1. Review of novelty detection methods;Miljkovic;Proc. 33rd Int. Convention ((((MIPRO)))),2010
2. Data cleaning: detecting, diagnosing, and editing data abnormalities;Van den Broeck;PLoS Med.,2005
3. Computer security threat monitoring and surveillance, technical report;Anderson,1980
4. An intrusion-detection model;Denning;IEEE Trans. Soft. Eng.,1987
5. Economic quality control of manufactured product;Shewhart;Bell Syst. Tech. J. ((((Alcatel-Lucent)))),1930