Author:
Tan Wenan,Fang Xi,Zhao Lu,Tang Anqiong
Reference15 articles.
1. Hawkins, D.M.: Indentification of oufliers. Monogr. Appl. Probab. Stat. 80(2), 321–328 (1980)
2. Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Proc. Comput. Sci. 60(1), 708–713 (2015)
3. Joseph, S.R., Hlomani, H., Letsholo, K.: Data mining algorithms: an overview. Neuroscience 12(3), 719–743 (2016)
4. Lee, W.: Applying data mining to intrusion detection. ACM SIGKDD Explor. Newsl. 4(2), 35–42 (2002)
5. Arora, P., Deepali, Varshney, S.: Analysis of k-means and k-medoids algorithm for big data. Proc. Comput. Sci. 78, 507–512 (2016)