1. Kriegel, B.H., Kröger, P., Zimek, A.: Outlier detection techniques. In: Tutorial at PAKDD (2010)
2. Aggarwal, C.C.: An introduction to data mining. In: Aggarwal, C.C. (eds.) Data Mining, pp. 1–26. Springer, Cham (2015).
https://doi.org/10.1007/978-3-319-14142-8_1
3. Zimek, A., Schubert, E.: Outlier detection. In: Liu, L., Özsu, M.T. (eds.) Encyclopedia of Database Systems, pp. 1–5. Springer, New York (2017).
https://doi.org/10.1007/978-1-4899-7993-3_80719-1
4. Hawkins, D.M.: Identification of Outliers, vol. 11. Springer, Dordrecht (1980).
https://doi.org/10.1007/978-94-015-3994-4
5. Othman, Z.A., et al.: Rough outlier method for network intrusion detection. Int. J. Inf. Process. Manag. 4(7), 39–50 (2013)