The Outlier Survey
Author : Robert P. Powers
Publisher :
Page : 462 pages
File Size : 45,77 MB
Release : 1983
Category : Chaco Canyon (N.M.)
ISBN :
Author : Robert P. Powers
Publisher :
Page : 462 pages
File Size : 45,77 MB
Release : 1983
Category : Chaco Canyon (N.M.)
ISBN :
Author : Charu C. Aggarwal
Publisher : Springer
Page : 481 pages
File Size : 36,91 MB
Release : 2016-12-10
Category : Computers
ISBN : 3319475789
This book provides comprehensive coverage of the field of outlier analysis from a computer science point of view. It integrates methods from data mining, machine learning, and statistics within the computational framework and therefore appeals to multiple communities. The chapters of this book can be organized into three categories: Basic algorithms: Chapters 1 through 7 discuss the fundamental algorithms for outlier analysis, including probabilistic and statistical methods, linear methods, proximity-based methods, high-dimensional (subspace) methods, ensemble methods, and supervised methods. Domain-specific methods: Chapters 8 through 12 discuss outlier detection algorithms for various domains of data, such as text, categorical data, time-series data, discrete sequence data, spatial data, and network data. Applications: Chapter 13 is devoted to various applications of outlier analysis. Some guidance is also provided for the practitioner. The second edition of this book is more detailed and is written to appeal to both researchers and practitioners. Significant new material has been added on topics such as kernel methods, one-class support-vector machines, matrix factorization, neural networks, outlier ensembles, time-series methods, and subspace methods. It is written as a textbook and can be used for classroom teaching.
Author : N. N. R. Ranga Suri
Publisher : Springer
Page : 227 pages
File Size : 20,62 MB
Release : 2019-01-10
Category : Technology & Engineering
ISBN : 3030051277
This book, drawing on recent literature, highlights several methodologies for the detection of outliers and explains how to apply them to solve several interesting real-life problems. The detection of objects that deviate from the norm in a data set is an essential task in data mining due to its significance in many contemporary applications. More specifically, the detection of fraud in e-commerce transactions and discovering anomalies in network data have become prominent tasks, given recent developments in the field of information and communication technologies and security. Accordingly, the book sheds light on specific state-of-the-art algorithmic approaches such as the community-based analysis of networks and characterization of temporal outliers present in dynamic networks. It offers a valuable resource for young researchers working in data mining, helping them understand the technical depth of the outlier detection problem and devise innovative solutions to address related challenges.
Author : Charles A. Kamhoua
Publisher : John Wiley & Sons
Page : 704 pages
File Size : 48,58 MB
Release : 2020-08-04
Category : Technology & Engineering
ISBN : 1119593360
An essential guide to the modeling and design techniques for securing systems that utilize the Internet of Things Modeling and Design of Secure Internet of Things offers a guide to the underlying foundations of modeling secure Internet of Things' (IoT) techniques. The contributors—noted experts on the topic—also include information on practical design issues that are relevant for application in the commercial and military domains. They also present several attack surfaces in IoT and secure solutions that need to be developed to reach their full potential. The book offers material on security analysis to help with in understanding and quantifying the impact of the new attack surfaces introduced by IoT deployments. The authors explore a wide range of themes including: modeling techniques to secure IoT, game theoretic models, cyber deception models, moving target defense models, adversarial machine learning models in military and commercial domains, and empirical validation of IoT platforms. This important book: Presents information on game-theory analysis of cyber deception Includes cutting-edge research finding such as IoT in the battlefield, advanced persistent threats, and intelligent and rapid honeynet generation Contains contributions from an international panel of experts Addresses design issues in developing secure IoT including secure SDN-based network orchestration, networked device identity management, multi-domain battlefield settings, and smart cities Written for researchers and experts in computer science and engineering, Modeling and Design of Secure Internet of Things contains expert contributions to provide the most recent modeling and design techniques for securing systems that utilize Internet of Things.
Author : Peter J. Rousseeuw
Publisher : John Wiley & Sons
Page : 329 pages
File Size : 50,28 MB
Release : 2005-02-25
Category : Mathematics
ISBN : 0471725374
WILEY-INTERSCIENCE PAPERBACK SERIES The Wiley-Interscience Paperback Series consists of selectedbooks that have been made more accessible to consumers in an effortto increase global appeal and general circulation. With these newunabridged softcover volumes, Wiley hopes to extend the lives ofthese works by making them available to future generations ofstatisticians, mathematicians, and scientists. "The writing style is clear and informal, and much of thediscussion is oriented to application. In short, the book is akeeper." –Mathematical Geology "I would highly recommend the addition of this book to thelibraries of both students and professionals. It is a usefultextbook for the graduate student, because it emphasizes both thephilosophy and practice of robustness in regression settings, andit provides excellent examples of precise, logical proofs oftheorems. . . .Even for those who are familiar with robustness, thebook will be a good reference because it consolidates the researchin high-breakdown affine equivariant estimators and includes anextensive bibliography in robust regression, outlier diagnostics,and related methods. The aim of this book, the authors tell us, is‘to make robust regression available for everyday statisticalpractice.’ Rousseeuw and Leroy have included all of thenecessary ingredients to make this happen." –Journal of the American Statistical Association
Author : Neil J. Salkind
Publisher : SAGE
Page : 1779 pages
File Size : 38,83 MB
Release : 2010-06-22
Category : Philosophy
ISBN : 1412961270
"Comprising more than 500 entries, the Encyclopedia of Research Design explains how to make decisions about research design, undertake research projects in an ethical manner, interpret and draw valid inferences from data, and evaluate experiment design strategies and results. Two additional features carry this encyclopedia far above other works in the field: bibliographic entries devoted to significant articles in the history of research design and reviews of contemporary tools, such as software and statistical procedures, used to analyze results. It covers the spectrum of research design strategies, from material presented in introductory classes to topics necessary in graduate research; it addresses cross- and multidisciplinary research needs, with many examples drawn from the social and behavioral sciences, neurosciences, and biomedical and life sciences; it provides summaries of advantages and disadvantages of often-used strategies; and it uses hundreds of sample tables, figures, and equations based on real-life cases."--Publisher's description.
Author : Manish Gupta
Publisher : Springer
Page : 110 pages
File Size : 28,34 MB
Release : 2014-04-14
Category : Computers
ISBN : 9783031007774
Outlier (or anomaly) detection is a very broad field which has been studied in the context of a large number of research areas like statistics, data mining, sensor networks, environmental science, distributed systems, spatio-temporal mining, etc. Initial research in outlier detection focused on time series-based outliers (in statistics). Since then, outlier detection has been studied on a large variety of data types including high-dimensional data, uncertain data, stream data, network data, time series data, spatial data, and spatio-temporal data. While there have been many tutorials and surveys for general outlier detection, we focus on outlier detection for temporal data in this book. A large number of applications generate temporal datasets. For example, in our everyday life, various kinds of records like credit, personnel, financial, judicial, medical, etc., are all temporal. This stresses the need for an organized and detailed study of outliers with respect to such temporal data. In the past decade, there has been a lot of research on various forms of temporal data including consecutive data snapshots, series of data snapshots and data streams. Besides the initial work on time series, researchers have focused on rich forms of data including multiple data streams, spatio-temporal data, network data, community distribution data, etc. Compared to general outlier detection, techniques for temporal outlier detection are very different. In this book, we will present an organized picture of both recent and past research in temporal outlier detection. We start with the basics and then ramp up the reader to the main ideas in state-of-the-art outlier detection techniques. We motivate the importance of temporal outlier detection and brief the challenges beyond usual outlier detection. Then, we list down a taxonomy of proposed techniques for temporal outlier detection. Such techniques broadly include statistical techniques (like AR models, Markov models, histograms, neural networks), distance- and density-based approaches, grouping-based approaches (clustering, community detection), network-based approaches, and spatio-temporal outlier detection approaches. We summarize by presenting a wide collection of applications where temporal outlier detection techniques have been applied to discover interesting outliers. Table of Contents: Preface / Acknowledgments / Figure Credits / Introduction and Challenges / Outlier Detection for Time Series and Data Sequences / Outlier Detection for Data Streams / Outlier Detection for Distributed Data Streams / Outlier Detection for Spatio-Temporal Data / Outlier Detection for Temporal Network Data / Applications of Outlier Detection for Temporal Data / Conclusions and Research Directions / Bibliography / Authors' Biographies
Author : Charu C. Aggarwal
Publisher : Springer
Page : 288 pages
File Size : 42,37 MB
Release : 2017-04-06
Category : Computers
ISBN : 3319547658
This book discusses a variety of methods for outlier ensembles and organizes them by the specific principles with which accuracy improvements are achieved. In addition, it covers the techniques with which such methods can be made more effective. A formal classification of these methods is provided, and the circumstances in which they work well are examined. The authors cover how outlier ensembles relate (both theoretically and practically) to the ensemble techniques used commonly for other data mining problems like classification. The similarities and (subtle) differences in the ensemble techniques for the classification and outlier detection problems are explored. These subtle differences do impact the design of ensemble algorithms for the latter problem. This book can be used for courses in data mining and related curricula. Many illustrative examples and exercises are provided in order to facilitate classroom teaching. A familiarity is assumed to the outlier detection problem and also to generic problem of ensemble analysis in classification. This is because many of the ensemble methods discussed in this book are adaptations from their counterparts in the classification domain. Some techniques explained in this book, such as wagging, randomized feature weighting, and geometric subsampling, provide new insights that are not available elsewhere. Also included is an analysis of the performance of various types of base detectors and their relative effectiveness. The book is valuable for researchers and practitioners for leveraging ensemble methods into optimal algorithmic design.
Author : Brenda G. Cox
Publisher : John Wiley & Sons
Page : 762 pages
File Size : 41,67 MB
Release : 2011-09-20
Category : Mathematics
ISBN : 1118150538
Consists of invited papers, from internationally recognized researchers, chosen for their quality as well as their overall unity. Describes current methods along with innovative research and presents new technologies for solving problems unique to establishment surveys. Stages of the survey process are addressed in the first five parts with cross-cutting topics in the last section.
Author : Vic Barnett
Publisher : John Wiley & Sons
Page : 616 pages
File Size : 30,48 MB
Release : 1994-05-09
Category : Mathematics
ISBN :
Every essential area is thoroughly updated to reflect the latest state of knowledge. All the topics are fully revised and extended, and additional topics and new emphases are presented.