Books on the topic 'Anomaly Detection'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Anomaly Detection.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Yao, Danfeng Daphne, Xiaokui Shu, Long Cheng, and Salvatore J. Stolfo. Anomaly Detection as a Service. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-031-02354-5.
Full textMehrotra, Kishan G., Chilukuri K. Mohan, and HuaMing Huang. Anomaly Detection Principles and Algorithms. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-67526-8.
Full textWang, Xiaochun. Anomaly Detection in Video Surveillance. Springer Nature Singapore, 2024. http://dx.doi.org/10.1007/978-981-97-3023-0.
Full textWahid, Abdul, and Praveen Kumar Donta. Advanced Techniques for Anomaly Detection. CRC Press, 2025. https://doi.org/10.1201/9781003463559.
Full textBhuyan, Monowar H., Dhruba K. Bhattacharyya, and Jugal K. Kalita. Network Traffic Anomaly Detection and Prevention. Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-65188-0.
Full textSimon, Martin. Anomaly Detection in Random Heterogeneous Media. Springer Fachmedien Wiesbaden, 2015. http://dx.doi.org/10.1007/978-3-658-10993-6.
Full textPeng, Kuan-Chuan, Yizhou Wang, Ziyue Li, et al., eds. Human Activity Recognition and Anomaly Detection. Springer Nature Singapore, 2025. http://dx.doi.org/10.1007/978-981-97-9003-6.
Full textForrest, R. N. A program to compute magnetic anomaly detection probabilities. Naval Postgraduate School, 1988.
Find full textForrest, R. N. A program to compute magnetic anomaly detection probabilities. 2nd ed. Naval Postgraduate School, 1990.
Find full textAlla, Sridhar, and Suman Kalyan Adari. Beginning Anomaly Detection Using Python-Based Deep Learning. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5177-5.
Full textForrest, R. N. A program to compute electric anomaly detection probabilities. Naval Postgraduate School, 1988.
Find full textAdari, Suman Kalyan, and Sridhar Alla. Beginning Anomaly Detection Using Python-Based Deep Learning. Apress, 2024. http://dx.doi.org/10.1007/979-8-8688-0008-5.
Full textBurbeck, Kalle. Adaptive real-time anomaly detection for safeguarding critical networks. Department of Computer and Information Science, Linköpings universitet, 2006.
Find full textDinning, Anne. An evaluation of monitoring algorithms for access anomaly detection. Courant Institute of Mathematical Sciences, New York University, 1989.
Find full textDinning, Anne. An evaluation of monitoring algorithms for access anomaly detection. Courant Institute of Mathematical Sciences, New York University, 1989.
Find full textKennedy, Catriona Mairi. Distributed reflective architectures for anomaly detection and autonomous recovery. University of Birmingham, 2003.
Find full textTran, Kim Phuc, ed. Control Charts and Machine Learning for Anomaly Detection in Manufacturing. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-83819-5.
Full textJin, Shi, Zhaobo Zhang, Krishnendu Chakrabarty, and Xinli Gu. Anomaly-Detection and Health-Analysis Techniques for Core Router Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-33664-6.
Full textDinning, Anne. An empirical comparison of monitoring algorithms for access anomaly detection. Courant Institute of Mathematical Sciences, New York University, 1989.
Find full textDinning, Anne. An empirical comparison of monitoring algorithms for access anomaly detection. Courant Institute of Mathematical Sciences, New York University, 1989.
Find full textIsupova, Olga. Machine Learning Methods for Behaviour Analysis and Anomaly Detection in Video. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75508-3.
Full textKaya, Mehmet, Sleiman Alhajj, Kashfia Sailunaz, and Min-Yuh Day, eds. Social Network Analysis and Mining Applications in Healthcare and Anomaly Detection. Springer Nature Switzerland, 2024. https://doi.org/10.1007/978-3-031-75204-9.
Full textJakimovski, Bojan. Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-22505-5.
Full textBeigi, Mandis. On Optimal Quantization and its Effect on Anomaly Detection and Image Classification. [publisher not identified], 2013.
Find full textservice), SpringerLink (Online, ed. Biologically Inspired Approaches for Locomotion, Anomaly Detection and Reconfiguration for Walking Robots. Springer-Verlag GmbH Berlin Heidelberg, 2011.
Find full textKahn, Alan. Applying Anomaly Detection to Search for New Physics with the ATLAS Detector at the Large Hadron Collider. [publisher not identified], 2022.
Find full textUsman, Muhammad, Vallipuram Muthukkumarasamy, Xin-Wen Wu, and Surraya Khanum. Mobile Agent-Based Anomaly Detection and Verification System for Smart Home Sensor Networks. Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7467-7.
Full textUnited States. National Aeronautics and Space Administration., ed. System for anomaly and failure detection system development: Final report 30 September 1993. Rockwell International, Rocketdyne Division, 1993.
Find full textUnited States. National Aeronautics and Space Administration., ed. System for Anomaly and Failure Detection system development: Final report 24 July 1992. Rockwell International, Rocketdyne Division, 1992.
Find full textUnited States. National Aeronautics and Space Administration., ed. System for Anomaly and Failure Detection system development: Final report 24 July 1992. Rockwell International, Rocketdyne Division, 1992.
Find full textBaus, Wolfgang W. Magnetic anomaly detection using conventional and superconductive sensors with respect to vehicle monitoring. Brockmeyer, 1995.
Find full textCuadra-Sánchez, Antonio, and Javier Aracil-Rico. Traffic Anomaly Detection. Elsevier, 2015.
Find full textCuadra-Sánchez, Antonio, and Javier Aracil-Rico. Traffic Anomaly Detection. ISTE Press Limited - Elsevier Incorporated, 2015.
Find full textMehrotra, Kishan G., Chilukuri K. Mohan, and HuaMing Huang. Anomaly Detection Principles and Algorithms. Springer, 2019.
Find full textBanu, Saira. Anomaly Detection: Techniques and Applications. Nova Science Publishers, Incorporated, 2021.
Find full textMehrotra, Kishan G., Chilukuri K. Mohan, and HuaMing Huang. Anomaly Detection Principles and Algorithms. Springer, 2018.
Find full textBanu, Saira. Anomaly Detection: Techniques and Applications. Nova Science Publishers, Incorporated, 2021.
Find full textHandbook of Anomaly Detection : with Python Outlier Detection: Build and Modernize Your Anomaly Detection Models with Examples. Independently Published, 2023.
Find full textBeginning Anomaly Detection Using Python-Based Deep Learning: Implement Anomaly Detection Applications with Keras and Pytorch. Apress L. P., 2023.
Find full textBhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. Network Anomaly Detection: A Machine Learning Perspective. Taylor & Francis Group, 2013.
Find full textBhattacharyya, Dhruba Kumar. Network Anomaly Detection: A Machine Learning Perspective. Taylor & Francis Group, 2013.
Find full textBhattacharyya, Dhruba Kumar, and Jugal Kumar Kalita. Network Anomaly Detection: A Machine Learning Perspective. Taylor & Francis Group, 2013.
Find full textNetwork anomaly detection: A machine learning perspective. CRC Press, Taylor & Francis Group, 2014.
Find full textSimon, Cher. Deep Learning and XAI Techniques for Anomaly Detection: Integrating Theory and Practice of Explainable Deep Learning Anomaly Detection. Packt Publishing, Limited, 2023.
Find full textKhatri, Dr Rajkumar. Anomaly detection approach for detecting anomalies using netflow records and spark. Createspace Independent Publishing Platform, 2017.
Find full textRoopaei, Mehdi, and Peyman Najafirad (Paul Rad). Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection. Auerbach Publishers, Incorporated, 2018.
Find full textRoopaei, Mehdi, and Peyman Najafirad (Paul Rad). Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection. Auerbach Publishers, Incorporated, 2018.
Find full textRoopaei, Mehdi, and Peyman Najafirad (Paul Rad). Applied Cloud Deep Semantic Recognition: Advanced Anomaly Detection. Auerbach Publishers, Incorporated, 2018.
Find full text