1. T. Fawcett and F. Provost, “Adaptive Fraud Detection,” Data Mining and Knowledge Discovery, vol. 1, no. 3, pp. 291–316, Sep. 1997, 00798. [Online]. Available: http://link.springer.com/article/10.1023/A%3A1009700419189
2. J. Mazel, P. Casas, R. Fontugne, K. Fukuda, and P. Owezarski, “Hunting attacks in the dark: clustering and correlation analysis for unsupervised anomaly detection,” Int. J. Network Mgmt, vol. 25, no. 5, pp. 283–305, Sep. 2015, 00000. [Online]. Available: http://onlinelibrary.wiley.com/doi/10.1002/nem.1903/abstract
3. V. Podgorelec, M. Hericko, and I. Rozman, “Improving mining of medical data by outliers prediction,” in 18th IEEE Symposium on Computer-Based Medical Systems, 2005. Proceedings, Jun. 2005, pp. 91–96, 00029.
4. D. M. Hawkins, “Introduction,” in Identification of Outliers, ser. Monographs on Applied Probability and Statistics. Springer Netherlands, 1980, pp. 1–12, 00000. [Online]. Available: http://link.springer.com/chapter/10.1007/978-94-015-3994-41 [5] Barnett, Vic and Lewis, Toby, Outliers in statistical data. Wiley New York, 1994, vol. 3.
5. Barnett, Vic and Lewis, Toby, Outliers in statistical data. Wiley New York, 1994, vol. 3.