Survey on Anomaly Detection using Data Mining Techniques, Procedia Computer Science, vol.60, pp.708-713, 2015. ,
DOI : 10.1016/j.procs.2015.08.220
URL : http://doi.org/10.1016/j.procs.2015.08.220
Graph based anomaly detection and description: a survey, Data Mining and Knowledge Discovery, vol.15, issue.1, pp.626-688, 2015. ,
DOI : 10.1007/s10618-014-0365-y
URL : http://arxiv.org/abs/1404.4679
Design of Multilevel Hybrid Classifier with Variant Feature Sets for Intrusion Detection System, IEICE Transactions on Information and Systems, vol.99, issue.7, pp.1810-1821, 2016. ,
DOI : 10.1587/transinf.2015EDP7357
Nearest-neighbor and clustering based anomaly detection algorithms for rapidminer, Proceedings of the 3rd RapidMiner Community Meeting and Conferernce, pp.1-12, 2012. ,
Article: Network intrusion detection using clustering: A data mining approach, International Journal of Computer Applications, vol.30, issue.4, pp.14-17, 2011. ,
Stochastic neighbor embedding (SNE) for dimension reduction and visualization using arbitrary divergences, Advances in artificial neural networks, machine learning, and computational intelligence, pp.23-45, 2011. ,
DOI : 10.1016/j.neucom.2012.02.034
Carreira-perpiñán. The elastic embedding algorithm for dimensionality reduction, Proceedings of the 27th International Conference on Machine Learning (ICML), pp.167-174, 2010. ,
Anomaly detection, ACM Computing Surveys, vol.41, issue.3, pp.1-1558, 2009. ,
DOI : 10.1145/1541880.1541882
A neural network component for an intrusion detection system, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy, pp.240-250, 1992. ,
DOI : 10.1109/RISP.1992.213257
One class random forests, Pattern Recognition, vol.46, issue.12, pp.3490-3506, 2013. ,
DOI : 10.1016/j.patcog.2013.05.022
An Anomaly Detection Approach Based on Isolation Forest Algorithm for Streaming Data using Sliding Window, IFAC Proceedings Volumes, pp.12-17, 2013. ,
DOI : 10.3182/20130902-3-CN-3020.00044
Anomaly Detection Support Vector Machine and Its Application to Fault Diagnosis, 2008 Eighth IEEE International Conference on Data Mining, pp.797-802, 2008. ,
DOI : 10.1109/ICDM.2008.69
A study in using neural networks for anomaly and misuse detection, Proceedings of the 8th Conference on USENIX Security Symposium - SSYM'99, pp.12-12, 1999. ,
A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data, PLOS ONE, vol.27, issue.8, pp.1-31 ,
DOI : 10.1371/journal.pone.0152173.t006
Towards an Information-Theoretic Framework for Analyzing Intrusion Detection Systems, 11th European Symposium on Research in Computer Security (ESORICS), pp.527-546, 2006. ,
DOI : 10.1007/11863908_32
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.174
Dimensionality reduction by supervised neighbor embedding using laplacian search, Computational and Mathematical Methods in Medicine, 2014. ,
DOI : 10.1155/2014/594379
URL : http://doi.org/10.1155/2014/594379
Blind separation of sources, part 1: An adaptive algorithm based on neuromimetic architecture. Signal Process, pp.1-10, 1991. ,
One-class classification with Gaussian processes, Pattern Recognition, vol.46, issue.12, pp.3507-3518, 2013. ,
DOI : 10.1016/j.patcog.2013.06.005
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.672.5811
Information-theoretic measures for anomaly detection, Proceedings of the 2001 IEEE Symposium on Security and Privacy, SP '01, p.130, 2001. ,
Cann: An intrusion detection system based on combining cluster centers and nearest neighbors. Knowledge-Based Systems, pp.13-21, 2015. ,
DOI : 10.1016/j.knosys.2015.01.009
PCAPLib: A System of Extracting, Classifying, and Anonymizing Real Packet Traces, IEEE Systems Journal, vol.10, issue.2, pp.520-531, 2016. ,
DOI : 10.1109/JSYST.2014.2301464
Isolation Forest, 2008 Eighth IEEE International Conference on Data Mining, pp.413-422, 2008. ,
DOI : 10.1109/ICDM.2008.17
Isolation-based anomaly detection, ACM Trans. Knowl. Discov. Data, vol.63, issue.1, pp.1-3 ,
Spherical Stochastic Neighbor Embedding of Hyperspectral Data, IEEE Transactions on Geoscience and Remote Sensing, vol.51, issue.2, pp.857-871, 2013. ,
DOI : 10.1109/TGRS.2012.2205004
Data Structures and Algorithms with Object-Oriented Design Patterns in, 1999. ,
Intrusion detection with neural networks, Advances in Neural Information Processing Systems 10, pp.943-949, 1998. ,
Nonlinear Component Analysis as a Kernel Eigenvalue Problem, Neural Computation, vol.20, issue.5, pp.1299-1319, 1998. ,
DOI : 10.1007/BF02281970
A Novel Isolation-Based Outlier Detection Method, pp.446-456, 2016. ,
DOI : 10.1007/978-3-319-42911-3_37
Toward developing a systematic approach to generate benchmark datasets for intrusion detection, Computers & Security, vol.31, issue.3, pp.357-374, 2012. ,
DOI : 10.1016/j.cose.2011.12.012