Anomaly detection principles and algorithms (Record no. 29321)

000 -LEADER
fixed length control field nam a22 7a 4500
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 190219b xxu||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319675244
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 006.312
Item number MEH
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Mehrotra, Kishan G.
245 ## - TITLE STATEMENT
Title Anomaly detection principles and algorithms
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT)
Place of publication, distribution, etc Cham :
Name of publisher, distributor, etc Springer International Publishing,
Date of publication, distribution, etc 2017
300 ## - PHYSICAL DESCRIPTION
Extent xxii, 217 p. :
Other physical details ill. ;
Dimensions 24 cm.
365 ## - TRADE PRICE
Price type code EURO
Price amount 94.99
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc Includes bibliographical references and index.
520 ## - SUMMARY, ETC.
Summary, etc This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Topical term or geographic name as entry element Pattern perception
Topical term or geographic name as entry element Computer science
Topical term or geographic name as entry element Data mining
Topical term or geographic name as entry element Pattern Recognition
Topical term or geographic name as entry element Anomaly detection
Topical term or geographic name as entry element Knowledge discovery
Topical term or geographic name as entry element Optical pattern recognition
Topical term or geographic name as entry element Data protection
Topical term or geographic name as entry element Database management
Topical term or geographic name as entry element Security
Topical term or geographic name as entry element Internet
700 ## - ADDED ENTRY--PERSONAL NAME
Personal name Mohan, Chilukuri K.
Personal name Huang, Huaming
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Permanent location Current location Date acquired Source of acquisition Cost, normal purchase price Total Checkouts Total Renewals Full call number Barcode Checked out Date last seen Date last borrowed Koha item type
          DAIICT DAIICT 2019-02-18 Kushal books 8007.66 6 1 006.312 MEH 031777 2024-12-16 2024-05-09 2024-05-09 Books

Powered by Koha