Skip to main content

Anomaly Detection on Streams

  • Reference work entry
Encyclopedia of Database Systems
  • 206 Accesses

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 2,500.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Aggarwal C.C., Han J., Wang J., and Yu P.S. A Framework for clustering evolving data streams. In Proc. 29th Int. Conf. on Very Large Data Bases, 2003, pp. 81–92.

    Google Scholar 

  2. Aggarwal C.C. and Yu P.S. A survey of synopsis construction in data streams. In Data Streams: Models and Algorithms. Springer, 2007.

    Google Scholar 

  3. Cormode G. and Muthukrishnan S. What’s new: finding significant differences in network data streams. IEEE/ACM Trans. Netw., 13(6):1219–1232, 2005.

    Article  Google Scholar 

  4. Guha S., Meyerson A., Mishra N., Motwani R., and O’Callaghan L. Clustering data streams: theory and practice. IEEE Trans. Knowl. Data Eng., 15(3):515–528, 2003.

    Article  Google Scholar 

  5. Hulten G., Spencer L., and Domingos P. Mining time-changing data streams. In Proc. 7th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2001, pp. 97–106.

    Google Scholar 

  6. Jain A.K., Narasimha Murty M. and Flynn P.J. Data clustering: a review. ACM Comput. Surv., 31(3):264–323, 1999.

    Article  Google Scholar 

  7. Kleinberg J. Bursty and hierarchical structure in streams. In Proc. 8th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2002, pp. 91–101.

    Google Scholar 

  8. Lee W., Stolfo S.J., and Mok K.W. Adaptive intrusion detection: a data mining approach. Artif. Intell. Rev. 14(6):533–567, 2000.

    Article  MATH  Google Scholar 

  9. Page E.S. Continuous inspection schemes. Biometrika, 41(1):100–115, 1954.

    MATH  MathSciNet  Google Scholar 

  10. Papadimitriou S., Sun J., and Faloutsos C. Streaming pattern discovery in multiple time-series. In Proc. 31st Int. Conf. on Very Large Data Bases, 2005, pp. 697–708.

    Google Scholar 

  11. Peter J.R. and Annick M.L. Robust Regression and Outlier Detection. Wiley, New York, 1987.

    MATH  Google Scholar 

  12. Wang H., Fan W., Yu P.S., and Han J. Mining concept-drifting data streams using ensemble classifiers. In Proc. 9th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2003, pp. 226–235.

    Google Scholar 

  13. Zhu Y. and Shasha D. StatStream: statistical monitoring of thousands of data streams in real time. In Proc. 28th Int. Conf. on Very Large Data Bases, 2002, pp. 358–369.

    Google Scholar 

  14. Zhu Y. and Shasha D. Efficient elastic burst detection in data streams. In Proc. 9th ACM SIGKDD Int. Conf. on Knowledge Discovery and Data Mining, 2003, pp. 336–345.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer Science+Business Media, LLC

About this entry

Cite this entry

Papadimitriou, S. (2009). Anomaly Detection on Streams. In: LIU, L., ÖZSU, M.T. (eds) Encyclopedia of Database Systems. Springer, Boston, MA. https://doi.org/10.1007/978-0-387-39940-9_18

Download citation

Publish with us

Policies and ethics