000 -LEADER |
fixed length control field |
nam a22 7a 4500 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
190219b xxu||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319675244 |
082 ## - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
006.312 |
Item number |
MEH |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Mehrotra, Kishan G. |
245 ## - TITLE STATEMENT |
Title |
Anomaly detection principles and algorithms |
260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
Place of publication, distribution, etc |
Cham : |
Name of publisher, distributor, etc |
Springer International Publishing, |
Date of publication, distribution, etc |
2017 |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxii, 217 p. : |
Other physical details |
ill. ; |
Dimensions |
24 cm. |
365 ## - TRADE PRICE |
Price type code |
EURO |
Price amount |
94.99 |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc |
Includes bibliographical references and index. |
520 ## - SUMMARY, ETC. |
Summary, etc |
This book provides a readable and elegant presentation of the principles of anomaly detection,providing an easy introduction for newcomers to the field. A large number of algorithms are succinctly described, along with a presentation of their strengths and weaknesses. The authors also cover algorithms that address different kinds of problems of interest with single and multiple time series data and multi-dimensional data. New ensemble anomaly detection algorithms are described, utilizing the benefits provided by diverse algorithms, each of which work well on some kinds of data. With advancements in technology and the extensive use of the internet as a medium for communications and commerce, there has been a tremendous increase in the threats faced by individuals and organizations from attackers and criminal entities. Variations in the observable behaviors of individuals (from others and from their own past behaviors) have been found to be useful in predicting potential problems of various kinds. Hence computer scientists and statisticians have been conducting research on automatically identifying anomalies in large datasets. This book will primarily target practitioners and researchers who are newcomers to the area of modern anomaly detection techniques. Advanced-level students in computer science will also find this book helpful with their studies. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name as entry element |
Computer security |
|
Topical term or geographic name as entry element |
Pattern perception |
|
Topical term or geographic name as entry element |
Computer science |
|
Topical term or geographic name as entry element |
Data mining |
|
Topical term or geographic name as entry element |
Pattern Recognition |
|
Topical term or geographic name as entry element |
Anomaly detection |
|
Topical term or geographic name as entry element |
Knowledge discovery |
|
Topical term or geographic name as entry element |
Optical pattern recognition |
|
Topical term or geographic name as entry element |
Data protection |
|
Topical term or geographic name as entry element |
Database management |
|
Topical term or geographic name as entry element |
Security |
|
Topical term or geographic name as entry element |
Internet |
700 ## - ADDED ENTRY--PERSONAL NAME |
Personal name |
Mohan, Chilukuri K. |
|
Personal name |
Huang, Huaming |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Item type |
Books |