Anomaly detection in large-scale data stream networks
This paper addresses the anomaly detection problem in large-scale data mining applications using residual subspace analysis. We are specifically concerned with situations where the full data cannot be practically obtained due to physical limitations such as low bandwidth, limited memory, storage, or...
| Main Authors: | Pham, DucSon, Venkatesh, S., Lazarescu, Mihai, Budhaditya, S. |
|---|---|
| Format: | Journal Article |
| Published: |
Springer
2014
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/43829 |
Similar Items
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009)
by: Pham, DucSon, et al.
Published: (2009)
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Clustering Patient Medical Records via Sparse Subspace Representation
by: Budhaditya, S., et al.
Published: (2013)
by: Budhaditya, S., et al.
Published: (2013)
Sparse Subspace Clustering via Group Sparse Coding
by: Budhaditya, S., et al.
Published: (2013)
by: Budhaditya, S., et al.
Published: (2013)
Stream Quantiles via Maximal Entropy Histograms
by: Arandjelovic, O., et al.
Published: (2014)
by: Arandjelovic, O., et al.
Published: (2014)
Efficient algorithms for robust recovery of images from compressed data
by: Pham, DucSon, et al.
Published: (2013)
by: Pham, DucSon, et al.
Published: (2013)
Compressive speech enhancement
by: Low, S., et al.
Published: (2013)
by: Low, S., et al.
Published: (2013)
Towards enhancing unsupervised anomaly detection by improving complexity, dimensionality and class-boundary properties
by: Babaei, Kasra
Published: (2022)
by: Babaei, Kasra
Published: (2022)
Improved Subspace Clustering via Exploitation of Spatial Constraints
by: Pham, DucSon, et al.
Published: (2012)
by: Pham, DucSon, et al.
Published: (2012)
Highly efficient distance-based anomaly detection through univariate with PCA in wireless sensor networks
by: Xie, Miao, et al.
Published: (2011)
by: Xie, Miao, et al.
Published: (2011)
Event composition and detection in data stream management systems
by: Mohania, M., et al.
Published: (2005)
by: Mohania, M., et al.
Published: (2005)
Improved image recovery from compressed data contaminated with impulsive noise
by: Pham, DucSon, et al.
Published: (2011)
by: Pham, DucSon, et al.
Published: (2011)
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
by: Teoh, Chin Chuang
Published: (2005)
by: Teoh, Chin Chuang
Published: (2005)
A comparison of different technique in flow based anomaly detection
by: Salah, Mohammad
Published: (2017)
by: Salah, Mohammad
Published: (2017)
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
by: Pradhan, Biswajeet
Published: (2006)
by: Pradhan, Biswajeet
Published: (2006)
Improving intrusion detection for better anomaly detection based on x-means clustering and multi-layer perceptron classification
by: Abbas, Borkan Ahmed
Published: (2016)
by: Abbas, Borkan Ahmed
Published: (2016)
An improved hybrid learning approach for better anomaly detection
by: Mohamed Yassin, Warusia
Published: (2011)
by: Mohamed Yassin, Warusia
Published: (2011)
Bayesian Nonparametric Approaches to Abnormality Detection in Video Surveillance
by: Nguyen, V., et al.
Published: (2015)
by: Nguyen, V., et al.
Published: (2015)
A fast extension for sparse representation on robust face recognition
by: Qiu, Hui-ning, et al.
Published: (2010)
by: Qiu, Hui-ning, et al.
Published: (2010)
Graph-based clustering with DRepStream
by: Callister, R., et al.
Published: (2017)
by: Callister, R., et al.
Published: (2017)
Bandwidth allocation in high speed networks with multiple nested charge classes
by: Khalil, Ibrahim, et al.
by: Khalil, Ibrahim, et al.
An Immunology-inspired Multi-engine Anomaly Detection System with Hybrid Particle Swarm Optimisations
by: Jiang, F., et al.
Published: (2012)
by: Jiang, F., et al.
Published: (2012)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
'Introducing Dendritic Cells as a Novel Immune-Inspired Algorithm for Anomaly Detection'
by: Greensmith, Julie, et al.
Published: (2005)
by: Greensmith, Julie, et al.
Published: (2005)
Unsupervised modeling of multiple data sources : a latent shared subspace approach
by: Gupta, Sunil Kumar
Published: (2011)
by: Gupta, Sunil Kumar
Published: (2011)
Localised Gross-error Detection in the Australian Land Gravity Database
by: Sproule, David, et al.
Published: (2006)
by: Sproule, David, et al.
Published: (2006)
A machine learning-based anomaly detection framework for connected and autonomous vehicles cyber security
by: He, Qiyi
Published: (2021)
by: He, Qiyi
Published: (2021)
Efficient and accurate set-based registration of time-separated aerial images
by: Arandjelovic, O., et al.
Published: (2015)
by: Arandjelovic, O., et al.
Published: (2015)
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
by: Raja Wahab, Raja Azhan Syah
Published: (2024)
by: Raja Wahab, Raja Azhan Syah
Published: (2024)
Information Fusion for Anomaly Detection with the Dendritic Cell Algorithm
by: Greensmith, Julie, et al.
Published: (2007)
by: Greensmith, Julie, et al.
Published: (2007)
Infrequent Item mining in multiple data streams
by: Saha, Budhaditya, et al.
Published: (2007)
by: Saha, Budhaditya, et al.
Published: (2007)
Multi-modal abnormality detection in video with unknown data segmentation
by: Nguyen, T., et al.
Published: (2012)
by: Nguyen, T., et al.
Published: (2012)
The low volatility anomaly in Chinese equity market
by: Hong, Zhuoling
Published: (2023)
by: Hong, Zhuoling
Published: (2023)
Annihilators through fault injection analysis on selected stream ciphers
by: Omar @ Othman, Wan Zariman
Published: (2019)
by: Omar @ Othman, Wan Zariman
Published: (2019)
Analysis of string matching compression algorithms
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
by: Nadarajan, Krishnaveny, et al.
Published: (2008)
A Comparative Study on Compression of Different Image File Formats
by: Ooi, Poh San
Published: (1999)
by: Ooi, Poh San
Published: (1999)
The Determination and Application of Vector Gravity Anomalies
by: Featherstone, Will, et al.
Published: (2000)
by: Featherstone, Will, et al.
Published: (2000)
The Reflexivity Index of a Finite Distributive Lattice of Subspaces
by: Harrison, K., et al.
Published: (2014)
by: Harrison, K., et al.
Published: (2014)
Parametric estimation for randomly censored autocorrelated data.
by: Sithole, Moses M.
Published: (1997)
by: Sithole, Moses M.
Published: (1997)
Similar Items
-
Effective Anomaly detection in Sensor Network Data Streams
by: Pham, DucSon, et al.
Published: (2009) -
Detection of Cross-Channel Anomalies
by: Pham, DucSon, et al.
Published: (2012) -
Detection of cross channel anomalies from multiple data channels
by: Pham, DucSon, et al.
Published: (2011) -
Clustering Patient Medical Records via Sparse Subspace Representation
by: Budhaditya, S., et al.
Published: (2013) -
Sparse Subspace Clustering via Group Sparse Coding
by: Budhaditya, S., et al.
Published: (2013)