1 |
Barbara, D., Wu, N., and Jajodia, S. (2001), Detecting novel network intrusions using bayes estimators, In First SIAM Conference on Data Mining.
|
2 |
Benneyan, J. C. (1998), Statistical quality control methods in infection control and hospital epidemiology, Part II : chart use, statistical properties, and research issues, Infection Control and Hospital Epidemiology, 265-283.
|
3 |
Chandola, V., Banerjee, A., and Kumar, V. (2009), Anomaly detection : A survey, ACM Computing Surveys (CSUR), 41(3), 15.
|
4 |
Fawcett, T. and Provost, F. (1997), Adaptive fraud detection, Data mining and knowledge discovery, 1(3), 291-316.
DOI
ScienceOn
|
5 |
Fawcett, T. and Provost, F. (1999), Activity monitoring : Noticing interesting changes in behavior, In Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining. ACM, 53-62
|
6 |
Guo, X., Yin, Y., Dong, C., Yang, G., and Zhou, G. (2008), On the class imbalance problem, In Natural Computation, ICNC, Fourth International Conference on IEEE, 4, 192-201.
|
7 |
Gustafson, T. L. (2000), Practical risk-adjusted quality control charts for infection control, American journal of infection control, 28(6), 406-414.
DOI
|
8 |
Jiang, W., Au, T., and Tsui, K. L. (2007), A statistical process control approach to business activity monitoring, IIE Transactions, 39(3), 235-249.
DOI
|
9 |
Khan, S. S. and Madden, M. G. (2013), One-Class Classification : Taxonomy of Study and Review of Techniques, arXiv preprint arXiv : 1312.0049.
|
10 |
Kumar, S. and Spafford, E. H. (1994), A pattern matching model for misuse intrusion detection, In Proceedings of the National Computer Security Conference, 11-21.
|
11 |
Li, R., He, W., Wu, Z., Hu, J., and Liu, Y. (2012), Modeling user's temporal dynamic profile in micro-blogging using clustering method. In Information Science and Service Science and Data Mining (ISSDM), 2012 6th International Conference on New Trends in IEEE, 808-812.
|
12 |
Lourenco, A. and Belo, O. (2011), Clickstream Data Warehousing for Web Crawlers Profiling, In Proceedings of the World Congress on Engineering.
|
13 |
Lucas, J. M. and Saccucci, M. S. (1990), Exponentially weighted moving average control schemes : properties and enhancements, Technometrics, 32(1), 1-12.
DOI
ScienceOn
|
14 |
Montgomery, D. C. (2007), Introduction to statistical quality control. John Wiley and Sons.
|
15 |
Phua, C., Lee, V., Smith, K., and Gayler, R. (2010), A comprehensive survey of data mining-based fraud detection research, arXiv preprint arXiv : 1009.6119.
|
16 |
Roth, V. (2004), Outlier detection with one-class kernel Fisher discriminants, In Advances in Neural Information Processing Systems, 1169-1176.
|
17 |
Puttagunta, V. and Kalpakis, K. (2002), Adaptive Methods for Activity Monitoring of Streaming Data, In ICMLA, 2, 197-203.
|
18 |
Qian, Z., Jiang, W., and Tsui, K. L. (2006), Churn detection via customer profile modelling, International Journal of Production Research, 44(14), 2913-2933.
DOI
|
19 |
Raghavan, N., Bell, R. M., and Schonlau, M. (2000), Defection detection, In Proc, 6, 447-456.
|
20 |
Song, X., Wu, M., Jermaine, C., and Ranka, S. (2007), Conditional anomaly detection, Knowledge and Data Engineering, IEEE Transactions, 19(5), 631-645.
|
21 |
Sukchotrat, T., Kim, S. B., and Tsung, F. (2009), One-class classification- based control charts for multivariate process monitoring, IIE Transactions, 42(2), 107-120.
DOI
|
22 |
Tax, D. M. J. (2001), One-Class Classification : Concept-Learning in the Absence of Counter-Examples, Ph.D. thesis, Delf University of Technology, The Netherlands.
|