A review of unsupervised feature selection methods

S Solorio-Fernández, JA Carrasco-Ochoa… - Artificial Intelligence …, 2020 - Springer
In recent years, unsupervised feature selection methods have raised considerable interest in
many research areas; this is mainly due to their ability to identify and select relevant features …

Survey on anomaly detection using data mining techniques

S Agrawal, J Agrawal - Procedia Computer Science, 2015 - Elsevier
In the present world huge amounts of data are stored and transferred from one location to
another. The data when transferred or stored is primed exposed to attack. Although various …

[KIRJA][B] An introduction to outlier analysis

CC Aggarwal, CC Aggarwal - 2017 - Springer
Outliers are also referred to as abnormalities, discordants, deviants, or anomalies in the data
mining and statistics literature. In most applications, the data is created by one or more …

Network anomaly detection: methods, systems and tools

MH Bhuyan, DK Bhattacharyya… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Network anomaly detection is an important and dynamic research area. Many network
intrusion detection methods and systems (NIDS) have been proposed in the literature. In this …

[PDF][PDF] Feature selection

V Kumar, S Minz - SmartCR, 2014 - academia.edu
Relevant feature identification has become an essential task to apply data mining algorithms
effectively in real-world scenarios. Therefore, many feature selection methods have been …

A survey of parallel sequential pattern mining

W Gan, JCW Lin, P Fournier-Viger, HC Chao… - ACM Transactions on …, 2019 - dl.acm.org
With the growing popularity of shared resources, large volumes of complex data of different
types are collected automatically. Traditional data mining algorithms generally have …

A review of feature selection methods on synthetic data

V Bolón-Canedo, N Sánchez-Maroño… - … and information systems, 2013 - Springer
With the advent of high dimensionality, adequate identification of relevant features of the
data has become indispensable in real-world scenarios. In this context, the importance of …

Anomaly detection: A survey

V Chandola, A Banerjee, V Kumar - ACM computing surveys (CSUR), 2009 - dl.acm.org
Anomaly detection is an important problem that has been researched within diverse
research areas and application domains. Many anomaly detection techniques have been …

A survey of intrusion detection systems based on ensemble and hybrid classifiers

AA Aburomman, MBI Reaz - Computers & security, 2017 - Elsevier
Due to the frequency of malicious network activities and network policy violations, intrusion
detection systems (IDSs) have emerged as a group of methods that combats the …

Toward integrating feature selection algorithms for classification and clustering

H Liu, L Yu - IEEE Transactions on knowledge and data …, 2005 - ieeexplore.ieee.org
This paper introduces concepts and algorithms of feature selection, surveys existing feature
selection algorithms for classification and clustering, groups and compares different …