[1]
|
H. Kriegel, P. Kroger and A. Zimek, “Outlier Detection Techniques,” Proceedings of 13th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2009), Bangkok, Thailand, 2009.
http://www.dbs.ifi.lmu.de/Publikationen/Papers
|
[2]
|
V. Chandola, A. Banerjee and V. Kumar, “Anomaly Detection: A Survey,” ACM Computing Surveys, Vol. 41, No. 3, 2009, Article 15.
|
[3]
|
S. Axelsson, “The Base-Rate Fallacy and the Difficulty of Intrusion Detection,” ACM Transactions on Information and System Security (TISSEC), Vol. 3, No. 3, 2000, pp. 186-205. doi:10.1145/357830.357849
|
[4]
|
H. Teng, K. Chen and S. Lu, “Adaptive Real-Time Anomaly Detection Using Inductively Generated Sequential Patterns,” Proceedings of IEEE Symposium on Security and Privacy, Marlboro, 7-9 May 1990, pp. 278-284.
doi:10.1109/RISP.1990.63857
|
[5]
|
D. Denning, “An Intrusion Detection Model,” Proceedings of the Seventh IEEE Symposium on Security and Privacy, 7-9 May 1986, pp. 119-131.
|
[6]
|
A. Jones and R. Sielken, “Computer System Intrusion Detection: A Survey,” Technical Report, Department of Computer Science, University of Virginia, Charlottesville, 1999.
|
[7]
|
S. Cho, “Incorporating Soft Computing Techniques into a Probabilistic Intrusion Detection System,” IEEE Transactions on Systems, Man, and Cybernetics, Vol. 32, No. 2, 2002, pp. 154-160.
|
[8]
|
A. Venturini, “Time Series Outlier Detection: A New Non Parametric Methodology (Washer),” Statistica—Università di Bologna, Vol. 71, 2011, pp. 329-344.
|
[9]
|
E. M. Ferragut, D. M. Darmon, C. A. Shue and S. Kelley, “Automatic Construction of Anomaly Detectors from Graphical Models,” Proceedings of IEEE Symposium on Computational Intelligence in Cyber Security (CICS), Oak Ridge, 11-15 April 2011, pp. 9-16.
doi:10.1109/CICYBS.2011.5949386
|
[10]
|
A. Gupta, V. Harinarayan and D. Quass, “Aggregate- Query Processing in Data Warehousing Environments,” Proceedings of the VLDB, Zurich, 11-15 September 1995.
|
[11]
|
J. Bischoff and T. Alexander, “Data Warehouse: Practical Advice from the Experts,” Prentice-Hall, Upper Saddle River, 1997.
|
[12]
|
J. Widom, “Research Problems in Data Warehousing,” Proceedings of the 4th International Conference on Information and Knowledge Management, Baltimore, 28 November-2 December 1995.
|
[13]
|
B. Czejdo, M. Taylor and C. Putonti, “Summary Tables in Data Warehouses,” Proceedings of ADVIS’2000, Turkey, 25-27 October 2000.
|
[14]
|
http://www.vacommunity.org/VAST+Challenge+2012
|