詳細書目資料

資料來源: Google Book
5
0
0
0
0

Anomaly detection principles and algorithms

  • 作者: Mehrotra, Kishan G., author.
  • 其他作者:
  • 其他題名:
    • Terrorism, security, and computation.
  • 出版: Cham : Springer International Publishing :Imprint: Springer
  • 叢書名: Terrorism, security, and computation,
  • 主題: Anomaly detection (Computer security) , Computer Science. , Data Mining and Knowledge Discovery. , Pattern Recognition. , Security.
  • ISBN: 9783319675268 (electronic bk.) 、 9783319675244 (paper)
  • FIND@SFXID: CGU
  • 資料類型: 電子書
  • 內容註: 1 Introduction -- 2 Anomaly Detection -- 3 Distance-based Anomaly Detection Approaches -- 4 Clustering-based Anomaly Detection Approaches -- 5 Model-based Anomaly Detection Approaches -- 6 Distance and Density Based Approaches -- 7 Rank Based Approaches -- 8 Ensemble Methods -- 9 Algorithms for Time Series Data -- Datasets for Evaluation -- Datasets for Time Series Experiments.
  • 摘要註: This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.
  • 讀者標籤:
  • 引用連結:
  • Share:
  • 系統號: 005411963 | 機讀編目格式
  • 館藏資訊

    This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

    資料來源: Google Book
    延伸查詢 Google Books Amazon
    回到最上