共 50 条
- [34] Analysis of Anomaly Detection Techniques in Video Surveillance [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INTELLIGENT SUSTAINABLE SYSTEMS (ICISS 2017), 2017, : 596 - 601
- [35] A Heuristic for an Online Applicability of Anomaly Detection Techniques [J]. 2022 IEEE INTERNATIONAL CONFERENCE ON AUTONOMIC COMPUTING AND SELF-ORGANIZING SYSTEMS COMPANION (ACSOS-C 2022), 2022, : 107 - 112
- [36] Techniques and Systems for Anomaly Detection in Database Systems [J]. POLICY-BASED AUTONOMIC DATA GOVERNANCE (PADG 2018), 2019, 11550 : 113 - 133
- [37] BIFAD: Bio-Inspired Anomaly Based HTTP-Flood Attack Detection [J]. Wireless Personal Communications, 2017, 97 : 281 - 308
- [39] Sequential Anomaly Detection Techniques in Business Processes [J]. BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2016, 2017, 263 : 196 - 208
- [40] A survey of anomaly detection techniques in financial domain [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2016, 55 : 278 - 288