Results 21 to 30 of about 526,550 (191)
Behavior-Based Outlier Detection for Network Access Control Systems [PDF]
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices
Dhillon Gurjeet Singh +3 more
core +1 more source
Outlier Detection Credit Card Transactions Using Local Outlier Factor Algorithm (LOF)
Threats or fraud for credit card owners and banks as service providers have been harmed by the actions of perpetrators of credit card thieves. All transaction data are stored in the bank's database, but are limited in information and cannot be used as a ...
Silvano Sugidamayatno, Danang Lelono
doaj +1 more source
Detecting outlier samples in microarray data [PDF]
In this paper, we address the problem of detecting outlier samples with highly different expression patterns in microarray data. Although outliers are not common, they appear even in widely used benchmark data sets and can negatively affect microarray ...
Hung, YS, Shieh, AD
core +1 more source
Outlier Identification in Model-Based Cluster Analysis [PDF]
In model-based clustering based on normal-mixture models, a few outlying observations can influence the cluster structure and number. This paper develops a method to identify these, however it does not attempt to identify clusters amidst a large field of noisy observations. We identify outliers as those observations in a cluster with minimal membership
Evans, Katie +2 more
openaire +3 more sources
Predicting software project effort: A grey relational analysis based method [PDF]
This is the post-print version of the final paper published in Expert Systems with Applications. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural ...
Albrecht +45 more
core +1 more source
Differentially Private Analysis of Outliers [PDF]
This paper presents an investigation of differentially private analysis of distance-based outliers. Outlier detection aims to identify instances that are apparently distant from other instances. Meanwhile, the objective of differential privacy is to conceal the presence or absence of any particular instance. Outlier detection and privacy protection are
Rina Okada, Kazuto Fukuchi, Jun Sakuma
openaire +3 more sources
On the maximum drawdown during speculative bubbles [PDF]
A taxonomy of large financial crashes proposed in the literature locates the burst of speculative bubbles due to endogenous causes in the framework of extreme stock market crashes, defined as falls of market prices that are outlier with respect to the ...
Ausloos +10 more
core +2 more sources
An integrated approach for identifying wrongly labelled samples when performing classification in microarray data. [PDF]
Using hybrid approach for gene selection and classification is common as results obtained are generally better than performing the two tasks independently.
Yuk Yee Leung +2 more
doaj +1 more source
Outlier detection from ETL Execution trace
Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW) implementation. The commercial tools that are used for this purpose captures lot of execution trace in form of various log files with plethora of information.
Chakrabarti, Amlan +2 more
core +1 more source
Resumo Este artigo objetiva ilustrar a análise de outlier(s) aplicada aos cálculos bibliométricos. O Outlier é uma observação, elevada ou reduzida, em relação ao conjunto de dados. São três as causas possíveis para ocorrência de outlier: registro errado,
Luís Fernando Maia Lima +2 more
doaj +1 more source

