Results 21 to 30 of about 526,550 (191)

Behavior-Based Outlier Detection for Network Access Control Systems [PDF]

open access: yes, 2019
Network Access Control (NAC) systems manage the access of new devices into enterprise networks to prevent unauthorised devices from attacking network services. The main difficulty with this approach is that NAC cannot detect abnormal behaviour of devices
Dhillon Gurjeet Singh   +3 more
core   +1 more source

Outlier Detection Credit Card Transactions Using Local Outlier Factor Algorithm (LOF)

open access: yesIJCCS (Indonesian Journal of Computing and Cybernetics Systems), 2019
Threats or fraud for credit card owners and banks as service providers have been harmed by the actions of perpetrators of credit card thieves. All transaction data are stored in the bank's database, but are limited in information and cannot be used as a ...
Silvano Sugidamayatno, Danang Lelono
doaj   +1 more source

Detecting outlier samples in microarray data [PDF]

open access: yes, 2009
In this paper, we address the problem of detecting outlier samples with highly different expression patterns in microarray data. Although outliers are not common, they appear even in widely used benchmark data sets and can negatively affect microarray ...
Hung, YS, Shieh, AD
core   +1 more source

Outlier Identification in Model-Based Cluster Analysis [PDF]

open access: yesJournal of Classification, 2015
In model-based clustering based on normal-mixture models, a few outlying observations can influence the cluster structure and number. This paper develops a method to identify these, however it does not attempt to identify clusters amidst a large field of noisy observations. We identify outliers as those observations in a cluster with minimal membership
Evans, Katie   +2 more
openaire   +3 more sources

Predicting software project effort: A grey relational analysis based method [PDF]

open access: yes, 2011
This is the post-print version of the final paper published in Expert Systems with Applications. The published article is available from the link below. Changes resulting from the publishing process, such as peer review, editing, corrections, structural ...
Albrecht   +45 more
core   +1 more source

Differentially Private Analysis of Outliers [PDF]

open access: yes, 2015
This paper presents an investigation of differentially private analysis of distance-based outliers. Outlier detection aims to identify instances that are apparently distant from other instances. Meanwhile, the objective of differential privacy is to conceal the presence or absence of any particular instance. Outlier detection and privacy protection are
Rina Okada, Kazuto Fukuchi, Jun Sakuma
openaire   +3 more sources

On the maximum drawdown during speculative bubbles [PDF]

open access: yes, 2006
A taxonomy of large financial crashes proposed in the literature locates the burst of speculative bubbles due to endogenous causes in the framework of extreme stock market crashes, defined as falls of market prices that are outlier with respect to the ...
Ausloos   +10 more
core   +2 more sources

An integrated approach for identifying wrongly labelled samples when performing classification in microarray data. [PDF]

open access: yesPLoS ONE, 2012
Using hybrid approach for gene selection and classification is common as results obtained are generally better than performing the two tasks independently.
Yuk Yee Leung   +2 more
doaj   +1 more source

Outlier detection from ETL Execution trace

open access: yes, 2011
Extract, Transform, Load (ETL) is an integral part of Data Warehousing (DW) implementation. The commercial tools that are used for this purpose captures lot of execution trace in form of various log files with plethora of information.
Chakrabarti, Amlan   +2 more
core   +1 more source

Outlier(s) nos cálculos bibliométricos: primeiras aproximações │ Outlier(s) in bibliometric calculations: preliminary approach

open access: yesLiinc em Revista, 2013
Resumo Este artigo objetiva ilustrar a análise de outlier(s) aplicada aos cálculos bibliométricos. O Outlier é uma observação, elevada ou reduzida, em relação ao conjunto de dados. São três as causas possíveis para ocorrência de outlier: registro errado,
Luís Fernando Maia Lima   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy