“…This actionable information can be used in many applications. These applications include but not restricted to fraud detection for credit cards [4], control systems [5], medical research, parallel software applications [6], steganalysis in image sharing applications [7], intelligent transportation system, wireless sensor networks [8,9], and human skin detection [10]. Outlier detection methods can be classified into three categories [3], [11], [12]: statistical methods, proximity-based methods, and clustering-based methods.…”