1. Abadi M, Barham P, Chen J, Chen Z, Davis A, Dean J, Devin M, Ghemawat S, Irving G, Isard M, Kudlur M, Levenberg J, Monga R, Moore S, Murray DG, Steiner B, Tucker P, Vasudevan V, Warden P, Wicke M, Yu, and Zheng X (2016) Tensorflow: a system for large-scale machine learning. In Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, OSDI’16, pages 265–283, Berkeley, CA, USA. USENIX Association. ISBN 978-1-931971-33-1. URL https://www.usenix.org/system/files/conference/osdi16/osdi16-abadi.pdf
2. Adewumi AO, Akinyelu AA (2016) A survey of machine-learning and nature-inspired based credit card fraud detection techniques, international journal of system assurance engineering and management. Int J Syst Assurance Eng Manag 8(2):937–953
3. Aggarwal CC (2013) Probabilistic and statistical models for outlier detection. Outlier Analysis, chapter 2. Springer, New York, NY, pp 41–74
4. Adari SK Alla S. Practical use cases of anomaly detection. Apress, Berkeley, CA., 2019. https://doi.org/10.1007/978-1-4842-5177-5_8
5. Nari A, Diane A, Michael Fernandes (2016) Application of SARIMAX model to forecast daily sales in food retail industry. Int J Operat Res Inform Syst 7(1–21):04. https://doi.org/10.4018/IJORIS.2016040101