2007
DOI: 10.1016/j.comnet.2007.02.001
|View full text |Cite
|
Sign up to set email alerts
|

An overview of anomaly detection techniques: Existing solutions and latest technological trends

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

3
591
0
24

Year Published

2009
2009
2020
2020

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 1,201 publications
(618 citation statements)
references
References 39 publications
3
591
0
24
Order By: Relevance
“…An overview of various detection techniques presented in [24] shows deviations from the norm through mean functions hitting a threshold and hence indicating a suspicious activity. Additionally, pattern matching is a process were common structure is found to compare and group against.…”
Section: B Threat Detection and Predictionmentioning
confidence: 99%
“…An overview of various detection techniques presented in [24] shows deviations from the norm through mean functions hitting a threshold and hence indicating a suspicious activity. Additionally, pattern matching is a process were common structure is found to compare and group against.…”
Section: B Threat Detection and Predictionmentioning
confidence: 99%
“…Obviously, outlier detection is closely related to the process of sensor data cleaning. The outlier-detection techniques are well-categorized in the survey studies of [51,8].…”
Section: Outlier Detection Modelsmentioning
confidence: 99%
“…Several surveys have been published detailing the different methods developed for anomaly detection [2][3][4][5]. For instance, Garcia-Teodoro et al [3] describe anomaly detection as "one-class classification" where the training data are used to build a model of "normal" data.…”
Section: Introduction mentioning
confidence: 99%