Anomaly Detection Principles and Algorithms Anomaly Detection Principles and Algorithms
Terrorism, Security, and Computation

Anomaly Detection Principles and Algorithms

Kishan G. Mehrotra and Others
    • 87,99 €
    • 87,99 €

Publisher Description

This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses.

The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are  described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data.

 With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from theirown past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets.

 This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.

GENRE
Computing & Internet
RELEASED
2017
18 November
LANGUAGE
EN
English
LENGTH
239
Pages
PUBLISHER
Springer International Publishing
SIZE
4.6
MB

More Books by Kishan G. Mehrotra, Chilukuri K. Mohan & HuaMing Huang

Modern Approaches in Applied Intelligence Modern Approaches in Applied Intelligence
2011
Modern Approaches in Applied Intelligence Modern Approaches in Applied Intelligence
2011

Other Books in This Series

Discovering Hidden Gems in Foreign Languages Discovering Hidden Gems in Foreign Languages
2023
Detecting Trust and Deception in Group Interaction Detecting Trust and Deception in Group Interaction
2021
A Machine Learning Based Model of Boko Haram A Machine Learning Based Model of Boko Haram
2020
Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges Cyber and Chemical, Biological, Radiological, Nuclear, Explosives Challenges
2017
The Global Cyber-Vulnerability Report The Global Cyber-Vulnerability Report
2015
Violence in Nigeria Violence in Nigeria
2015