection via System Call Traces," IEEE Software, vol. 14, no. 5, pp. 35-42, Sept./Oct. 1997.
-
(1997)
IEEE Software
, vol.14
, Issue.5
, pp. 35-42
-
-
Kosoresow, A.P.1
Hofmeyr, S.A.2
-
42
-
-
0034505717
-
Comparison of negative and positive selection algorithms in novel pattern detection
-
D. Dasgupta and F. Nino, "A Comparison of Negative and Positive Selection Algorithms in Novel Pattern Detection," Proc. IEEE Int'l Conf. Systems, Man, and Cybernetics, vol. 1, pp. 125-130, 2000. (Pubitemid 32069284)
-
(2000)
Proceedings of the IEEE International Conference on Systems, Man and Cybernetics
, vol.1
, pp. 125-130
-
-
Dasgupta Dipankar1
Nino Fernando2
-
45
-
-
84901453196
-
Anomaly detection in multidimensional data using negative selection algorithm
-
May
-
D. Dasgupta and N. Majumdar, "Anomaly Detection in Multidimensional Data Using Negative Selection Algorithm," Proc. IEEE Conf. Evolutionary Computation, pp. 1039-1044, May 2002.
-
(2002)
Proc. IEEE Conf. Evolutionary Computation
, pp. 1039-1044
-
-
Dasgupta, D.1
Majumdar, N.2
-
46
-
-
0029718285
-
An Immunological approach to change detection: Algorithms, analysis and implications
-
S. Forrest, P. D'haeseleer, and P. Helman, "An Immunological Approach to Change Detection: Algorithms, Analysis and Implications," Proc. IEEE Symp. Security and Privacy, pp. 110-119, 1996.
-
(1996)
Proc. IEEE Symp. Security and Privacy
, pp. 110-119
-
-
Forrest, S.1
D'haeseleer, P.2
Helman, P.3
-
47
-
-
0027961889
-
Self-nonself discrimination in a computer
-
S. Forrest, A.S. Perelson, L. Allen, and R. Cherukuri, "Self-Nonself Discrimination in a Computer," Proc. IEEE Symp. Security and Privacy, pp. 202-212, 1994.
-
(1994)
Proc. IEEE Symp. Security and Privacy
, pp. 202-212
-
-
Forrest, S.1
Perelson, A.S.2
Allen, L.3
Cherukuri, R.4
-
49
-
-
0742324903
-
A formal framework for positive and negative detection schemes
-
Feb
-
S. Forrest, F. Esponda, and P. Helman, "A Formal Framework for Positive and Negative Detection Schemes," IEEE Trans. Systems, Man and Cybernetics, Part B, vol. 34, no. 1, pp. 357-373, Feb. 2004.
-
(2004)
IEEE Trans. Systems, Man and Cybernetics, Part B
, vol.34
, Issue.1
, pp. 357-373
-
-
Forrest, S.1
Esponda, F.2
Helman, P.3
-
50
-
-
85019678573
-
Detecting anomalous and unknown intrusions against programs
-
A.K. Ghosh, J. Wanken, and F. Charron, "Detecting Anomalous and Unknown Intrusions against Programs," Proc. 14th Ann. Computer Security Applications Conf., pp. 259-267, 1998.
-
(1998)
Proc. 14th Ann. Computer Security Applications Conf
, pp. 259-267
-
-
Ghosh, A.K.1
Wanken, J.2
Charron, F.3
-
51
-
-
33845397865
-
Native api based windows anomaly intrusion detection method using SVM
-
M. Wang, C. Zhang, and J. Yu, "Native Api Based Windows Anomaly Intrusion Detection Method Using SVM," Proc. IEEE Int'l Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing, vol. 1, pp. 514-519, 2006.
-
(2006)
Proc. IEEE Int'l Conf. Sensor Networks, Ubiquitous, and Trustworthy Computing
, vol.1
, pp. 514-519
-
-
Wang, M.1
Zhang, C.2
Yu, J.3
-
52
-
-
33846005488
-
Sequence-similarity kernels for SVMs to detect anomalies in system calls
-
DOI 10.1016/j.neucom.2006.10.017, PII S092523120600292X
-
S. Tian, S. Mu, and C. Yin, "Sequence-Similarity Kernels for Svms to Detect Anomalies in System Calls," Neurocomputing, vol. 70, nos. 4-6, pp. 859-866, 2007. (Pubitemid 46043984)
-
(2007)
Neurocomputing
, vol.70
, Issue.4-6
, pp. 859-866
-
-
Tian, S.1
Mu, S.2
Yin, C.3
-
53
-
-
70449100637
-
Roam: Rule-and motif-based anomaly detection in massive moving object data sets
-
X. Li, J. Han, S. Kim, and H. Gonzalez, "Roam: Rule-and Motif-Based Anomaly Detection in Massive Moving Object Data Sets," Proc. Seventh SIAM Int'l Conf. Data Mining, 2007.
-
(2007)
Proc. Seventh SIAM Int'l Conf. Data Mining
-
-
Li, X.1
Han, J.2
Kim, S.3
Gonzalez, H.4
-
55
-
-
0034593307
-
Characterizing the behavior of a program using multiple-length n-grams
-
C. Marceau, "Characterizing the Behavior of a Program Using Multiple-Length N-Grams," Proc. Workshop New Security Paradigms, pp. 101-110, 2000.
-
(2000)
Proc. Workshop New Security Paradigms
, pp. 101-110
-
-
Marceau, C.1
-
56
-
-
0034564289
-
Protein family classification using sparse markov transducers
-
E. Eskin, W.N. Grundy, and Y. Singer, "Protein Family Classification Using Sparse Markov Transducers," Proc. Int'l Conf. Intelligent Systems for Molecular Biology (ISMB '08), pp. 134-145, 2000.
-
(2000)
Proc. Int'l Conf. Intelligent Systems for Molecular Biology (ISMB '08)
, pp. 134-145
-
-
Eskin, E.1
Grundy, W.N.2
Singer, Y.3
-
57
-
-
85149612939
-
Fast effective rule induction
-
A. Prieditis and S. Russell, eds., July
-
W.W. Cohen, "Fast Effective Rule Induction," Proc. 12th Int'l Conf. Machine Learning, A. Prieditis and S. Russell, eds., pp. 115-123, July 1995.
-
(1995)
Proc. 12th Int'l Conf. Machine Learning
, pp. 115-123
-
-
Cohen, W.W.1
-
58
-
-
0022594196
-
An introduction to hidden markov models
-
Jan
-
L.R. Rabiner and B.H. Juang, "An Introduction to Hidden Markov Models," IEEE ASSP Magazine, vol. 3, no. 1, pp. 4-16, Jan. 1986.
-
(1986)
IEEE ASSP Magazine
, vol.3
, Issue.1
, pp. 4-16
-
-
Rabiner, L.R.1
Juang, B.H.2
-
59
-
-
0000353178
-
A maximization technique occuring in the statistical analysis of probabilistic functions of markov chains
-
L.E. Baum, T. Petrie, G. Soules, and N. Weiss, "A Maximization Technique Occuring in the Statistical Analysis of Probabilistic Functions of Markov Chains," Annals of Math. Statistics, vol. 41, no. 1, pp. 164-171, 1970.
-
(1970)
Annals of Math. Statistics
, vol.41
, Issue.1
, pp. 164-171
-
-
Baum, L.E.1
Petrie, T.2
Soules, G.3
Weiss, N.4
-
60
-
-
0002979739
-
Hidden markov models for human/computer interface modeling
-
T. Lane, "Hidden Markov Models for Human/Computer Interface Modeling," Proc. IJCAI-99 Workshop Learning about Users, pp. 35-44, 1999.
-
(1999)
Proc. IJCAI-99 Workshop Learning about Users
, pp. 35-44
-
-
Lane, T.1
-
62
-
-
0015600423
-
The viterbi algorithm
-
Mar
-
J. Forney, G.D., "The Viterbi Algorithm," Proc. IEEE, vol. 61, no. 3, pp. 268-278, Mar. 1973.
-
(1973)
Proc. IEEE
, vol.61
, Issue.3
, pp. 268-278
-
-
Forney, J.G.D.1
-
63
-
-
27644434963
-
Lightweight monitoring of MPI programs in real time
-
DOI 10.1002/cpe.889
-
G. Florez, Z. Liu, S. Bridges, A. Skjellum, and R. Vaughn, "Lightweight Monitoring of Mpi Programs in Real Time," Concurrency and Computation: Practice and Experience, vol. 17, no. 13, pp. 1547-1578, 2005. (Pubitemid 41560622)
-
(2005)
Concurrency Computation Practice and Experience
, vol.17
, Issue.13
, pp. 1547-1578
-
-
Florez, G.1
Liu, Z.2
Bridges, S.M.3
Skjellum, A.4
Vaughn, R.B.5
-
64
-
-
0037142572
-
Anomaly intrusion detection method based on HMM
-
DOI 10.1049/el:20020467
-
Y. Qiao, X.W. Xin, Y. Bin, and S. Ge, "Anomaly Intrusion Detection Method Based on Hmm," Electronics Letters, vol. 38, no. 13, pp. 663-664, 2002. (Pubitemid 34725625)
-
(2002)
Electronics Letters
, vol.38
, Issue.13
, pp. 663-664
-
-
Qiao, Y.1
Xin, X.W.2
Bin, Y.3
Ge, S.4
-
65
-
-
1642464756
-
A new anomaly detection method based on hierarchical hmm
-
X. Zhang, P. Fan, and Z. Zhu, "A New Anomaly Detection Method Based on Hierarchical Hmm," Proc. Fourth Int'l Conf. Parallel and Distributed Computing, Applications and Technologies, pp. 249-252, 2003.
-
(2003)
Proc. Fourth Int'l Conf. Parallel and Distributed Computing, Applications and Technologies
, pp. 249-252
-
-
Zhang, X.1
Fan, P.2
Zhu, Z.3
-
66
-
-
33845271242
-
Finding the most unusual time series subsequence: Algorithms and applications
-
E. Keogh, J. Lin, S.-H. Lee, and H.V. Herle, "Finding the Most Unusual Time Series Subsequence: Algorithms and Applications," Knowledge and Information Systems, vol. 11, no. 1, pp. 1-27, 2006.
-
(2006)
Knowledge and Information Systems
, vol.11
, Issue.1
, pp. 1-27
-
-
Keogh, E.1
Lin, J.2
Lee, S.-H.3
Herle, H.V.4
-
67
-
-
34548547034
-
HOT SAX: Efficiently finding the most unusual time series subsequence
-
DOI 10.1109/ICDM.2005.79, 1565683, Proceedings - Fifth IEEE International Conference on Data Mining, ICDM 2005
-
E. Keogh, J. Lin, and A. Fu, "Hot SAX: Efficiently Finding the Most Unusual Time Series Subsequence," Proc. Fifth IEEE Int'l Conf. Data Mining, pp. 226-233, 2005. (Pubitemid 47385697)
-
(2005)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 226-233
-
-
Keogh, E.1
Lin, J.2
Fu, A.3
-
68
-
-
27544465147
-
Approximations to magic: Finding unusual medical time series
-
Proceedings - 18th IEEE Symposium on Computer-Based Medical Systems
-
J. Lin, E. Keogh, A. Fu, and H.V. Herle, "Approximations to Magic: Finding Unusual Medical Time Series," Proc. 18th IEEE Symp. Computer-Based Medical Systems, pp. 329-334, 2005. (Pubitemid 41542915)
-
(2005)
Proceedings - IEEE Symposium on Computer-Based Medical Systems
, pp. 329-334
-
-
Lin, J.1
Keogh, E.2
Fu, A.3
Van Herle, H.4
-
69
-
-
34548093287
-
Experiencing SAX: A novel symbolic representation of time series
-
DOI 10.1007/s10618-007-0064-z
-
J. Lin, E. Keogh, L. Wei, and S. Lonardi, "Experiencing SAX: A Novel Symbolic Representation of Time Series," Data Mining and Knowledge Discovery, vol. 15, no. 2, pp. 107-144, 2007. (Pubitemid 47293484)
-
(2007)
Data Mining and Knowledge Discovery
, vol.15
, Issue.2
, pp. 107-144
-
-
Lin, J.1
Keogh, E.2
Wei, L.3
Lonardi, S.4
-
70
-
-
10644281769
-
Towards parameter-free data mining
-
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
E. Keogh, S. Lonardi, and C.A. Ratanamahatana, "Towards Parameter-Free Data Mining," Proc. 10th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 206-215, 2004. (Pubitemid 40114930)
-
(2004)
KDD-2004 - Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 206-215
-
-
Keogh, E.1
Lonardi, S.2
Ratanamahatana, C.A.3
-
71
-
-
84876028837
-
Assumption-free anomaly detection in time series
-
L. Wei, N. Kumar, V. Lolla, E.J. Keogh, S. Lonardi, and C. Ratanamahatana, "Assumption-Free Anomaly Detection in Time Series," Proc. 17th Int'l Conf. Scientific and Statistical Database Management, pp. 237-240, 2005.
-
(2005)
Proc. 17th Int'l Conf. Scientific and Statistical Database Management
, pp. 237-240
-
-
Wei, L.1
Kumar, N.2
Lolla, V.3
Keogh, E.J.4
Lonardi, S.5
Ratanamahatana, C.6
-
72
-
-
84878024340
-
SAXually explicit images: Finding unusual shapes
-
DOI 10.1109/ICDM.2006.138, 4053096, Proceedings - Sixth International Conference on Data Mining, ICDM 2006
-
L. Wei, E. Keogh, and X. Xi, "Saxually Explicit Images: Finding Unusual Shapes," Proc. Sixth Int'l Conf. Data Mining, pp. 711-720, 2006. (Pubitemid 47485849)
-
(2007)
Proceedings - IEEE International Conference on Data Mining, ICDM
, pp. 711-720
-
-
Wei, L.1
Keogh, E.2
Xi, A.3
-
73
-
-
70449102568
-
Wat: Finding top-k discords in time series database
-
Y. Bu, T.-W. Leung, A. Fu, E. Keogh, J. Pei, and S. Meshkin, "Wat: Finding Top-k Discords in Time Series Database," Proc. Seventh SIAM Int'l Conf. Data Mining, 2007.
-
(2007)
Proc. Seventh SIAM Int'l Conf. Data Mining
-
-
Bu, Y.1
Leung, T.-W.2
Fu, A.3
Keogh, E.4
Pei, J.5
Meshkin, S.6
-
74
-
-
33749406603
-
Finding time series discords based on haar transform
-
4093 LNAI, Advanced Data Mining and Applications - Second International Conference, ADMA 2006, Proceedings
-
A.W.-C. Fu, O.T.-W. Leung, E.J. Keogh, and J. Lin, "Finding Time Series Discords Based on Haar Transform," Proc. Second Int'l Conf. Advanced Data Mining and Applications, pp. 31-41, 2006. (Pubitemid 44503140)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 31-41
-
-
Fu, A.W.-C.1
Leung, O.T.-W.2
Keogh, E.3
Lin, J.4
-
76
-
-
79960750605
-
Optimal segmentation using tree models
-
R. Gwadera, A. Gionis, and H. Mannila, "Optimal Segmentation Using Tree Models," ICDM '06: Proc. Sixth Int'l Conf. Data Mining, pp. 244-253, 2006.
-
(2006)
ICDM '06: Proc. Sixth Int'l Conf. Data Mining
, pp. 244-253
-
-
Gwadera, R.1
Gionis, A.2
Mannila, H.3
-
77
-
-
0141463039
-
Finding surprising patterns in a time series database in linear time and space
-
E. Keogh, S. Lonardi, and B.Y.C. Chiu, "Finding Surprising Patterns in a Time Series Database in Linear Time and Space," Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining, pp. 550-556, 2002.
-
(2002)
Proc. Eighth ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining
, pp. 550-556
-
-
Keogh, E.1
Lonardi, S.2
Chiu, B.Y.C.3
-
79
-
-
23844441860
-
Reliable detection of episodes in event sequences
-
DOI 10.1007/s10115-004-0174-5
-
R. Gwadera, M. Atallah, and W. Szpankowski, "Reliable Detection of Episodes in Event Sequences," Knowledge and Information Systems, vol. 7, no. 4, pp. 415-437, 2005. (Pubitemid 41166793)
-
(2005)
Knowledge and Information Systems
, vol.7
, Issue.4
, pp. 415-437
-
-
Gwadera, R.1
Atallah, M.J.2
Szpankowski, W.3
-
80
-
-
19544382513
-
Detection of significant sets of episodes in event sequences
-
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
-
R. Gwadera, M. Atallah, and W. Szpankowskii, "Detection of Significant Sets of Episodes in Event Sequences," Proc. Fourth IEEE Int'l Conf. Data Mining, pp. 3-10, 2004. (Pubitemid 40731007)
-
(2004)
Proceedings - Fourth IEEE International Conference on Data Mining, ICDM 2004
, pp. 3-10
-
-
Atallah, M.1
Gwadera, R.2
Szpankowski, W.3
-
83
-
-
84859727993
-
Anomaly detection in streaming sensor data
-
A. Pawling, P. Yan, J. Candia, T. Schoenharl, and G. Madey, "Anomaly Detection in Streaming Sensor Data," Intelligent Techniques for Warehousing and Mining Sensor Network Data, IGI Global, 2008.
-
(2008)
Intelligent Techniques for Warehousing and Mining Sensor Network Data, IGI Global
-
-
Pawling, A.1
Yan, P.2
Candia, J.3
Schoenharl, T.4
Madey, G.5
-
85
-
-
33646006367
-
Efficient modeling of discrete events for anomaly detection using hidden markov models
-
G. Florez-Larrahondo, S.M. Bridges, and R. Vaughn, "Efficient Modeling of Discrete Events for Anomaly Detection Using Hidden Markov Models," Information Security, vol. 3650, pp. 506-514, 2005.
-
(2005)
Information Security
, vol.3650
, pp. 506-514
-
-
Florez-Larrahondo, G.1
Bridges, S.M.2
Vaughn, R.3
-
86
-
-
33744917038
-
Distance-based outliers in sequences
-
3816 LNCS, DOI 10.1007/11604655-61, Distributed Computing and Internet Technology - Second International Conference, ICDCIT 2005, Proceedings
-
G.K. Palshikar, "Distance-Based Outliers in Sequences," Proc. Second Int'l Conf. Distributed Computing and Internet Technology, pp. 547-552, 2005. (Pubitemid 43846724)
-
(2005)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, pp. 547-552
-
-
Palshikar, G.K.1
-
87
-
-
49749105200
-
Disk aware discord discovery: Finding unusual time series in terabyte sized datasets
-
D. Yankov, E.J. Keogh, and U. Rebbapragada, "Disk Aware Discord Discovery: Finding Unusual Time Series in Terabyte Sized Datasets," Proc. Int'l Conf. Data Mining, pp. 381-390, 2007.
-
(2007)
Proc. Int'l Conf. Data Mining
, pp. 381-390
-
-
Yankov, D.1
Keogh, E.J.2
Rebbapragada, U.3
-
88
-
-
33744950212
-
Finding outlier light curves in catalogues of periodic variable stars
-
DOI 10.1111/j.1365-2966.2006.10327.x
-
P. Protopapas, J.M. Giammarco, L. Faccioli, M.F. Struble, R. Dave, and C. Alcock, "Finding Outlier Light Curves in Catalogues of Periodic Variable Stars," Monthly Notices of the Royal Astronomical Soc., vol. 369, no. 2, pp. 677-696, 2006. (Pubitemid 43856627)
-
(2006)
Monthly Notices of the Royal Astronomical Society
, vol.369
, Issue.2
, pp. 677-696
-
-
Protopapas, P.1
Giammarco, J.M.2
Faccioli, L.3
Struble, M.F.4
Dave, R.5
Alcock, C.6
-
89
-
-
60349127820
-
Finding anomalous periodic time series
-
U. Rebbapragada, P. Protopapas, C.E. Brodley, and C. Alcock, "Finding Anomalous Periodic Time Series," Machine Learning, vol. 74, pp. 281-313, 2009.
-
(2009)
Machine Learning
, vol.74
, pp. 281-313
-
-
Rebbapragada, U.1
Protopapas, P.2
Brodley, C.E.3
Alcock, C.4
-
91
-
-
52649111580
-
Detection of shape anomalies: A probabilistic approach using hidden markov models
-
Apr
-
Z. Liu, J.X. Yu, L. Chen, and D. Wu, "Detection of Shape Anomalies: A Probabilistic Approach Using Hidden Markov Models," Proc. IEEE 24th Int'l Conf. Data Eng., pp. 1325-1327, Apr. 2008.
-
(2008)
Proc. IEEE 24th Int'l Conf. Data Eng
, pp. 1325-1327
-
-
Liu, Z.1
Yu, J.X.2
Chen, L.3
Wu, D.4
-
93
-
-
72849134059
-
Detection and characterization of anomalies in multivariate time series
-
H. Cheng, P.-N. Tan, C. Potter, and S. Klooster, "Detection and Characterization of Anomalies in Multivariate Time Series," Proc. Ninth SIAM Int'l Conf. Data Mining, 2009.
-
(2009)
Proc. Ninth SIAM Int'l Conf. Data Mining
-
-
Cheng, H.1
Tan, P.-N.2
Potter, C.3
Klooster, S.4
-
94
-
-
52649167834
-
Mining abnormal patterns from heterogeneous time-series with irrelevant features for fault event detection
-
R. Fujimaki, T. Nakata, H. Tsukahara, and A. Sato, "Mining Abnormal Patterns from Heterogeneous Time-Series with Irrelevant Features for Fault Event Detection," Proc. SIAM Int'l Conf. Data Mining, pp. 472-482, 2008.
-
(2008)
Proc. SIAM Int'l Conf. Data Mining
, pp. 472-482
-
-
Fujimaki, R.1
Nakata, T.2
Tsukahara, H.3
Sato, A.4
|