{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:05:30Z","timestamp":1776783930360,"version":"3.51.2"},"reference-count":188,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T00:00:00Z","timestamp":1559174400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2020,3,31]]},"abstract":"<jats:p>Anomaly detection has numerous applications in diverse fields. For example, it has been widely used for discovering network intrusions and malicious events. It has also been used in numerous other applications such as identifying medical malpractice or credit fraud. Detection of anomalies in quantitative data has received a considerable attention in the literature and has a venerable history. By contrast, and despite the widespread availability use of categorical data in practice, anomaly detection in categorical data has received relatively little attention as compared to quantitative data. This is because detection of anomalies in categorical data is a challenging problem. Some anomaly detection techniques depend on identifying a representative pattern then measuring distances between objects and this pattern. Objects that are far from this pattern are declared as anomalies. However, identifying patterns and measuring distances are not easy in categorical data compared with quantitative data. Fortunately, several papers focussing on the detection of anomalies in categorical data have been published in the recent literature. In this article, we provide a comprehensive review of the research on the anomaly detection problem in categorical data. Previous review articles focus on either the statistics literature or the machine learning and computer science literature. This review article combines both literatures. We review 36 methods for the detection of anomalies in categorical data in both literatures and classify them into 12 different categories based on the conceptual definition of anomalies they use. For each approach, we survey anomaly detection methods, and then show the similarities and differences among them. We emphasize two important issues, the number of parameters each method requires and its time complexity. The first issue is critical, because the performance of these methods are sensitive to the choice of these parameters. The time complexity is also very important in real applications especially in big data applications. We report the time complexity if it is reported by the authors of the methods. If it is not, then we derive it ourselves and report it in this article. In addition, we discuss the common problems and the future directions of the anomaly detection in categorical data.<\/jats:p>","DOI":"10.1145\/3312739","type":"journal-article","created":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T12:37:11Z","timestamp":1559306231000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":79,"title":["Anomaly Detection Methods for Categorical Data"],"prefix":"10.1145","volume":"52","author":[{"given":"Ayman","family":"Taha","sequence":"first","affiliation":[{"name":"Faculty of Computers and Information, Cairo University, Giza, Egypt"}]},{"given":"Ali S.","family":"Hadi","sequence":"additional","affiliation":[{"name":"American University in Cairo, Egypt, and Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,5,30]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2012.121912.00006"},{"key":"e_1_2_1_2_1","first-page":"99","article-title":"Outlier detection techniques for localization in wireless sensor networks: A survey","volume":"8","author":"Abukhalaf Hala","year":"2015","unstructured":"Hala Abukhalaf , Jianxin Wang , and Shigeng Zhang . 2015 . Outlier detection techniques for localization in wireless sensor networks: A survey . Int. J. Future Gen. Commun. Netw. 8 , 6 (2015), 99 -- 114 . Hala Abukhalaf, Jianxin Wang, and Shigeng Zhang. 2015. Outlier detection techniques for localization in wireless sensor networks: A survey. Int. J. Future Gen. Commun. Netw. 8, 6 (2015), 99--114.","journal-title":"Int. J. Future Gen. Commun. Netw."},{"key":"e_1_2_1_3_1","volume-title":"Outlier Analysis","author":"Aggarwal Charu C.","unstructured":"Charu C. Aggarwal . 2017. Outlier Analysis , 2 nd ed. Springer , Cham . Charu C. Aggarwal. 2017. Outlier Analysis, 2nd ed. Springer, Cham.","edition":"2"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375668"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of International Conference on Very Large Data Bases (VLDB\u201994)","author":"Agrawal Rakesh","year":"1994","unstructured":"Rakesh Agrawal and Ramakrishnan Srikant . 1994 . Fast algorithms for mining association rules in large databases . In Proceedings of International Conference on Very Large Data Bases (VLDB\u201994) . 487--499. Rakesh Agrawal and Ramakrishnan Srikant. 1994. Fast algorithms for mining association rules in large databases. In Proceedings of International Conference on Very Large Data Bases (VLDB\u201994). 487--499."},{"key":"e_1_2_1_7_1","volume-title":"Analysis of Ordinal Categorical Data","author":"Agresti A.","unstructured":"A. Agresti . 2010. Analysis of Ordinal Categorical Data ( 2 nd ed.). John Wiley 8 Sons, New York, NY. A. Agresti. 2010. Analysis of Ordinal Categorical Data (2nd ed.). John Wiley 8 Sons, New York, NY.","edition":"2"},{"key":"e_1_2_1_8_1","volume-title":"Categorical Data Analysis","author":"Agresti A.","unstructured":"A. Agresti . 2013. Categorical Data Analysis ( 3 rd ed.). John Wiley 8 Sons, New York, NY. A. Agresti. 2013. Categorical Data Analysis (3rd ed.). John Wiley 8 Sons, New York, NY.","edition":"3"},{"key":"e_1_2_1_9_1","volume-title":"A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal. 10(6)","author":"Agyemang Malik","year":"2006","unstructured":"Malik Agyemang , Ken Barker , and Rada Alhajj . 2006. A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal. 10(6) ( 2006 ), 521--538. Malik Agyemang, Ken Barker, and Rada Alhajj. 2006. A comprehensive survey of numeric and symbolic outlier mining techniques. Intell. Data Anal. 10(6) (2006), 521--538."},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.01.001"},{"key":"e_1_2_1_12_1","first-page":"31","article-title":"A survey on outliers detection in distributed data mining for big data","volume":"5","author":"Ajitha P.","year":"2015","unstructured":"P. Ajitha and E. Chandra . 2015 . A survey on outliers detection in distributed data mining for big data . J. Basic Appl. Sci. Res. 5 , 2 (2015), 31 -- 38 . P. Ajitha and E. Chandra. 2015. A survey on outliers detection in distributed data mining for big data. J. Basic Appl. Sci. Res. 5, 2 (2015), 31--38.","journal-title":"J. Basic Appl. Sci. Res."},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13672-6_40"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396816"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2006.29"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/645806.670167"},{"key":"e_1_2_1_18_1","first-page":"47","article-title":"Oulier analysis using frequent pattern mining: A review","volume":"5","author":"Ankur Yagnik N.","year":"2014","unstructured":"Yagnik N. Ankur and Ajay Shanker Singh . 2014 . Oulier analysis using frequent pattern mining: A review . Int. J. Comput. Sci. Info. Technol. 5 , 1 (2014), 47 -- 50 . Yagnik N. Ankur and Ajay Shanker Singh. 2014. Oulier analysis using frequent pattern mining: A review. Int. J. Comput. Sci. Info. Technol. 5, 1 (2014), 47--50.","journal-title":"Int. J. Comput. Sci. Info. Technol."},{"key":"e_1_2_1_19_1","first-page":"1852","article-title":"Survey on outlier pattern detection techniques for time-series data","volume":"1","author":"Archana N.","year":"2014","unstructured":"N. Archana and S. S. Pawar . 2014 . Survey on outlier pattern detection techniques for time-series data . Int. J. Sc. Res. 1 , 1 (2014), 1852 -- 1856 . N. Archana and S. S. Pawar. 2014. Survey on outlier pattern detection techniques for time-series data. Int. J. Sc. Res. 1, 1 (2014), 1852--1856.","journal-title":"Int. J. Sc. Res."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.22215\/timreview\/964"},{"key":"e_1_2_1_21_1","first-page":"191","article-title":"Activity and anomaly detection in smart home: A survey. In Next Generation Sensors and Systems, Subhas Chandra Mukhopadhyay (Ed.). Springer, New York, NY","volume":"9","author":"Bakar U. A. B. U. A.","year":"2016","unstructured":"U. A. B. U. A. Bakar , Hemant Ghayvat , S. F. Hasanm , and S. C. Mukhopadhyay . 2016 . Activity and anomaly detection in smart home: A survey. In Next Generation Sensors and Systems, Subhas Chandra Mukhopadhyay (Ed.). Springer, New York, NY , Chapter 9 , 191 -- 220 . U. A. B. U. A. Bakar, Hemant Ghayvat, S. F. Hasanm, and S. C. Mukhopadhyay. 2016. Activity and anomaly detection in smart home: A survey. In Next Generation Sensors and Systems, Subhas Chandra Mukhopadhyay (Ed.). Springer, New York, NY, Chapter 9, 191--220.","journal-title":"Chapter"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2006.252287"},{"key":"e_1_2_1_23_1","unstructured":"V. Barnett and T. Lewis. 1994. Outliers in Statistical Data (3rd ed.). John Wiley 8 Sons New York NY. V. Barnett and T. Lewis. 1994. Outliers in Statistical Data (3rd ed.). John Wiley 8 Sons New York NY."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956758"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1155\/2008\/218140"},{"key":"e_1_2_1_26_1","first-page":"462","article-title":"The detail survey of anomaly\/outlier detection methods in data mining","volume":"3","author":"Beldar Alka P.","year":"2015","unstructured":"Alka P. Beldar and Vinod S. Wadne . 2015 . The detail survey of anomaly\/outlier detection methods in data mining . Int. J. Multidisc. Curr. Res. 3 (2015), 462 -- 472 . Alka P. Beldar and Vinod S. Wadne. 2015. The detail survey of anomaly\/outlier detection methods in data mining. Int. J. Multidisc. Curr. Res. 3 (2015), 462--472.","journal-title":"Int. J. Multidisc. Curr. Res."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/FUZZ-IEEE.2015.7337939"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020554"},{"key":"e_1_2_1_29_1","volume-title":"Proceedings of the International Conference on Quality Up-gradation in Engineering, Science and Technology (ICQUEST\u201914)","author":"Bhagyashree Umale","unstructured":"Umale Bhagyashree and M. Nilav . 2014. Overview of k-means and expectation maximization algorithm for document clustering . In Proceedings of the International Conference on Quality Up-gradation in Engineering, Science and Technology (ICQUEST\u201914) . 5--8. Umale Bhagyashree and M. Nilav. 2014. Overview of k-means and expectation maximization algorithm for document clustering. In Proceedings of the International Conference on Quality Up-gradation in Engineering, Science and Technology (ICQUEST\u201914). 5--8."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(99)00101-2"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557042"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972788.22"},{"key":"e_1_2_1_33_1","first-page":"1","article-title":"A mixture model-based combination approach for outlier detection","volume":"23","author":"Bouguessa Mohamed","year":"2014","unstructured":"Mohamed Bouguessa . 2014 . A mixture model-based combination approach for outlier detection . Int. J. Artific. Intell. Tools 23 , 4 (2014), 1 -- 21 . Mohamed Bouguessa. 2014. A mixture model-based combination approach for outlier detection. Int. J. Artific. Intell. Tools 23, 4 (2014), 1--21.","journal-title":"Int. J. Artific. Intell. Tools"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2015.07.018"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"e_1_2_1_37_1","doi-asserted-by":"crossref","unstructured":"E. Castillo J. M. Guti\u00e9rrez and A. S. Hadi. 1997. Expert Systems and Probabilistic Network Models. Springer-Verlag New York NY. E. Castillo J. M. Guti\u00e9rrez and A. S. Hadi. 1997. Expert Systems and Probabilistic Network Models. Springer-Verlag New York NY.","DOI":"10.1007\/978-1-4612-2270-5"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"e_1_2_1_40_1","first-page":"1","article-title":"Understanding Categorical Similarity Measures for Outlier Detection. Technical Report. University of Minnesota","author":"Chandola V.","year":"2008","unstructured":"V. Chandola , S. Boriah , and V. Kumar . 2008 . Understanding Categorical Similarity Measures for Outlier Detection. Technical Report. University of Minnesota , Department of Computer Science and Engineering , 1 - 46 . V. Chandola, S. Boriah, and V. Kumar. 2008. Understanding Categorical Similarity Measures for Outlier Detection. Technical Report. University of Minnesota, Department of Computer Science and Engineering, 1-46.","journal-title":"Department of Computer Science and Engineering"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the International SIAM Data Mining Conference (SDM\u201909)","author":"Chandola V.","unstructured":"V. Chandola , S. Boriah , and V. Kumar . 2009. A framework for exploring categorical data . In Proceedings of the International SIAM Data Mining Conference (SDM\u201909) . 187--198. V. Chandola, S. Boriah, and V. Kumar. 2009. A framework for exploring categorical data. In Proceedings of the International SIAM Data Mining Conference (SDM\u201909). 187--198."},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1177013622"},{"key":"e_1_2_1_43_1","volume-title":"Hadi","author":"Chatterjee S.","year":"1988","unstructured":"S. Chatterjee and Ali S . Hadi . 1988 . Sensitivity Analysis in Linear Regression. John Wiley 8 Sons, New York, NY. S. Chatterjee and Ali S. Hadi. 1988. Sensitivity Analysis in Linear Regression. John Wiley 8 Sons, New York, NY."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225649.3225880"},{"key":"e_1_2_1_45_1","volume-title":"Klooster","author":"Cheng Haibin","year":"2009","unstructured":"Haibin Cheng , Pang-Ning Tan , Christopher Potter , and Steven A . Klooster . 2009 . Detection and characterization of anomalies in multivariate time series. In Proceedings of the SIAM International Conference on Data Mining (SDM\u201909). 413--424. Haibin Cheng, Pang-Ning Tan, Christopher Potter, and Steven A. Klooster. 2009. Detection and characterization of anomalies in multivariate time series. In Proceedings of the SIAM International Conference on Data Mining (SDM\u201909). 413--424."},{"key":"e_1_2_1_46_1","volume-title":"Statistical Analysis in Proteomics","author":"Cho HyungJun","unstructured":"HyungJun Cho and Soo-Heang Eo. 2016. Outlier detection for mass spectrometric data . In Statistical Analysis in Proteomics , Klaus Jung (Ed.). Springer , New York, NY , Chapter 5, 91--102. HyungJun Cho and Soo-Heang Eo. 2016. Outlier detection for mass spectrometric data. In Statistical Analysis in Proteomics, Klaus Jung (Ed.). Springer, New York, NY, Chapter 5, 91--102."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90060-D"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.21500\/20112084.844"},{"key":"e_1_2_1_49_1","first-page":"235","article-title":"A survey of various intrusion detection techniques in wireless sensor networks","volume":"2","author":"Daniel J. Vijay","year":"2013","unstructured":"J. Vijay Daniel , S. Joshna , and P. Manjula . 2013 . A survey of various intrusion detection techniques in wireless sensor networks . Int. J. Comput. Sci. Mobile Comput. 2 , 9 (2013), 235 -- 246 . J. Vijay Daniel, S. Joshna, and P. Manjula. 2013. A survey of various intrusion detection techniques in wireless sensor networks. Int. J. Comput. Sci. Mobile Comput. 2, 9 (2013), 235--246.","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281219"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1401890.1401915"},{"key":"e_1_2_1_52_1","first-page":"137","article-title":"A review of various statistical methods for outlier detection","volume":"5","author":"Dave Dhwani","year":"2014","unstructured":"Dhwani Dave and Tanvi Varma . 2014 . A review of various statistical methods for outlier detection . Int. J. Comput. Sci. Eng. Technol. 5 , 2 (2014), 137 -- 140 . Dhwani Dave and Tanvi Varma. 2014. A review of various statistical methods for outlier detection. Int. J. Comput. Sci. Eng. Technol. 5, 2 (2014), 137--140.","journal-title":"Int. J. Comput. Sci. Eng. Technol."},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/324119.324126"},{"key":"e_1_2_1_54_1","volume-title":"Advanced Statistical Methods for the Analysis of Large Data-Sets, Agostino Di Ciaccio, Mauro Coli, and Jose Miguel Angulo Iba\u00f1ez (Eds.)","author":"D\u2019Enza Alfonso Iodice","unstructured":"Alfonso Iodice D\u2019Enza and Michael Greenacre . 2012. Multiple correspondence analysis for the quantification and visualization of large categorical data sets . In Advanced Statistical Methods for the Analysis of Large Data-Sets, Agostino Di Ciaccio, Mauro Coli, and Jose Miguel Angulo Iba\u00f1ez (Eds.) . Springer , 453--463. Alfonso Iodice D\u2019Enza and Michael Greenacre. 2012. Multiple correspondence analysis for the quantification and visualization of large categorical data sets. In Advanced Statistical Methods for the Analysis of Large Data-Sets, Agostino Di Ciaccio, Mauro Coli, and Jose Miguel Angulo Iba\u00f1ez (Eds.). Springer, 453--463."},{"key":"e_1_2_1_55_1","first-page":"15453","article-title":"A survey on outlier detection technique in streaming data using data clustering approach","volume":"5","author":"Deshmukh Mr.","year":"2016","unstructured":"Mr. Mukesh K. Deshmukh and A. S. Kapse . 2016 . A survey on outlier detection technique in streaming data using data clustering approach . Int. J. Engineering and Computer Science 5 , 1 (2016), 15453 -- 15456 . Mr. Mukesh K. Deshmukh and A. S. Kapse. 2016. A survey on outlier detection technique in streaming data using data clustering approach. Int. J. Engineering and Computer Science 5, 1 (2016), 15453--15456.","journal-title":"Int. J. Engineering and Computer Science"},{"key":"e_1_2_1_56_1","volume-title":"Recommender Systems Handbook","author":"Desrosiers Christian","unstructured":"Christian Desrosiers and George Karypis . 2011. A comprehensive survey of neighborhood-based recommendation methods . In Recommender Systems Handbook . Springer-Verlag New York , NY , 107--144. Christian Desrosiers and George Karypis. 2011. A comprehensive survey of neighborhood-based recommendation methods. In Recommender Systems Handbook. Springer-Verlag New York, NY, 107--144."},{"key":"e_1_2_1_57_1","first-page":"797","article-title":"Hubness in unsupervised outlier detection techniques for high dimensional data--A survey","volume":"4","author":"Lakshmi Devi R.","year":"2015","unstructured":"R. Lakshmi Devi and R. Amalraj . 2015 . Hubness in unsupervised outlier detection techniques for high dimensional data--A survey . Int. J. Comput. Appl. Technol. Res. 4 , 11 (2015), 797 -- 801 . R. Lakshmi Devi and R. Amalraj. 2015. Hubness in unsupervised outlier detection techniques for high dimensional data--A survey. Int. J. Comput. Appl. Technol. Res. 4, 11 (2015), 797--801.","journal-title":"Int. J. Comput. Appl. Technol. Res."},{"key":"e_1_2_1_58_1","first-page":"356","article-title":"A survey on profile-injection attacks in recommender systems using outlier analysis","volume":"2","author":"Dhimmar Jiten Harishbhai","year":"2014","unstructured":"Jiten Harishbhai Dhimmar and Raksha Chauhan . 2014 . A survey on profile-injection attacks in recommender systems using outlier analysis . Int. J. Adv. Res. Comput. Sci. Manage. Studies 2 , 12 (2014), 356 -- 359 . Jiten Harishbhai Dhimmar and Raksha Chauhan. 2014. A survey on profile-injection attacks in recommender systems using outlier analysis. Int. J. Adv. Res. Comput. Sci. Manage. Studies 2, 12 (2014), 356--359.","journal-title":"Int. J. Adv. Res. Comput. Sci. Manage. Studies"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2013.12.002"},{"key":"e_1_2_1_60_1","first-page":"899","article-title":"Survey on outlier detection techniques using categorical data","volume":"3","author":"Divya K. T.","year":"2016","unstructured":"K. T. Divya and N. S. Kumaran . 2016 . Survey on outlier detection techniques using categorical data . Int. Res. J. Eng. Technol. 3 (2016), 899 -- 904 . K. T. Divya and N. S. Kumaran. 2016. Survey on outlier detection techniques using categorical data. Int. Res. J. Eng. Technol. 3 (2016), 899--904.","journal-title":"Int. Res. J. Eng. Technol."},{"key":"e_1_2_1_61_1","volume-title":"Proceedings of the NSF Workshop on Next Generation Data Mining. 21--30","author":"Dokas Paul","year":"2002","unstructured":"Paul Dokas , Levent Ertoz , Vipin Kumar , Aleksandar Lazarevic , Jaideep Srivastava , and Pang-Ning Tan . 2002 . Data mining for network intrusion detection . In Proceedings of the NSF Workshop on Next Generation Data Mining. 21--30 . Paul Dokas, Levent Ertoz, Vipin Kumar, Aleksandar Lazarevic, Jaideep Srivastava, and Pang-Ning Tan. 2002. Data mining for network intrusion detection. In Proceedings of the NSF Workshop on Next Generation Data Mining. 21--30."},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/11528043_42"},{"key":"e_1_2_1_63_1","volume-title":"Statistics in Geography: A Practical Approach-Revised with 17 Programs","author":"Ebdon David","unstructured":"David Ebdon . 1991. Statistics in Geography: A Practical Approach-Revised with 17 Programs . Wiley-Blackwell , Hoboken, NJ . David Ebdon. 1991. Statistics in Geography: A Practical Approach-Revised with 17 Programs. Wiley-Blackwell, Hoboken, NJ."},{"key":"e_1_2_1_64_1","volume-title":"Proceedings of the IEEE Workshop on Information Assurance and Security","author":"Emran Syed Masum","year":"2001","unstructured":"Syed Masum Emran and Nong Ye . 2001 . Robustness of Canberra metric in computer intrusion detection . In Proceedings of the IEEE Workshop on Information Assurance and Security . New York, NY, 80--84. Syed Masum Emran and Nong Ye. 2001. Robustness of Canberra metric in computer intrusion detection. In Proceedings of the IEEE Workshop on Information Assurance and Security. New York, NY, 80--84."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2016.01.027"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-015-9444-8"},{"key":"e_1_2_1_67_1","first-page":"768","article-title":"Cluster analysis of multivariate data: Efficiency versus interpretability of classifications","volume":"21","author":"Forgy E. W.","year":"1965","unstructured":"E. W. Forgy . 1965 . Cluster analysis of multivariate data: Efficiency versus interpretability of classifications . Biometrics 21 (1965), 768 -- 780 . E. W. Forgy. 1965. Cluster analysis of multivariate data: Efficiency versus interpretability of classifications. Biometrics 21 (1965), 768--780.","journal-title":"Biometrics"},{"key":"e_1_2_1_68_1","unstructured":"A. Frank and A. Asuncion. 2018. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml\/datasets.html. A. Frank and A. Asuncion. 2018. UCI Machine Learning Repository. Retrieved from http:\/\/archive.ics.uci.edu\/ml\/datasets.html."},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835907"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2008.08.003"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1871437.1871716"},{"key":"e_1_2_1_72_1","volume-title":"Proceedings of the Joint Statistical Meetings. American Statistical Association, 3455--3460","author":"Ghosh Dhiren","year":"2012","unstructured":"Dhiren Ghosh and Andrew Vogt . 2012 . Outliers: An evaluation of methodologies . In Proceedings of the Joint Statistical Meetings. American Statistical Association, 3455--3460 . Dhiren Ghosh and Andrew Vogt. 2012. Outliers: An evaluation of methodologies. In Proceedings of the Joint Statistical Meetings. American Statistical Association, 3455--3460."},{"key":"e_1_2_1_73_1","volume-title":"Proceedings of the IEEE International Conference on Data Mining (ICDM\u201904)","author":"Ghoting A.","unstructured":"A. Ghoting , M. E. Otey , and S. Parthasarathy . 2004. Loaded: Link-based outlier and anomaly detection in evolving data sets . In Proceedings of the IEEE International Conference on Data Mining (ICDM\u201904) . 387--390. A. Ghoting, M. E. Otey, and S. Parthasarathy. 2004. Loaded: Link-based outlier and anomaly detection in evolving data sets. In Proceedings of the IEEE International Conference on Data Mining (ICDM\u201904). 387--390."},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-008-0093-2"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxr026"},{"key":"e_1_2_1_76_1","volume-title":"van Loan","author":"Golub Gene H.","year":"2012","unstructured":"Gene H. Golub and Charles F . van Loan . 2012 . Matrix Computations, 3 rd ed. John Hopkins University Press . Gene H. Golub and Charles F. van Loan. 2012. Matrix Computations, 3rd ed. John Hopkins University Press.","edition":"3"},{"key":"e_1_2_1_77_1","volume-title":"Probability and Random Processes","author":"Grimmett Geoffrey","unstructured":"Geoffrey Grimmett and David Stirzaker . 2001. Probability and Random Processes , 3 rd ed. Oxford University Press, Oxford , UK. Geoffrey Grimmett and David Stirzaker. 2001. Probability and Random Processes, 3rd ed. Oxford University Press, Oxford, UK.","edition":"3"},{"key":"e_1_2_1_78_1","first-page":"2063","article-title":"A survey on intrusion detection using outlier detection techniques","volume":"2","author":"Gunamani V.","year":"2013","unstructured":"V. Gunamani and M. Abarna . 2013 . A survey on intrusion detection using outlier detection techniques . Int. J. Sci. Eng. Technol. Res. 2 , 11 (2013), 2063 -- 2068 . V. Gunamani and M. Abarna. 2013. A survey on intrusion detection using outlier detection techniques. Int. J. Sci. Eng. Technol. Res. 2, 11 (2013), 2063 --2068.","journal-title":"Int. J. Sci. Eng. Technol. Res."},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.5555\/2621979"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.184"},{"key":"e_1_2_1_81_1","doi-asserted-by":"crossref","first-page":"761","DOI":"10.1111\/j.2517-6161.1992.tb01449.x","article-title":"Identifying multiple outliers in multivariate data","volume":"54","author":"Hadi Ali S.","year":"1992","unstructured":"Ali S. Hadi . 1992 . Identifying multiple outliers in multivariate data . J. Roy. Stat. Soc., Ser. B 54 (1992), 761 -- 771 . Ali S. Hadi. 1992. Identifying multiple outliers in multivariate data. J. Roy. Stat. Soc., Ser. B 54 (1992), 761--771.","journal-title":"J. Roy. Stat. Soc., Ser. B"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-9473(92)90078-T"},{"key":"e_1_2_1_83_1","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1111\/j.2517-6161.1994.tb01988.x","article-title":"A modification of a method for the detection of outliers in multivariate samples","volume":"56","author":"Hadi Ali S.","year":"1994","unstructured":"Ali S. Hadi . 1994 . A modification of a method for the detection of outliers in multivariate samples . J. Roy. Stat. Soc., Ser. B 56 (1994), 393 -- 396 . Ali S. Hadi. 1994. A modification of a method for the detection of outliers in multivariate samples. J. Roy. Stat. Soc., Ser. B 56 (1994), 393--396.","journal-title":"J. Roy. Stat. Soc., Ser. B"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.6"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1993.10476407"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIM.2013.2287117"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1007\/11538059_42"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/11731139_67"},{"key":"e_1_2_1_89_1","first-page":"726","article-title":"FP-outlier: Frequent pattern based outlier detection","volume":"2","author":"He Z.","year":"2005","unstructured":"Z. He , X. Xu , J. Z. Huang , and S. Deng . 2005 . FP-outlier: Frequent pattern based outlier detection . Comput. Sci. Info. Syst. 2 (2005), 726 -- 732 . Z. He, X. Xu, J. Z. Huang, and S. Deng. 2005. FP-outlier: Frequent pattern based outlier detection. Comput. Sci. Info. Syst. 2 (2005), 726--732.","journal-title":"Comput. Sci. Info. Syst."},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225634.3225771"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_2_1_92_1","volume-title":"Proceedings of the International Data Mining and Knowledge Discovery (DMKM\u201997)","author":"Huang Zhexue","year":"1997","unstructured":"Zhexue Huang . 1997 . A fast clustering algorithm to cluster very large categorical data sets in data mining . In Proceedings of the International Data Mining and Knowledge Discovery (DMKM\u201997) , Workshop at the ACM International Conference on Mangagement of Data (SIGKDD). 1--8. Zhexue Huang. 1997. A fast clustering algorithm to cluster very large categorical data sets in data mining. In Proceedings of the International Data Mining and Knowledge Discovery (DMKM\u201997), Workshop at the ACM International Conference on Mangagement of Data (SIGKDD). 1--8."},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/91.784206"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133360.2133361"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNNLS.2016.2526063"},{"key":"e_1_2_1_96_1","first-page":"166","article-title":"Detecting and visualizing outliers in provider profiling via funnel plots and mixed effect models. Health Care Manage","volume":"18","author":"Ieva Francesca","year":"2015","unstructured":"Francesca Ieva and Anna Maria Paganoni . 2015 . Detecting and visualizing outliers in provider profiling via funnel plots and mixed effect models. Health Care Manage . Sci. 18 , 2 (2015), 166 -- 172 . Francesca Ieva and Anna Maria Paganoni. 2015. Detecting and visualizing outliers in provider profiling via funnel plots and mixed effect models. Health Care Manage. Sci. 18, 2 (2015), 166--172.","journal-title":"Sci."},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.11.007"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-08979-9_14"},{"key":"e_1_2_1_99_1","first-page":"194","article-title":"Using data mining to detect health care fraud and abuse: A review of literature","volume":"7","author":"Joudaki Hossein","year":"2015","unstructured":"Hossein Joudaki , Arash Rashidian , Behrouz Minaei-Bidgoli , Mahmood Mahmoodi , Bijan Geraili , Mahdi Nasiri , and Mohammad Arab . 2015 . Using data mining to detect health care fraud and abuse: A review of literature . Global J. Health Sci. 7 , 1 (2015), 194 -- 202 . Hossein Joudaki, Arash Rashidian, Behrouz Minaei-Bidgoli, Mahmood Mahmoodi, Bijan Geraili, Mahdi Nasiri, and Mohammad Arab. 2015. Using data mining to detect health care fraud and abuse: A review of literature. Global J. Health Sci. 7, 1 (2015), 194--202.","journal-title":"Global J. Health Sci."},{"key":"e_1_2_1_100_1","volume-title":"Proceedings of the All-Russian Conference Digital Libraries: Advanced Methods and Technologies, Digital Collections (RCDL\u201914)","author":"Kalinichenko Leonid","year":"2014","unstructured":"Leonid Kalinichenko , Ivan Shanin , and Ilia Taraban . 2014 . Methods for anomaly detection: A survey . In Proceedings of the All-Russian Conference Digital Libraries: Advanced Methods and Technologies, Digital Collections (RCDL\u201914) . 20--25. Leonid Kalinichenko, Ivan Shanin, and Ilia Taraban. 2014. Methods for anomaly detection: A survey. In Proceedings of the All-Russian Conference Digital Libraries: Advanced Methods and Technologies, Digital Collections (RCDL\u201914). 20--25."},{"key":"e_1_2_1_101_1","first-page":"226","article-title":"A survey on outlier detection techniques useful for financial card fraud detection","volume":"6","author":"Kathiresan V.","year":"2015","unstructured":"V. Kathiresan and N. A. Vasanthi . 2015 . A survey on outlier detection techniques useful for financial card fraud detection . Int. J. Innovat. Eng. Technol. 6 , 1 (2015), 226 -- 235 . V. Kathiresan and N. A. Vasanthi. 2015. A survey on outlier detection techniques useful for financial card fraud detection. Int. J. Innovat. Eng. Technol. 6, 1 (2015), 226--235.","journal-title":"Int. J. Innovat. Eng. Technol."},{"key":"e_1_2_1_102_1","first-page":"1","article-title":"A survey of data mining and social network analysis based anomaly detection techniques","volume":"39","author":"Kaur Ravneet","year":"2015","unstructured":"Ravneet Kaur and Sarbjeet Singh . 2015 . A survey of data mining and social network analysis based anomaly detection techniques . Egypt. Info. J. 39 (2015), 1 -- 18 . Ravneet Kaur and Sarbjeet Singh. 2015. A survey of data mining and social network analysis based anomaly detection techniques. Egypt. Info. J. 39 (2015), 1--18.","journal-title":"Egypt. Info. J."},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1007\/s007780050006"},{"key":"e_1_2_1_104_1","volume-title":"Proceedings of the International Conference of the Centre for Advanced Studies on Collaborative Research (CASCON\u201997)","author":"Edwin","unstructured":"Edwin M. Knorr and Raymond T. Ng. 1997. A unified approach for mining outliers . In Proceedings of the International Conference of the Centre for Advanced Studies on Collaborative Research (CASCON\u201997) . 236--248. Edwin M. Knorr and Raymond T. Ng. 1997. A unified approach for mining outliers. In Proceedings of the International Conference of the Centre for Advanced Studies on Collaborative Research (CASCON\u201997). 236--248."},{"key":"e_1_2_1_105_1","volume-title":"Proceedings of the International Conference on Data Mining (DMIN\u201908)","author":"Koufakou A.","unstructured":"A. Koufakou , M. Georgiopoulos , and G. Anagnostopoulos . 2008. Detecting outliers in high-dimensional datasets with mixed attributes . In Proceedings of the International Conference on Data Mining (DMIN\u201908) . A. Koufakou, M. Georgiopoulos, and G. Anagnostopoulos. 2008. Detecting outliers in high-dimensional datasets with mixed attributes. In Proceedings of the International Conference on Data Mining (DMIN\u201908)."},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI.2007.32"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-010-0343-7"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972733.3"},{"key":"e_1_2_1_109_1","first-page":"199","article-title":"Cloud model-based outlier detect algorithm for categorical data","volume":"6","author":"Lei Dajiang","year":"2013","unstructured":"Dajiang Lei , Liping Zhang , and Lisheng Zhang . 2013 . Cloud model-based outlier detect algorithm for categorical data . Int. J. Database Theory Appl. 6 , 14 (2013), 199 -- 213 . Dajiang Lei, Liping Zhang, and Lisheng Zhang. 2013. Cloud model-based outlier detect algorithm for categorical data. Int. J. Database Theory Appl. 6, 14 (2013), 199--213.","journal-title":"Int. J. Database Theory Appl."},{"key":"e_1_2_1_110_1","first-page":"73","article-title":"Uncertainty in knowledge representation","volume":"2","author":"Li Deyi","year":"2000","unstructured":"Deyi Li . 2000 . Uncertainty in knowledge representation . Chinese Eng. Sci. 2 , 10 (2000), 73 -- 79 . Deyi Li. 2000. Uncertainty in knowledge representation. Chinese Eng. Sci. 2, 10 (2000), 73--79.","journal-title":"Chinese Eng. Sci."},{"key":"e_1_2_1_111_1","first-page":"1","article-title":"A new feature extraction algorithm based on entropy cloud characteristics of communication signals","volume":"2015","author":"Li Jingchao","year":"2015","unstructured":"Jingchao Li and Jian Guo . 2015 . A new feature extraction algorithm based on entropy cloud characteristics of communication signals . Math. Problems Eng. 2015 (2015), 1 -- 8 . Jingchao Li and Jian Guo. 2015. A new feature extraction algorithm based on entropy cloud characteristics of communication signals. Math. Problems Eng. 2015 (2015), 1--8.","journal-title":"Math. Problems Eng."},{"key":"e_1_2_1_112_1","volume-title":"Weighted outlier detection of high-dimensional categorical data using feature grouping","author":"Li Junli","year":"2018","unstructured":"Junli Li , Jifu Zhang , Ning Pang , and Xiao Qin . 2018. Weighted outlier detection of high-dimensional categorical data using feature grouping . IEEE Trans. Syst. Man Cybernet.: Syst . ( 2018 ), 1--14. Junli Li, Jifu Zhang, Ning Pang, and Xiao Qin. 2018. Weighted outlier detection of high-dimensional categorical data using feature grouping. IEEE Trans. Syst. Man Cybernet.: Syst. (2018), 1--14."},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2007.64"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1080\/0308107021000013635"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.5555\/1148928.1700950"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020571"},{"key":"e_1_2_1_117_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10707-013-0188-9"},{"key":"e_1_2_1_118_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.030713.00062"},{"key":"e_1_2_1_119_1","first-page":"12","article-title":"Comparative analysis of outlier detection techniques","volume":"97","author":"Malik Kamal","year":"2014","unstructured":"Kamal Malik , H. Sadawarti , and G. S. Kalra . 2014 . Comparative analysis of outlier detection techniques . Int. J. Comput. Appl. 97 , 8 (2014), 12 -- 21 . Kamal Malik, H. Sadawarti, and G. S. Kalra. 2014. Comparative analysis of outlier detection techniques. Int. J. Comput. Appl. 97, 8 (2014), 12--21.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_120_1","volume-title":"Introduction to Information Retrieval","author":"Manning Christopher D.","unstructured":"Christopher D. Manning , Prabhakar Raghavan , and Hinrich Schutze . 2008. Introduction to Information Retrieval . Cambridge University Press, Cambridge , UK. Christopher D. Manning, Prabhakar Raghavan, and Hinrich Schutze. 2008. Introduction to Information Retrieval. Cambridge University Press, Cambridge, UK."},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1186\/s13635-015-0021-0"},{"key":"e_1_2_1_122_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.018"},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2003.07.019"},{"key":"e_1_2_1_124_1","first-page":"1","article-title":"To detect outlier for categorical data streaming","volume":"6","author":"Mishra Manoj","year":"2015","unstructured":"Manoj Mishra and Nitesh Gupta . 2015 . To detect outlier for categorical data streaming . Int. J. Sci. Eng. Res. 6 , 5 (2015), 1 -- 5 . Manoj Mishra and Nitesh Gupta. 2015. To detect outlier for categorical data streaming. Int. J. Sci. Eng. Res. 6, 5 (2015), 1--5.","journal-title":"Int. J. Sci. Eng. Res."},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622788.1622792"},{"key":"e_1_2_1_126_1","volume-title":"Proceedings of the 20th International Conference on Machine Learning. 552--559","author":"Moore Andrew","unstructured":"Andrew Moore and W. K. Wong . 2003. Optimal reinsertion: A new search operator for accelerated and more accurate Bayesian network structure learning . In Proceedings of the 20th International Conference on Machine Learning. 552--559 . Andrew Moore and W. K. Wong. 2003. Optimal reinsertion: A new search operator for accelerated and more accurate Bayesian network structure learning. In Proceedings of the 20th International Conference on Machine Learning. 552--559."},{"key":"e_1_2_1_127_1","volume-title":"Progress in WWW Research and Development","author":"Narita Kazuyo","unstructured":"Kazuyo Narita and Hiroyuki Kitagawa . 2008. Detecting outliers in categorical record databases based on attribute associations . In Progress in WWW Research and Development . Springer , Berlin , 111--123. Kazuyo Narita and Hiroyuki Kitagawa. 2008. Detecting outliers in categorical record databases based on attribute associations. In Progress in WWW Research and Development. Springer, Berlin, 111--123."},{"key":"e_1_2_1_128_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2010.140"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-011-0234-x"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.112813.00168"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-005-0014-6"},{"key":"e_1_2_1_132_1","volume-title":"Proceedings of the International Workshop on Data Mining Methods for Anomaly Detection at ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD\u201905)","author":"Otey Matthew Eric","year":"2005","unstructured":"Matthew Eric Otey , Srinivasan Parthasarathy , and Amol Ghoting . 2005 . An empirical comparison of outlier detection algorithms . In Proceedings of the International Workshop on Data Mining Methods for Anomaly Detection at ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD\u201905) . 1--8. Matthew Eric Otey, Srinivasan Parthasarathy, and Amol Ghoting. 2005. An empirical comparison of outlier detection algorithms. In Proceedings of the International Workshop on Data Mining Methods for Anomaly Detection at ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD\u201905). 1--8."},{"key":"e_1_2_1_133_1","volume-title":"Proceedings of the 25th International Joint Conference on Artificial Intelligence. 1902--1908","author":"Pang Guansong","year":"2016","unstructured":"Guansong Pang , Longbing Cao , and Ling Chen . 2016 . Outlier detection in complex categorical data by modeling the feature value couplings . In Proceedings of the 25th International Joint Conference on Artificial Intelligence. 1902--1908 . Guansong Pang, Longbing Cao, and Ling Chen. 2016. Outlier detection in complex categorical data by modeling the feature value couplings. In Proceedings of the 25th International Joint Conference on Artificial Intelligence. 1902--1908."},{"key":"e_1_2_1_134_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.9790\/0661-16264448"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007738"},{"key":"e_1_2_1_138_1","volume-title":"Gayler","author":"Phua Clifton","year":"2010","unstructured":"Clifton Phua , Vincent C. S. Lee , Kate Smith-Miles , and Ross W . Gayler . 2010 . A comprehensive survey of data mining-based fraud detection research. Retrieved from http:\/\/arxiv.org\/abs\/1009.6119. Clifton Phua, Vincent C. S. Lee, Kate Smith-Miles, and Ross W. Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. Retrieved from http:\/\/arxiv.org\/abs\/1009.6119."},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sigpro.2013.12.026"},{"key":"e_1_2_1_140_1","first-page":"873","article-title":"Information-theoretic outlier detection for large-scale categorical data","volume":"4","author":"Pradip Srijoni Saha","year":"2015","unstructured":"Srijoni Saha Pradip , Jesica Fernandes Robert , and Jasmine Faujdar Hamza . 2015 . Information-theoretic outlier detection for large-scale categorical data . Int. J. Comput. Sci. Mobile Comput. 4 , 4 (2015), 873 -- 881 . Srijoni Saha Pradip, Jesica Fernandes Robert, and Jasmine Faujdar Hamza. 2015. Information-theoretic outlier detection for large-scale categorical data. Int. J. Comput. Sci. Mobile Comput. 4, 4 (2015), 873--881.","journal-title":"Int. J. Comput. Sci. Mobile Comput."},{"key":"e_1_2_1_141_1","first-page":"14946","article-title":"A survey paper on an effective analytical approaches for detecting outlier in continuous time variant data stream","volume":"4","author":"Purankar Raghav M.","year":"2015","unstructured":"Raghav M. Purankar and Pragati Patil . 2015 . A survey paper on an effective analytical approaches for detecting outlier in continuous time variant data stream . Int. J. Eng. Comput. Sci. 4 , 11 (2015), 14946 -- 14949 . Raghav M. Purankar and Pragati Patil. 2015. A survey paper on an effective analytical approaches for detecting outlier in continuous time variant data stream. Int. J. Eng. Comput. Sci. 4, 11 (2015), 14946--14949.","journal-title":"Int. J. Eng. Comput. Sci."},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335437"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1347"},{"key":"e_1_2_1_144_1","doi-asserted-by":"publisher","DOI":"10.5555\/2045820.2045909"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.3844\/ajassp.2012.1636.1652"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.3390\/s130810087"},{"key":"e_1_2_1_147_1","first-page":"1","article-title":"Outlier analysis of categorical data using navf","volume":"17","author":"Reddy D. Lakshmi Sreenivasa","year":"2013","unstructured":"D. Lakshmi Sreenivasa Reddy , B. Raveendra Babu , and A. Govardhan . 2013 . Outlier analysis of categorical data using navf . Informat. Econom. 17 , 1 (2013), 1 -- 5 . D. Lakshmi Sreenivasa Reddy, B. Raveendra Babu, and A. Govardhan. 2013. Outlier analysis of categorical data using navf. Informat. Econom. 17, 1 (2013), 1--5.","journal-title":"Informat. Econom."},{"key":"e_1_2_1_148_1","volume-title":"Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST\u201913)","author":"Rezaei Abdolazim","year":"2013","unstructured":"Abdolazim Rezaei , Zarinah M. Kasirun , Vala Ali Rohani , and Touraj Khodadadi . 2013 . Anomaly detection in online social networks using structure-based technique . In Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST\u201913) . 619--622. Abdolazim Rezaei, Zarinah M. Kasirun, Vala Ali Rohani, and Touraj Khodadadi. 2013. Anomaly detection in online social networks using structure-based technique. In Proceedings of the International Conference for Internet Technology and Secured Transactions (ICITST\u201913). 619--622."},{"key":"e_1_2_1_149_1","first-page":"609","article-title":"Outlier detection in WSN: A survey","volume":"3","author":"Kumar Tarun","year":"2013","unstructured":"Ritika, Tarun Kumar , and Amandeep Kaur . 2013 . Outlier detection in WSN: A survey . Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3 , 7 (2013), 609 -- 617 . Ritika, Tarun Kumar, and Amandeep Kaur. 2013. Outlier detection in WSN: A survey. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3, 7 (2013), 609--617.","journal-title":"Int. J. Adv. Res. Comput. Sci. Softw. Eng."},{"key":"e_1_2_1_150_1","first-page":"327","article-title":"Improving the performance of outlier detection methods for Categorical data by using weighting function","volume":"83","author":"Rokhman N.","year":"2016","unstructured":"N. Rokhman , Subanar, and E. Winarko . 2016 . Improving the performance of outlier detection methods for Categorical data by using weighting function . J. Theor. Appl.d Info.n Technol. 83 (2016), 327 -- 336 . N. Rokhman, Subanar, and E. Winarko. 2016. Improving the performance of outlier detection methods for Categorical data by using weighting function. J. Theor. Appl.d Info.n Technol. 83 (2016), 327--336.","journal-title":"J. Theor. Appl.d Info.n Technol."},{"key":"e_1_2_1_151_1","doi-asserted-by":"publisher","DOI":"10.2307\/1270566"},{"key":"e_1_2_1_152_1","first-page":"56","article-title":"Excess entropy based outlier detection in categorical data set","volume":"2","author":"Sagade Ashwini G.","year":"2014","unstructured":"Ashwini G. Sagade and Ritesh Thakur . 2014 . Excess entropy based outlier detection in categorical data set . Int. J. Adv. Comput. Eng. Netw. 2 , 8 (2014), 56 -- 61 . Ashwini G. Sagade and Ritesh Thakur. 2014. Excess entropy based outlier detection in categorical data set. Int. J. Adv. Comput. Eng. Netw. 2, 8 (2014), 56--61.","journal-title":"Int. J. Adv. Comput. Eng. Netw."},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.19026\/rjaset.6.3954"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.4236\/jis.2015.62015"},{"key":"e_1_2_1_155_1","doi-asserted-by":"publisher","DOI":"10.17485\/ijst\/2015\/v8i31\/75197"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2014.05.002"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_2_1_158_1","first-page":"1","article-title":"Mutual information between discrete variables with many categories using recursive adaptive partitioning. Sci","volume":"5","author":"Seok Junhee","year":"2015","unstructured":"Junhee Seok and Yeong Seon Kang . 2015 . Mutual information between discrete variables with many categories using recursive adaptive partitioning. Sci . Rep. 5 (2015), 1 -- 10 . Junhee Seok and Yeong Seon Kang. 2015. Mutual information between discrete variables with many categories using recursive adaptive partitioning. Sci. Rep. 5 (2015), 1--10.","journal-title":"Rep."},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9370-y"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_2_1_161_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIPECH.2014.7019101"},{"key":"e_1_2_1_162_1","doi-asserted-by":"publisher","DOI":"10.1109\/RIDE.2005.10"},{"key":"e_1_2_1_163_1","first-page":"307","article-title":"Outlier detection: Applications and techniques","volume":"9","author":"Singh Karanjit","year":"2012","unstructured":"Karanjit Singh and Shuchita Upadhyaya . 2012 . Outlier detection: Applications and techniques . Int. J. Comput. Sci. Iss. 9 , 1 (2012), 307 -- 323 . Karanjit Singh and Shuchita Upadhyaya. 2012. Outlier detection: Applications and techniques. Int. J. Comput. Sci. Iss. 9, 1 (2012), 307--323.","journal-title":"Int. J. Comput. Sci. Iss."},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972818.69"},{"key":"e_1_2_1_165_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2012.2215319"},{"key":"e_1_2_1_166_1","first-page":"20","article-title":"Outliers detection using subspace method: A survey","volume":"112","author":"Supriya Garule","year":"2015","unstructured":"Garule Supriya and Sharmila M. Shinde . 2015 . Outliers detection using subspace method: A survey . Int. J. Comput. Appl. 112 , 16 (2015), 20 -- 22 . Garule Supriya and Sharmila M. Shinde. 2015. Outliers detection using subspace method: A survey. Int. J. Comput. Appl. 112, 16 (2015), 20--22.","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_2_1_167_1","volume-title":"Proceedings of the 12th IEEE International Conference on Hybrid Intelligent Systems (HIS\u201912)","author":"Suri N. N. R. R.","unstructured":"N. N. R. R. Suri , M. N. Murty , and G. Athithan . 2012. An algorithm for mining outliers in categorical data through ranking . In Proceedings of the 12th IEEE International Conference on Hybrid Intelligent Systems (HIS\u201912) . 247--252. N. N. R. R. Suri, M. N. Murty, and G. Athithan. 2012. An algorithm for mining outliers in categorical data through ranking. In Proceedings of the 12th IEEE International Conference on Hybrid Intelligent Systems (HIS\u201912). 247--252."},{"key":"e_1_2_1_168_1","volume-title":"Proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI\u201913)","author":"Suri N. N. R. R.","unstructured":"N. N. R. R. Suri , M. N. Murty , and G. Athithan . 2013. A rough clustering algorithm for mining outliers in categorical data . In Proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI\u201913) . 170--175. N. N. R. R. Suri, M. N. Murty, and G. Athithan. 2013. A rough clustering algorithm for mining outliers in categorical data. In Proceedings of the 4th International Conference on Pattern Recognition and Machine Intelligence (PReMI\u201913). 170--175."},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.3233\/HIS-130179"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11047-015-9489-2"},{"key":"e_1_2_1_171_1","volume-title":"Proceedings of the ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA\u201913)","author":"Taha Ayman","unstructured":"Ayman Taha and Ali S. Hadi . 2013. A general approach for automating outliers identification in categorical data . In Proceedings of the ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA\u201913) . 1--8. Ayman Taha and Ali S. Hadi. 2013. A general approach for automating outliers identification in categorical data. In Proceedings of the ACS\/IEEE International Conference on Computer Systems and Applications (AICCSA\u201913). 1--8."},{"key":"e_1_2_1_172_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.022"},{"key":"e_1_2_1_173_1","volume-title":"Proceedings of International Conference on Informatics and Systems (INFOS\u201910)","author":"Taha Ayman","year":"2010","unstructured":"Ayman Taha and Osman Hegazy . 2010 . A proposed outliers identification algorithm for categorical data sets . In Proceedings of International Conference on Informatics and Systems (INFOS\u201910) . 1--5. Ayman Taha and Osman Hegazy. 2010. A proposed outliers identification algorithm for categorical data sets. In Proceedings of International Conference on Informatics and Systems (INFOS\u201910). 1--5."},{"key":"e_1_2_1_174_1","volume-title":"Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. IGI Global","author":"Wang Yun","unstructured":"Yun Wang . 2008. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. IGI Global , New York, NY . Yun Wang. 2008. Statistical Techniques for Network Security: Modern Statistically-Based Intrusion Detection and Protection. IGI Global, New York, NY."},{"key":"e_1_2_1_175_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2017.11.001"},{"key":"e_1_2_1_176_1","volume-title":"Proceedings of the ACM International Conference on Knowledge Discovery and data Mining (SIGKDD\u201903)","author":"Wei Li","unstructured":"Li Wei , Weining Qian , Aoying Zhou , Wen Jin , and Jeffrey X. Yu . 2003. Hypergraph-based outlier test for categorical data . In Proceedings of the ACM International Conference on Knowledge Discovery and data Mining (SIGKDD\u201903) . 399--410. Li Wei, Weining Qian, Aoying Zhou, Wen Jin, and Jeffrey X. Yu. 2003. Hypergraph-based outlier test for categorical data. In Proceedings of the ACM International Conference on Knowledge Discovery and data Mining (SIGKDD\u201903). 399--410."},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2336610"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.005"},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.5555\/2033831.2033841"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.261"},{"key":"e_1_2_1_181_1","volume-title":"Proceedings of the International Conference on Computing and Informatics (ICOCI\u201913)","author":"Yassin Warusia","year":"2013","unstructured":"Warusia Yassin , Nur Izura Udzir , Zaiton Muda , and Nasir Sulaiman . 2013 . Anomaly-based intrusion detection through k-means clustering and naives Bayes classification . In Proceedings of the International Conference on Computing and Informatics (ICOCI\u201913) . 298--303. Warusia Yassin, Nur Izura Udzir, Zaiton Muda, and Nasir Sulaiman. 2013. Anomaly-based intrusion detection through k-means clustering and naives Bayes classification. In Proceedings of the International Conference on Computing and Informatics (ICOCI\u201913). 298--303."},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.5555\/3225635.3225781"},{"key":"e_1_2_1_183_1","unstructured":"Rose Yu Huida Qiu Zhen Wen Ching-Yung Lin and Yan Liu. 2016. A survey on social media anomaly detection. Retrieevd from http:\/\/arxiv.org\/pdf\/1601.01102. Rose Yu Huida Qiu Zhen Wen Ching-Yung Lin and Yan Liu. 2016. A survey on social media anomaly detection. Retrieevd from http:\/\/arxiv.org\/pdf\/1601.01102."},{"key":"e_1_2_1_184_1","first-page":"1","article-title":"Advancements of outlier detection: A survey","volume":"13","author":"Zhang Ji","year":"2013","unstructured":"Ji Zhang . 2013 . Advancements of outlier detection: A survey . ICST Trans. Scal. Info. Syst. 13 , 1 (2013), 1 -- 26 . Ji Zhang. 2013. Advancements of outlier detection: A survey. ICST Trans. Scal. Info. Syst. 13, 1 (2013), 1--26.","journal-title":"ICST Trans. Scal. Info. Syst."},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2010.021510.00088"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-013-0202-4"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.3102\/1076998610366263"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.1002\/sam.11161"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312739","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3312739","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:02:00Z","timestamp":1750208520000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3312739"}},"subtitle":["A Review"],"short-title":[],"issued":{"date-parts":[[2019,5,30]]},"references-count":188,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2020,3,31]]}},"alternative-id":["10.1145\/3312739"],"URL":"https:\/\/doi.org\/10.1145\/3312739","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,30]]},"assertion":[{"value":"2017-01-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-01-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}