Author:
Musa Tahani Hussein Abu,Bouras Abdelaziz
Reference27 articles.
1. Grubbs FE (2016) Procedures for detecting outlying observations in samples. Technometrics 1969 11(1):1–21. https://doi.org/10.1080/00401706.1969.10490657
2. Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In Proceedings of ACM CSS workshop on data mining applied to security (DMSA-2001). pp 5–8
3. Garcia-Teodoro P, Diaz-Verdejo JE, Macia-Fernandez G, Vazquez E (2009) Anomaly-based network intrusion detection: techniques, systems, and challenges. Comput Secur 28:18–28. https://doi.org/10.1016/j.cose.2008.08.003
4. Goldstein M, Uchida S (2016) A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS One 11:e0152173. https://doi.org/10.1371/journal.pone.0152173
5. Varun C, Arindam B, Vipin K (2009) Anomaly detection: a survey. ACM Comput Surv 41(3):15–58. doi: https://doi.org/10.1145/1541880.1541882
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献