D. M. Hawkins, Identification of outliers, vol.11, 1980.

, ELK Stack Homepage

F. Angiulli, Concentration free outlier detection, Machine Learning and Knowledge Discovery in Databases, pp.3-19, 2017.

J. Shieh and E. Keogh, iSAX: Indexing and mining terabyte sized time series, Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.623-631, 2008.

, iSAX: disk-aware mining and indexing of massive time series datasets, Data Mining and Knowledge Discovery, vol.19, issue.1, pp.24-57, 2009.

R. A. Khan, S. Islam, and R. Biswas, Automatic detection of defective rail anchors, Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems, pp.1583-1588, 2014.

M. Molodova, Z. Li, A. Nez, and R. Dollevoet, Monitoring the railway infrastructure: Detection of surface defects using wavelets, Proceedings of the 16th International IEEE Conference on Intelligent Transportation Systems, pp.1316-1321, 2013.

L. Yin, J. Hu, L. Huang, F. Zhang, and P. Ren, Detecting illegal pickups of intercity buses from their gps traces, Proceedings of the 17th International IEEE Conference on Intelligent Transportation Systems (ITSC), pp.2162-2167, 2014.

M. D. Abràmoff, Y. Lou, A. Erginay, W. Clarida, R. Amelon et al., Improved automated detection of diabetic retinopathy on a publicly available dataset through integration of deep learning, Investigative ophthalmology & visual science, vol.57, issue.13, pp.5200-5206, 2016.

V. Chandola, A. Banerjee, and V. Kumar, Anomaly detection: A survey, ACM Computing Surveys, vol.41, issue.3, p.58, 2009.

, Anomaly detection for discrete sequences: A survey, IEEE Transactions on Knowledge and Data Engineering, vol.24, issue.5, pp.823-839, 2012.

K. M. Ting, F. T. Liu, and Z. Zhou, Isolation forest, 2008 Eighth IEEE International Conference on Data Mining, vol.12, pp.413-422, 2008.

T. J. Veasey and S. J. Dodson, Anomaly detection in application performance monitoring data, International Journal of Machine Learning and Computing, vol.4, issue.2, p.120, 2014.

S. Mukkamala, G. Janoski, and A. Sung, Intrusion detection using neural networks and support vector machines, Proceedings of the 2002 International Joint Conference on Neural Networks, vol.2, pp.1702-1707, 2002.

X. Li, J. Han, S. Kim, and H. Gonzalez, Roam: Rule-and motif-based anomaly detection in massive moving object data sets, Proceedings of the 2007 SIAM International Conference on Data Mining, pp.273-284, 2007.

C. C. Aggarwal, Outlier Analysis, 2013.

M. M. Breunig, H. Kriegel, R. T. Ng, and J. Sander, Lof: Identifying densitybased local outliers, SIGMOD Rec, vol.29, issue.2, pp.93-104, 2000.

E. M. Knox and R. T. Ng, Algorithms for mining distance-based outliers in large datasets, Proceedings of the International Conference on Very Large Data Bases, pp.392-403, 1998.