@Book{Kumar2005, author="V. Kumar", title="Parallel and distributed computing for cybersecurity", year="2005", publisher="Distributed Systems Online", address="Vol. 6, 9 pages," } @Book{Spence2001, author="C. Spence, L. Parra, P. Sajda", title="Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. In Proceedings of the IEEE Workshop on Mathematical Methods in Biomedical Image Analysis", year="2001", publisher="IEEE Workshop on Mathematical Methods in Biomedical Image Analysis", address="3--10," } @Article{Aleskerov1997, author="E. Aleskerov, B. Freisleben, B. Rao", title="Cardwatch: A neural network based database mining system for credit card fraud detection", journal="Proceedings of the IEEE/IAFE 1997 Computational Intelligence for Financial Engineering (CIFEr)", year="1997", pages="220--226", volume="1997" } @Article{Fujimaki2005, author="R. Fujimaki, T. Yairi, K. Machida", title="An approach to spacecraft anomaly detection problem using kernel feature space. In Proceeding of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining", journal="Proceedings of the eleventh ACM SIGKDD international conference on Knowledge discovery in data mining", year="2005", pages="401--410", volume="2005" } @Article{Teng1990, author="H. Teng, K. Chen, S. Lu", title="Adaptive real-time anomaly detection using inductively generated sequential patterns", journal="Proceedings. 1990 IEEE Computer Society Symposium on Research in Security and Privacy", year="1990", pages="278--284", volume="1990" } @Book{Rousseeuw1987, author="P. J. Rousseeuw, A. M. Leroy", title="Robust regression and outlier detection", year="1987", publisher="John Wiley & Sons", address="New York" } @Article{Song2007, author="X. Song, M. Wu, C. Jermaine, S. Ranka", title="Conditional anomaly detection", journal="IEEE Transactions on Knowledge and Data Engineering", year="2007", pages="631--645", volume="19" } @Article{Theiler2003, author="J. Theiler, D. M. Cai", title="Resampling approach for anomaly detection in multispectral images", journal="In: Algorithms and Technologies for Multispectral, Hyperspectral, and Ultraspectral Imagery IX", year="2003", pages="230--240", volume="2003" } @Book{Phoha2002, author="V. V. Phoha", title="The Springer Internet Security Dictionary", year="2002", publisher="Springer-Verlag", address="New York" } @Article{Wong2003, author="W.-K. Wong, A. Moore, G. Cooper, M. Wagner", title="Bayesian network anomaly pattern detection for disease outbreaks", journal="Proceedings of the 20th International Conference on Machine Learning", year="2003", pages="808--815", volume="2003" }