共 25 条
- [1] DANIEL R, ADNAN A M, GERHARD H., A survey of anomaly detection in industrial wireless sensor networks with critical water system infrastructure as a case study [J], Sensors, 18, 8, pp. 2491-2491, (2018)
- [2] AVDIIENKO V, KUZNETSOV K, ROMMELFANGER I, Et al., Detecting behavior anomalies in graphical user interfaces [C], Proceedings of the 39th International Conference on Software Engineering Companion (ICSE-C), (2017)
- [3] NGAI E W T, HU Y, WONG Y H, Et al., The application of data mining techniques in financial fraud detection: A classification framework and an academic review of literature[J], Decision Support System, 50, 3, pp. 559-569, (2011)
- [4] DENNING D E., An Intrusion-detection model, IEEE Transactions on Software Engineering, 13, 2, pp. 222-232, (1987)
- [5] ANDRYSIAK T., Sparse representation and overcomplete dictionary learning for anomaly detection in electrocardiograms [J], Neural Computing and Applications, 32, 5, pp. 1269-1285, (2020)
- [6] Lin MEI, ZHANG Fengli, GAO Qiang, Overview of outlier detection technology[J], Application Research of Computers, 37, 12, pp. 3521-3527, (2020)
- [7] KNORR E M, NG R T, TUCAKOV V., Distance-based outliers: Algorithms and applications [J], The VLDB Journal, 8, 3, pp. 237-253, (2000)
- [8] KNORR E M, NG R T., Algorithms for mining distance-based outliers in large datasets
- [9] BORIAH S, CHANDOLA V, KUMAR V., Similarity measures for categorical data: A comparative evaluation, Proceedings of the SIAM International Conference on Data Mining, (2008)
- [10] BREUNIG M M, KRIEGEL H P, NG R T, Et al., LOF:Identifying density-based local outliers [J], ACM Sigmod Record, 29, 2, pp. 93-104, (2000)