2006
DOI: 10.3233/ida-2006-10604
|View full text |Cite
|
Sign up to set email alerts
|

A comprehensive survey of numeric and symbolic outlier mining techniques

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
34
0
5

Year Published

2010
2010
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 119 publications
(43 citation statements)
references
References 61 publications
0
34
0
5
Order By: Relevance
“…Though in recent years, several surveys on outlier detection have been published (see refs. [1–8], to name a few), the difficulties in high‐dimensional data and specialized approaches in this area have not been sketched in any of those (though, notably, a recent textbook edition sketches three example approaches [9]). In fact, most approaches to this problem have been proposed just recently in the past two or three years.…”
Section: Introductionmentioning
confidence: 99%
“…Though in recent years, several surveys on outlier detection have been published (see refs. [1–8], to name a few), the difficulties in high‐dimensional data and specialized approaches in this area have not been sketched in any of those (though, notably, a recent textbook edition sketches three example approaches [9]). In fact, most approaches to this problem have been proposed just recently in the past two or three years.…”
Section: Introductionmentioning
confidence: 99%
“…For the interested reader we refer to several examples of published surveys which are concerned with these topics (e.g. [4], [5], [6]). …”
Section: Related Workmentioning
confidence: 99%
“…al. [7], and Hodge and Austin [8], have been published. In this subsection, we review FPGA-based anomaly detection systems.…”
Section: B Anomaly Detectionmentioning
confidence: 99%