Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Statistics, Probability and Uncertainty,Computer Science Applications,Business, Management and Accounting (miscellaneous)
Reference34 articles.
1. Yu R, He X, Liu Y (2014) Glad: group anomaly detection in social media analysis. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining, KDD ’14, ACM, New York, pp 372–381
2. Ahmed M, Mahmood A, Hu J (2015) A survey of network anomaly detection techniques. J Netw Comput Appl 60:19–31
3. Ahmed M, Mahmood AN, Hu J (2014) Outlier detection. CRC Press, New York, Ch. 1, pp 3–21, (in book: The State of the Art in Intrusion Prevention and Detection)
4. Ahmed M, Mahmood AN, Islam MR (2016) A survey of anomaly detection techniques in financial domain. Future Gener Comput Syst 55:278–288
5. Ahmed M, Anwar A, Mahmood AN, Shah Z, Maher MJ (2015) An investigation of performance analysis of anomaly detection techniques for big data in scada systems. EAI Endorsed Trans Ind Netw Intell Syst 15(3):5
Cited by
15 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Design and implementation of FPGA-based hardware acceleration for Machine Learning using OpenCL: A case study on the K-Means algorithm;2024 International Conference on Control, Automation and Diagnosis (ICCAD);2024-05-15
2. Dynamic Anomaly Detection in 5G-Connected IoT Devices using Transfer Learning;2024 IEEE 3rd International Conference on Computing and Machine Intelligence (ICMI);2024-04-13
3. Automatic Anomaly Detection by Network Traffic Analysis;2023 3rd International Conference on Innovative Sustainable Computational Technologies (CISCT);2023-09-08
4. A new clustering algorithm based on connectivity;Applied Intelligence;2023-04-04
5. Unsupervised Abnormal Traffic Detection through Topological Flow Analysis;2022 14th International Conference on Communications (COMM);2022-06-16