參考文獻 |
Abe, N., Zadrozny, B., & Langford, J. (2006). Outlier detection by active learning. Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining,
Aggarwal, C. C., & Aggarwal, C. C. (2017). An introduction to outlier analysis. Springer.
Aleskerov, E., Freisleben, B., & Rao, B. (1997). Cardwatch: A neural network based database mining system for credit card fraud detection. Proceedings of the IEEE/IAFE 1997 computational intelligence for financial engineering (CIFEr),
Anscombe, F. J. (1960). Rejection of outliers. Technometrics, 2(2), 123-146.
Böhmer, K., & Rinderle-Ma, S. (2016a). Multi-perspective anomaly detection in business process execution events. OTM Confederated International Conferences" On the Move to Meaningful Internet Systems",
Böhmer, K., & Rinderle-Ma, S. (2016b). Multi-perspective anomaly detection in business process execution events. On the Move to Meaningful Internet Systems: OTM 2016 Conferences: Confederated International Conferences: CoopIS, C&TC, and ODBASE 2016, Rhodes, Greece, October 24-28, 2016, Proceedings,
Chalapathy, R., & Chawla, S. (2019). Deep learning for anomaly detection: A survey. arXiv preprint arXiv:1901.03407.
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 1-58.
Chawla, N. V., Japkowicz, N., & Kotcz, A. (2004). Special issue on learning from imbalanced data sets. ACM SIGKDD explorations newsletter, 6(1), 1-6.
De Leoni, M., van der Aalst, W. M., & Dees, M. (2016). A general process mining framework for correlating, predicting and clustering dynamic behavior based on event logs. Information Systems, 56, 235-257.
Du, M., Li, F., Zheng, G., & Srikumar, V. (2017). Deeplog: Anomaly detection and diagnosis from system logs through deep learning. Proceedings of the 2017 ACM SIGSAC conference on computer and communications security,
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., & Stolfo, S. (2002). A geometric framework for unsupervised anomaly detection. In Applications of data mining in computer security (pp. 77-101). Springer.
Goldstein, M., & Uchida, S. (2016). A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PloS one, 11(4), e0152173.
Jain, A. K., & Dubes, R. C. (1988). Algorithms for clustering data. Prentice-Hall, Inc.
Joshi, M. V., Agarwal, R. C., & Kumar, V. (2001). Mining needle in a haystack: classifying rare classes via two-phase rule induction. Proceedings of the 2001 ACM SIGMOD international conference on Management of data,
Joshi, M. V., Agarwal, R. C., & Kumar, V. (2002). Predicting rare classes: Can boosting make any weak learner strong? Proceedings of the eighth ACM SIGKDD international conference on Knowledge discovery and data mining,
Kiymaz, H. (2020). Types of corporate fraud. In Corporate Fraud Exposed (pp. 19-38). Emerald Publishing Limited.
Kumar, V. (2005). Parallel and distributed computing for cybersecurity. IEEE Distributed Systems Online, 6(10).
Mohammadi, B., Fathy, M., & Sabokrou, M. (2021). Image/video deep anomaly detection: A survey. arXiv preprint arXiv:2103.01739.
Nolle, T., Seeliger, A., & Mühlhäuser, M. (2018). BINet: multivariate business process anomaly detection using deep learning. International Conference on Business Process Management,
Pang-Ning, T., Steinbach, M., & Kumar, V. (2005). Introduction to data mining Addison-Wesley. Princeton, USA: Independence Way, 4, 76-79.
Pang, G., Shen, C., Cao, L., & Hengel, A. V. D. (2021). Deep learning for anomaly detection: A review. ACM computing surveys (CSUR), 54(2), 1-38.
Pauly, M. V. (2000). Insurance reimbursement. In Handbook of health economics (Vol. 1, pp. 537-560). Elsevier.
Pauwels, S., & Calders, T. (2019). An anomaly detection technique for business processes based on extended dynamic bayesian networks. Proceedings of the 34th ACM/SIGAPP symposium on applied computing,
Spence, C., Parra, L., & Sajda, P. (2001). Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model. Proceedings IEEE workshop on mathematical methods in biomedical image analysis (MMBIA 2001),
Steinwart, I., Hush, D., & Scovel, C. (2005). A Classification Framework for Anomaly Detection. Journal of Machine Learning Research, 6(2).
Thill, M., Konen, W., Wang, H., & Bäck, T. (2021). Temporal convolutional autoencoder for unsupervised anomaly detection in time series. Applied Soft Computing, 112, 107751.
Van Der Aalst, W. M., Reijers, H. A., Weijters, A. J., van Dongen, B. F., De Medeiros, A. A., Song, M., & Verbeek, H. (2007). Business process mining: An industrial application. Information Systems, 32(5), 713-732.
Van Dongen, B. (2020). BPI Challenge 2020 (Version 1). 4TU.Centre for Research Data. https://doi.org/10.4121/UUID:52FB97D4-4588-43C9-9D04-3604D4613B51
Vilalta, R., & Ma, S. (2002). Predicting rare events in temporal domains. 2002 IEEE International Conference on Data Mining, 2002. Proceedings.,
Weiss, G. M., & Hirsh, H. (1998). Learning to Predict Rare Events in Event Sequences. KDD, |