Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

[PDF][PDF] Outlier detection: applications and techniques

K Singh, S Upadhyaya - International Journal of Computer Science Issues …, 2012 - Citeseer
Outliers once upon a time regarded as noisy data in statistics, has turned out to be an
important problem which is being researched in diverse fields of research and application …

Bayesian methods for hidden Markov models: Recursive computing in the 21st century

SL Scott - Journal of the American statistical Association, 2002 - Taylor & Francis
Markov chain Monte Carlo (MCMC) sampling strategies can be used to simulate hidden
Markov model (HMM) parameters from their posterior distribution given observed data …

[PDF][PDF] Outlier detection: A survey

V Chandola, A Banerjee, V Kumar - ACM Computing Surveys, 2007 - researchgate.net
Outlier detection has been a very important concept in the realm of data analysis. Recently,
several application domains have realized the direct mapping between outliers in data and …

Computer intrusion: Detecting masquerades

M Schonlau, W DuMouchel, WH Ju, AF Karr, M Theus… - Statistical science, 2001 - JSTOR
Masqueraders in computer intrusion detection are people who use somebody else's
computer account. We investigate a number of statistical approaches for detecting …

Adaptive event detection with time-varying poisson processes

A Ihler, J Hutchins, P Smyth - Proceedings of the 12th ACM SIGKDD …, 2006 - dl.acm.org
Time-series of count data are generated in many different contexts, such as web access
logging, freeway traffic monitoring, and security logs associated with buildings. Since this …

Probabilistic techniques for intrusion detection based on computer audit data

N Ye, X Li, Q Chen, SM Emran… - IEEE Transactions on …, 2001 - ieeexplore.ieee.org
This paper presents a series of studies on probabilistic properties of activity data in an
information system for detecting intrusions into the information system. Various probabilistic …

[HTML][HTML] Resampling strategies for imbalanced time series forecasting

N Moniz, P Branco, L Torgo - International Journal of Data Science and …, 2017 - Springer
Time series forecasting is a challenging task, where the non-stationary characteristics of
data portray a hard setting for predictive tasks. A common issue is the imbalanced …

A Bayesian paradigm for designing intrusion detection systems

SL Scott - Computational statistics & data analysis, 2004 - Elsevier
This article describes a model based approach to designing network intrusion detection
systems. The article considers general methods applicable to many different types of …

Demystifying Numenta anomaly benchmark

N Singh, C Olinsky - 2017 International Joint Conference on …, 2017 - ieeexplore.ieee.org
Detecting anomalies in large-scale, streaming datasets has wide applicability in a myriad of
domains like network intrusion detection for cyber-security, fraud detection for credit cards …