Language:
English
繁體中文
Help
圖資館首頁
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Anomaly detection principles and alg...
~
Huang, HuaMing.
Anomaly detection principles and algorithms
Record Type:
Electronic resources : Monograph/item
Title/Author:
Anomaly detection principles and algorithmsby Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang.
Author:
Mehrotra, Kishan G.
other author:
Mohan, Chilukuri K.
Published:
Cham :Springer International Publishing :2017.
Description:
xxii, 217 p. :ill., digital ;24 cm.
Contained By:
Springer eBooks
Subject:
Anomaly detection (Computer security)
Online resource:
http://dx.doi.org/10.1007/978-3-319-67526-8
ISBN:
9783319675268$q(electronic bk.)
Anomaly detection principles and algorithms
Mehrotra, Kishan G.
Anomaly detection principles and algorithms
[electronic resource] /by Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang. - Cham :Springer International Publishing :2017. - xxii, 217 p. :ill., digital ;24 cm. - Terrorism, security, and computation,2197-8778. - Terrorism, security, and computation..
1 Introduction -- 2 Anomaly Detection -- 3 Distance-based Anomaly Detection Approaches -- 4 Clustering-based Anomaly Detection Approaches -- 5 Model-based Anomaly Detection Approaches -- 6 Distance and Density Based Approaches -- 7 Rank Based Approaches -- 8 Ensemble Methods -- 9 Algorithms for Time Series Data -- Datasets for Evaluation -- Datasets for Time Series Experiments.
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.
ISBN: 9783319675268$q(electronic bk.)
Standard No.: 10.1007/978-3-319-67526-8doiSubjects--Topical Terms:
797123
Anomaly detection (Computer security)
LC Class. No.: TK5105.59
Dewey Class. No.: 005.8
Anomaly detection principles and algorithms
LDR
:02814nmm a2200337 a 4500
001
525031
003
DE-He213
005
20171118175901.0
006
m d
007
cr nn 008maaau
008
180904s2017 gw s 0 eng d
020
$a
9783319675268$q(electronic bk.)
020
$a
9783319675244$q(paper)
024
7
$a
10.1007/978-3-319-67526-8
$2
doi
035
$a
978-3-319-67526-8
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.59
072
7
$a
UNF
$2
bicssc
072
7
$a
UYQE
$2
bicssc
072
7
$a
COM021030
$2
bisacsh
082
0 4
$a
005.8
$2
23
090
$a
TK5105.59
$b
.M498 2017
100
1
$a
Mehrotra, Kishan G.
$3
515688
245
1 0
$a
Anomaly detection principles and algorithms
$h
[electronic resource] /
$c
by Kishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang.
260
$a
Cham :
$b
Springer International Publishing :
$b
Imprint: Springer,
$c
2017.
300
$a
xxii, 217 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Terrorism, security, and computation,
$x
2197-8778
505
0
$a
1 Introduction -- 2 Anomaly Detection -- 3 Distance-based Anomaly Detection Approaches -- 4 Clustering-based Anomaly Detection Approaches -- 5 Model-based Anomaly Detection Approaches -- 6 Distance and Density Based Approaches -- 7 Rank Based Approaches -- 8 Ensemble Methods -- 9 Algorithms for Time Series Data -- Datasets for Evaluation -- Datasets for Time Series Experiments.
520
$a
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.
650
0
$a
Anomaly detection (Computer security)
$3
797123
650
1 4
$a
Computer Science.
$3
212513
650
2 4
$a
Data Mining and Knowledge Discovery.
$3
275288
650
2 4
$a
Pattern Recognition.
$3
273706
650
2 4
$a
Security.
$3
760527
700
1
$a
Mohan, Chilukuri K.
$3
797121
700
1
$a
Huang, HuaMing.
$3
797122
710
2
$a
SpringerLink (Online service)
$3
273601
773
0
$t
Springer eBooks
830
0
$a
Terrorism, security, and computation.
$3
715543
856
4 0
$u
http://dx.doi.org/10.1007/978-3-319-67526-8
950
$a
Computer Science (Springer-11645)
based on 0 review(s)
ALL
電子館藏
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
000000148351
電子館藏
1圖書
電子書
EB TK5105.59 .M498 2017 2017
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Multimedia file
http://dx.doi.org/10.1007/978-3-319-67526-8
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login