Anomaly Detection 2
Anomaly Detection 2
Conclusion
Anomaly detection methods are essential for drawing vital inferences from the data, be it
real-world data or simulated data. This article has already explained how anomaly/outlier
detection has become indispensable in the field of cyber security, network protection and
fraud detection. Anomalies are also important for making the predictions made by the models
more accurate.
Finding outliers in a dataset is difficult when the analyst is unable to establish the definition
for the same. This is why we have so many different methods to classify data points now.
Further studies involving anomaly detection techniques are needed. The focus should be on
performance and accuracy at the same time. Data scientists are creating new and improved
algorithms and statistical techniques for utilizing the anomalies present in natural or synthetic
datasets.
References:
Aggarwal, C.C. (2017), “An Introduction to Outlier Analysis”, Outlier Analysis, Springer
International Publishing, pp. 1–34.
Cook, D.A., Zendejas, B., Hamstra, S.J., Hatala, R. and Brydges, R. (2014), “What counts as
validity evidence? Examples and prevalence in a systematic review of simulation-based
assessment”, Advances in Health Sciences Education, Springer Science and Business
Media Netherlands, Vol. 19 No. 2, pp. 233–250.
Datta, V., Bann, S., Beard, J., Mandalia, M. and Darzi, A. (2004), “Comparison of bench test
evaluations of surgical skill with live operating performance assessments”, Journal of the
American College of Surgeons, J Am Coll Surg, Vol. 199 No. 4, pp. 603–606.
Isaak, R., Chen, F., … S.M.-… : (2018). “Validity of Simulation-Based Assessment for
Accreditation Council for Graduate Medical Education Milestone Achievement”,
Pubmed.Ncbi. Nlm.Nih.Gov, available at: https://pubmed.ncbi.nlm.nih.gov/29373383/
(accessed 13 November 2022).
Jabez, J. and Muthukumar, B. (2015), “Intrusion detection system (ids): Anomaly detection
using outlier detection approach”, Procedia Computer Science, Elsevier B.V., Vol. 48 No.
C, pp. 338–346.
Koren, O., Koren, M. and Peretz, O. (2022), “A procedure for anomaly detection and
analysis”, Engineering Applications of Artificial Intelligence, Elsevier Ltd, Vol. 117,
available at: https://doi.org/10.1016/j.engappai.2022.105503.
Laskov, P., Düssel, P., Schäfer, C. and Rieck, K. (2005), “Learning intrusion detection:
Supervised or unsupervised?”, Lecture Notes in Computer Science (Including Subseries
Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Vol. 3617
LNCS, pp. 50–57.
McCluney, A.L., Vassiliou, M.C., Kaneva, P.A., Cao, J., Stanbridge, D.D., Feldman, L.S. and
Fried, G.M. (2007), “FLS simulator performance predicts intraoperative laparoscopic
skill”, Surgical Endoscopy and Other Interventional Techniques, Vol. 21 No. 11, pp.
1991–1995.
Omar, S., Ngadi, A., Computer, H.J.-I.J. (2013), “Machine learning techniques for anomaly
detection: an overview”, Researchgate.Net, Vol. 79 No. 2, pp. 975–8887.
Prasad, N.R., Almanza-Garcia, S. and Lu, T.T. (2009), “Anomaly detection”, Computers,
Materials and Continua, Vol. 14 No. 1, pp. 1–22.
Ruff, L., Vandermeulen, R.A., Görnitz, N., Binder, A., Müller, E., Müller, K.-R. and Kloft,
M. (2022). “Deep semi-supervised anomaly detection”, Arxiv.Org, available at:
https://arxiv.org/abs/1906.02694 (accessed 13 November 2022).
Smith, M.R. and Martinez, T. (2011), “Improving classification accuracy by identifying and
removing instances that should be misclassified”, Proceedings of the International Joint
Conference on Neural Networks, pp. 2690–2697.
Villa-Pérez, M., … M.A.-C.-K.-B. (2021). “Semi-supervised anomaly detection algorithms:
A comparative summary and future research directions”, Elsevier, available at:
https://www.sciencedirect.com/science/article/pii/S0950705121001416 (accessed 13
November 2022).
Zerbet, A. and Nikulin, M. (2003), “A new statistic for detecting outliers in exponential
case”, Communications in Statistics - Theory and Methods, Vol. 32 No. 3, pp. 573–583.
Zimek, A. and Filzmoser, P. (2018), “There and back again: Outlier detection between
statistical reasoning and data mining algorithms”, Wiley Interdisciplinary Reviews: Data
Mining and Knowledge Discovery, Wiley-Blackwell, Vol. 8 No. 6, available
at:https://doi.org/10.1002/WIDM.1280.