There has been increasing interest in deploying data mining methods for fault detection. For the case where we have potentially large numbers of devices to monitor, we propose to use peer group analysis to identify faults. First, we identify the peer group of each device. This consists of other devices that have behaved similarly. We then monitor the behaviour of a device by measuring how well the peer group tracks the device. Should the device’s behaviour deviate strongly from its peer group we flag the behaviour as an outlier. An outlier is used to indicate the potential occurrence of a fault. A device exhibiting outlier behaviour from its peer group need not be an outlier to the population of devices. Indeed a device exhibiting behaviour...
Anomaly detection systems are a promising tool to identify compromised user credentials and maliciou...
Application performance in a smart space is affected by faulty behaviours of nodes and communication...
Anomaly (or outlier) detection techniques can be used to find occurrences in data that are surprisin...
There has been increasing interest in deploying data mining methods for fault detection. For the cas...
Outlier detection is studied and applied in many domains. Outliers arise due to different reasons su...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
The detection of outliers has gained considerable interest in data mining with the realization that ...
In today’s electronic world, humans are dependent on electronic devices. These electronic devices ar...
International audienceData mining for intrusion detection can be divided into several sub-topics, am...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Electronic sensors are widely used in different application areas, and in some of them, such as auto...
This thesis explores the data modeling for outlier detection techniques in three different applicati...
Monitoring and maintaining the equipment to ensure its reliability and availability is vital to indu...
Outlier detection is an important problem occurring in a wide range of areas. Outliers are the outco...
The efficient and effective monitoring of mobile networks is vital given the number of users who rel...
Anomaly detection systems are a promising tool to identify compromised user credentials and maliciou...
Application performance in a smart space is affected by faulty behaviours of nodes and communication...
Anomaly (or outlier) detection techniques can be used to find occurrences in data that are surprisin...
There has been increasing interest in deploying data mining methods for fault detection. For the cas...
Outlier detection is studied and applied in many domains. Outliers arise due to different reasons su...
Outlier detection is a subfield of data mining to determine data points that notably deviate from th...
The detection of outliers has gained considerable interest in data mining with the realization that ...
In today’s electronic world, humans are dependent on electronic devices. These electronic devices ar...
International audienceData mining for intrusion detection can be divided into several sub-topics, am...
The impact of an anomaly is domain-dependent. In a dataset of network activities, an anomaly can imp...
Electronic sensors are widely used in different application areas, and in some of them, such as auto...
This thesis explores the data modeling for outlier detection techniques in three different applicati...
Monitoring and maintaining the equipment to ensure its reliability and availability is vital to indu...
Outlier detection is an important problem occurring in a wide range of areas. Outliers are the outco...
The efficient and effective monitoring of mobile networks is vital given the number of users who rel...
Anomaly detection systems are a promising tool to identify compromised user credentials and maliciou...
Application performance in a smart space is affected by faulty behaviours of nodes and communication...
Anomaly (or outlier) detection techniques can be used to find occurrences in data that are surprisin...