𝔖 Scriptorium
✦   LIBER   ✦

πŸ“

Anomaly Detection Principles and Algorithms

✍ Scribed by Kishan G. Mehrotra,Chilukuri K. Mohan,HuaMing Huang (auth.)


Publisher
Springer International Publishing
Year
2017
Tongue
English
Leaves
229
Series
Terrorism, Security, and Computation
Edition
1
Category
Library

⬇  Acquire This Volume

No coin nor oath required. For personal study only.

✦ Synopsis


This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses.

The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data.

With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets.

This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

✦ Table of Contents


Front Matter ....Pages i-xxii
Front Matter ....Pages 1-1
Introduction (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 3-19
Anomaly Detection (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 21-32
Distance-Based Anomaly Detection Approaches (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 33-39
Clustering-Based Anomaly Detection Approaches (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 41-55
Model-Based Anomaly Detection Approaches (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 57-94
Front Matter ....Pages 95-95
Distance and Density Based Approaches (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 97-117
Rank Based Approaches (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 119-134
Ensemble Methods (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 135-152
Algorithms for Time Series Data (Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang)....Pages 153-189
Back Matter ....Pages 191-217

✦ Subjects


Data Mining and Knowledge Discovery


πŸ“œ SIMILAR VOLUMES


Concurrent Programming: Algorithms, Prin
✍ Michel Raynal (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization

Concurrent Programming: Algorithms, Prin
✍ Michel Raynal (auth.) πŸ“‚ Library πŸ“… 2013 πŸ› Springer-Verlag Berlin Heidelberg 🌐 English

<p><p>The advent of new architectures and computing platforms means that synchronization and concurrent computing are among the most important topics in computing science. Concurrent programs are made up of cooperating entities -- processors, processes, agents, peers, sensors -- and synchronization

Traffic Anomaly Detection
✍ Antonio Cuadra-SΓ‘nchez, Javier Aracil πŸ“‚ Library πŸ“… 2015 πŸ› ISTE Press - Elsevier 🌐 English

<p>This book presents an overview of traffic anomaly detection analysis, allowing you to monitor security aspects of multimedia services. The author's approach is based on the analysis of time aggregation adjacent periods of the traffic. As traffic varies throughout the day, it is essential to consi

Beginning Anomaly Detection Using Python
✍ Suman Kalyan Adari, Sridhar Alla πŸ“‚ Library πŸ“… 2024 πŸ› Apress 🌐 English

<p><span>This beginner-oriented book will help you understand and perform anomaly detection by learning cutting-edge machine learning and deep learning techniques. This updated second edition focuses on supervised, semi-supervised, and unsupervised approaches to anomaly detection. Over the course of

Online Portfolio Selection: Principles a
✍ Bin Li (Author); Steven Chu Hong Hoi (Author) πŸ“‚ Library πŸ“… 2016 πŸ› CRC Press

<p>With the aim to sequentially determine optimal allocations across a set of assets, Online Portfolio Selection (OLPS) has significantly reshaped the financial investment landscape. <strong>Online Portfolio Selection: Principles and Algorithms </strong>supplies a comprehensive survey of existing OL