Y. ;. Aggarwal, C. C. Yu, and P. S. , Outlier detection for high dimensional data, SIGMOD Records, vol.30, pp.37-46, 2001.

[. Aleskerov, Cardwatch: A neural network based database mining system for credit card fraud detection, IEEE Computational Intelligence for Financial Engineering, 1997.

, Detecting novel network intrusions using bayes estimators, 1st SIAM Conference on Data Mining, 2001.

T. Lewis, V. Barnett, T. Lewis, and T. , Outliers in statistical data, 1994.

, BACON: blocked adaptive computationally efficient outlier nominators. Computational Statistics and Data Analysis, Lof: identifying density-based local outliers. SIGMOD Records, vol.34, pp.93-104, 2000.

[. Chandola, Unsupervised anomaly detection with unlabeled data using clustering, ACM Computing Surveys, 2005.

, Data mining for network intrusion detection, NSF Workshop on Next Generation Data Mining, 2002.

, A local density based spatial clustering algorithm with noise, IEEE International Conference on Systems, Man and Cybernetics, 2004.

, A geometric framework for unsupervised anomaly detection: Detecting intrusions in unlabeled data, 2002.

, A density-based algorithm for discovering clusters in large spatial databases with noise, 2nd International Conference on Knowledge Discovery and Data Mining, 1996.

, A nonparametric outlier detection for effectively discovering top-n outliers from engineering data, Pacific-Asia conference on knowledge discovery and data mining, 2006.

, An approach to spacecraft anomaly detection problem using kernel feature space, 11th ACM SIGKDD international conference on Knowledge discovery in data mining, 2005.

[. He, Discovering cluster-based local outliers, Pattern Recognition Letters, p.24, 2003.

A. Hodge, V. Austin, and J. , A survey of outlier detection methodologies, Artificial Intelligence Review, p.22, 2004.

, Mining top-n local outliers in large databases, 7th ACM SIGKDD international conference on Knowledge discovery and data mining, pp.293-298, 2001.

[. Oldmeadow, , 2004.

, Adaptive clustering for network intrusion detection, 8th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, vol.3056, pp.255-259

E. M. Knorr and R. T. Ng, Algorithms for mining distance-based outliers in large datasets, 24rd International Conference on Very Large Data Bases, pp.392-403, 1998.

R. Hofmann-;-kwitt and U. Hofmann, Unsupervised anomaly detection in network traffic by means of robust pca, International Multi-Conference on Computing in the Global Information Technology, 2007.

, A comparative study of anomaly detection schemes in network intrusion detection, 3rd SIAM International Conference on Data Mining, 2003.

W. Stolfo-;-lee and S. J. Stolfo, Data mining approaches for intrusion detection, 7th conference on USENIX Security Symposium, 1998.

W. Xiang-;-lee and D. Xiang, Information-theoretic measures for anomaly detection, IEEE Symposium on Security and Privacy, 2001.

[. Locasto, Collaborative distributed intrusion detection, Columbia Unviersity Technical Report, 2004.

A. Masseglia-;-marascu and F. Masseglia, Parameterless outlier detection in data streams, SAC, pp.1491-1495, 2009.
URL : https://hal.archives-ouvertes.fr/inria-00461827

D. Marchette-;-marchette, A statistical method for profiling network traffic, 1st USENIX Workshop on Intrusion Detection and Network Monitoring, pp.119-128, 1999.

M. Singh-;-markou, S. Singh, and . Otey, Novelty detection: a review -part 1: statistical approaches. Signal Processing, 9th ACM SIGKDD international conference on Knowledge discovery and data mining, vol.83, pp.723-728, 2003.

[. Papadimitriou, LOCI: fast outlier detection using the local correlation integral, 19th International Conference on Data Engineering, 2003.

A. Park-;-patcha, J. Park, A. Santos-pereira-;-pires, and C. Santos-pereira, An overview of anomaly detection techniques: Existing solutions and latest technological trends. Comput. Networks, 51, International Conference on Robust Statistics, 2005.

, Efficient algorithms for mining outliers from large data sets, ACM CSS Workshop on Data Mining Applied to Security, vol.29, pp.427-438, 1996.

, Detection, synthesis and compression in mammographic image analysis with a hierarchical image probability model, IEEE Workshop on Mathematical Methods in Biomedical Image Analysis, 2001.

S. Valdes, A. Valdes, and K. Skinner, Probabilistic alert correlation, Recent Advances in Intrusion Detection, pp.54-68, 2001.

A. Vinueza, G. Grudic, N. Wu, J. Zhang, and . Yegneswaran, Unsupervised outlier detection and semi-supervised learning, Network and Distributed Security Symposium, p.14, 2003.