Huang, HuaMing
Anomaly Detection Principles and Algorithms
Part I. Principles
1. Introduction
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
2. Anomaly Detection
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
3. Distance-Based Anomaly Detection Approaches
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
4. Clustering-Based Anomaly Detection Approaches
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
5. Model-Based Anomaly Detection Approaches
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
Part II. Algorithms
6. Distance and Density Based Approaches
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
7. Rank Based Approaches
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
8. Ensemble Methods
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
9. Algorithms for Time Series Data
Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang
Keywords: Computer Science, Data Mining and Knowledge Discovery, Pattern Recognition, Security
- Author(s)
- Huang, HuaMing
- Mehrotra, Kishan G.
- Mohan, Chilukuri K.
- Publisher
- Springer
- Publication year
- 2017
- Language
- en
- Edition
- 1
- Series
- Terrorism, Security, and Computation
- Page amount
- 22 pages
- Category
- Information Technology, Telecommunications
- Format
- Ebook
- eISBN (PDF)
- 9783319675268
- Printed ISBN
- 978-3-319-67524-4