000805835 000__ 02140cam\a2200469Mu\4500 000805835 001__ 805835 000805835 005__ 20230306143809.0 000805835 006__ m\\\\\o\\d\\\\\\\\ 000805835 007__ cr\un\nnnunnun 000805835 008__ 171125s2017\\\\sz\\\\\\o\\\\\000\0\eng\d 000805835 019__ $$a1012813389$$a1014157134 000805835 020__ $$a9783319675268$$q(electronic book) 000805835 020__ $$a3319675265$$q(electronic book) 000805835 020__ $$z9783319675244 000805835 020__ $$z3319675249 000805835 0247_ $$a10.1007/978-3-319-67526-8 000805835 035__ $$aSP(OCoLC)on1012883414 000805835 035__ $$aSP(OCoLC)1012883414$$z(OCoLC)1012813389$$z(OCoLC)1014157134 000805835 040__ $$aEBLCP$$beng$$cEBLCP$$dOCLCO$$dN$T$$dGW5XE$$dYDX$$dLQU 000805835 049__ $$aISEA 000805835 050_4 $$aTK5105.59 000805835 08204 $$a005.8$$b23 000805835 1001_ $$aMehrotra, Kishan G. 000805835 24510 $$aAnomaly detection principles and algorithms /$$cKishan G. Mehrotra, Chilukuri K. Mohan, HuaMing Huang. 000805835 260__ $$aCham :$$bSpringer,$$c2017. 000805835 300__ $$a1 online resource (229 pages) 000805835 336__ $$atext$$btxt$$2rdacontent 000805835 337__ $$acomputer$$bc$$2rdamedia 000805835 338__ $$aonline resource$$bcr$$2rdacarrier 000805835 4901_ $$aTerrorism, security, and computation 000805835 5050_ $$a1. Introduction -- 2. Anomaly Detection -- 3. Distance-based Anomaly Detection Approaches -- 4. Clustering-based Anomaly Detection Approaches -- 5. Model-based Anomaly Detection Approaches -- 6. Distance and Density Based Approaches -- 7. Rank Based Approaches -- 8. Ensemble Methods -- 9. Algorithms for Time Series Data -- Datasets for Evaluation -- Datasets for Time Series Experiments. 000805835 506__ $$aAccess limited to authorized users. 000805835 588__ $$aDescription based on print version record. 000805835 650_0 $$aAnomaly detection (Computer security) 000805835 7001_ $$aMohan, Chilukuri K. 000805835 7001_ $$aHuang, HuaMing. 000805835 77608 $$iPrint version:$$aMehrotra, Kishan G.$$tAnomaly Detection Principles and Algorithms$$dCham : Springer International Publishing,c2017$$z9783319675244 000805835 830_0 $$aTerrorism, security, and computation. 000805835 852__ $$bebk 000805835 85640 $$3SpringerLink$$uhttps://univsouthin.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-319-67526-8$$zOnline Access$$91397441.1 000805835 909CO $$ooai:library.usi.edu:805835$$pGLOBAL_SET 000805835 980__ $$aEBOOK 000805835 980__ $$aBIB 000805835 982__ $$aEbook 000805835 983__ $$aOnline 000805835 994__ $$a92$$bISE