Skip to main content
Top
Published in: International Journal of Data Science and Analytics 4/2021

Open Access 04-08-2021 | Review

On the nature and types of anomalies: a review of deviations in data

Author: Ralph Foorthuis

Published in: International Journal of Data Science and Analytics | Issue 4/2021

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Anomalies are occurrences in a dataset that are in some way unusual and do not fit the general patterns. The concept of the anomaly is typically ill defined and perceived as vague and domain-dependent. Moreover, despite some 250 years of publications on the topic, no comprehensive and concrete overviews of the different types of anomalies have hitherto been published. By means of an extensive literature review this study therefore offers the first theoretically principled and domain-independent typology of data anomalies and presents a full overview of anomaly types and subtypes. To concretely define the concept of the anomaly and its different manifestations, the typology employs five dimensions: data type, cardinality of relationship, anomaly level, data structure, and data distribution. These fundamental and data-centric dimensions naturally yield 3 broad groups, 9 basic types, and 63 subtypes of anomalies. The typology facilitates the evaluation of the functional capabilities of anomaly detection algorithms, contributes to explainable data science, and provides insights into relevant topics such as local versus global anomalies.
Notes

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

1 Introduction

The physical and social world is known to bring about abnormal and bizarre phenomena that are seemingly hard to explain. Although rare by definition, such strange and unusual occurrences can actually also said to be relatively abundant due to the huge amount of objects and interactions in the world. Owing to the massive data collection taking place in the current era and the imperfect measurement systems used for this, anomalous observations can thus be expected to be amply present in our datasets. These large collections of data are mined in both academia and practice, with the aim of identifying patterns as well as peculiarities. The term anomalies in this context refers to cases, or groups of cases, that are in some way unusual and deviate from some notion of normality [113]. Such occurrences are often also referred to as outliers, novelties, deviants or discords [5, 1416]. Anomalies are assumed to be both rare and different, and pertain to a wide variety of phenomena, which include static entities and time-related events, single (atomic) cases and grouped (aggregated) cases, as well as desired and undesired observations [7, 9, 1621, 300, 319, 326]. Although anomalies can form a noise factor hindering the data analysis, they may also constitute the actual signals that one is looking for. Identifying them can be a difficult task due to the many shapes and sizes they come in, as illustrated in Fig. 1. Anomaly detection (AD) is the process of analyzing the data to identify these unusual occurrences. Outlier research has a long history and traditionally focused on techniques for rejecting or accommodating the extreme cases that hamper statistical inference. Bernoulli seems to be the first to address the issue in 1777 [22], with subsequent theory building throughout the 1800s [2326, 327, 328], 1900s [2736, 177, 274] and beyond [e.g., 3739]. Although it was occasionally recognized that anomalies may be interesting in their own right [e.g., 12, 29, 33, 4042], it was not until the end of the 1980s that they started to play a crucial role in the detection of system intrusions and other sorts of unwarranted behavior [4350]. At the end of the 1990s another surge in AD research focused on general-purpose, nonparametric approaches for detecting interesting deviations [5156]. Anomaly detection has now been studied for a wide variety of purposes, such as fraud discovery, data quality analysis, security scanning, system and process control, and—as indeed practiced in classical statistics for some 250 years—data handling prior to statistical inference [e.g., 3, 5, 14, 21, 24, 25, 57, 58, 158]. The topic of AD has not only gained ample academic attention over the years, but is also deemed crucial for industrial practice [5963].
Despite abundant research and valuable progress, the field of anomaly detection cannot claim maturity yet. It lacks an overall, integrative framework to understand the nature and different manifestations of its focal concept, the anomaly [6, 69, 184]. The general definitions of an anomaly are often said to be ‘vague’ and dependent on the application domain [11, 12, 20, 6468, 160, 316318], which is likely due to the wide variety of ways anomalies manifest themselves. In addition, although the data mining, artificial intelligence and statistics literature does offer various ways to distinguish between different kinds of anomalies, research has hitherto not resulted in overviews and conceptualizations that are both comprehensive and concrete. Existing discussions on anomaly classes tend to be either only relevant for specific situations or so abstract that they neither provide a tangible understanding of anomalies nor facilitate the evaluation of AD algorithms (see Sects. 2.2 and 4). Moreover, not all conceptualizations focus on the intrinsic properties of the data and almost none of them use clear and explicit theoretical principles to differentiate between the acknowledged classes of anomalies (see Sect. 2.2). Finally, the research on this topic is fragmented and studies on AD algorithms usually provide little insight into the kinds of anomalies the tested solutions can and cannot detect [6, 8, 184]. This literature study therefore presents an integrative and data-centric typology that defines the key dimensions of anomalies and provides a concrete description of the different types of deviations one may encounter in datasets. To the best of my knowledge this is the first comprehensive overview of the ways anomalies can manifest themselves, which, given that the field is about 250 years old, can be safely said to be overdue. The concept of the anomaly, including its different types and subtypes, is meaningfully characterized by five fundamental dimensions of anomalies, namely data type, cardinality of relationship, anomaly level, data structure, and data distribution. The value of the typology lies in offering a theoretical yet tangible understanding of the essence and types of data anomalies, assisting researchers with systematically evaluating and clarifying the functional capabilities of detection algorithms, and aiding in analyzing the conceptual characteristics and levels of data, patterns, and anomalies. Preliminary versions of the typology have been employed for evaluating AD algorithms [6, 69, 70, 297]. This study extends the initial versions of the typology, discusses its theoretical properties in more depth, and provides a full overview of the anomaly (sub)types it accommodates. Real-world examples from fields such as evolutionary biology, astronomy and—from my own research—organizational data management serve to illustrate the anomaly types and their relevance for both academia and industry.
A key property of the typology presented in this work is that it is fully data-centric. The anomaly types are defined in terms of characteristics intrinsic to data, thus without any reference to external factors such as measurement errors, unknown natural events, employed algorithms, domain knowledge or arbitrary analyst decisions. This is different from many other conceptualizations, as will be discussed in Sect. 2.2 and 4. Note that ‘defining an anomaly type’ in this context does not imply an ex ante domain-specific definition known before the actual analysis (e.g., based on rules or supervised learning). Unless specified otherwise, the anomalies discussed in this study can in principle be detected by unsupervised AD methods, thus based on the intrinsic properties of the data at hand, without any need for domain knowledge, rules, prior model training or specific distributional assumptions. Such anomalies are therefore universally deviant, regardless of the given problem.
A clear understanding of the nature and types of anomalies in data is crucial for various reasons. First, it is important in data mining, artificial intelligence, and statistics to have a fundamental yet tangible understanding of anomalies, their defining characteristics and the various anomaly types that may be present in datasets. The typology’s theoretical dimensions describe the nature of data and capture (deviations from) patterns therein and as such offer a deep understanding of the field’s focal concept, the anomaly. This is not only relevant for academia, but also for practical applications, especially now that AD has gained increased attention from industry [6163]. Second, with the criticism on ‘black box’ and ‘opaque’ AI and data mining methods that may result in biased and unfair outcomes, it has become clear that it is often undesirable to have techniques and analysis results that lack transparency and cannot be explained meaningfully [7176]. This is especially true for AD algorithms, as these may be used to identify and act on ‘suspicious’ cases [4850, 326, 330]. Moreover, the definitions of anomalies are sometimes non-obvious and hidden in the designs of algorithms [8, 65, 184], and true deviations may be declared anomalous for the wrong reasons [306]. Although the typology presented here does not increase the transparency of the algorithms, a clear understanding of (the types of) anomalies and their properties, abstracted from detailed formulas and algorithms, does increase post hoc interpretability by making the analysis results and data more understandable [20, 52, 69, 76, 184, 276]. Third, even if techniques from computer science and statistics are functionally transparent and understandable, the implementations of these algorithms may be done poorly or simply fail due to overly complex real-world settings [73, 7779]. A clear view on anomalies is therefore needed to determine whether detected occurrences indeed constitute true deviations. This is especially relevant for unsupervised AD settings, as these do not involve pre-labeled data. Fourth, the no free lunch theorem, which posits that no single algorithm will demonstrate superior performance in all problem domains, also holds for anomaly detection [17, 60, 8087, 184, 286, 320]. Individual AD algorithms are generally not able to detect all types of anomalies and do not perform equally well in different situations. The typology provides a functional evaluation framework that enables researchers to systematically analyze which algorithms are able to detect what types of anomalies to what degree. Fifth, a comprehensive overview of anomalies contributes to making implemented systems more robust and stable, as it allows injecting test datasets with deviations that represent unexpected and possibly faulty behavior [314, 329]. Finally, a principled overall framework, grounded in extant knowledge, offers students and researchers foundational knowledge of the field of anomaly analysis and detection and allows them to position and scope their own academic endeavors.
This study therefore puts forward an overall typology of anomalies and provides an overview of known anomaly types and subtypes. Rather than presenting a mere summing-up, the different manifestations are discussed in terms of the theoretical dimensions that describe and explain their essence. The anomaly (sub)types are described in a qualitative fashion, using meaningful and explanatory textual descriptions. Formulas are not presented, as these often represent the detection techniques (which are not the focus of this study) and may draw attention away from the anomaly’s cardinal properties. Also, each (sub)type can be detected by multiple techniques and formulas, and the aim is to abstract from those by typifying them on a somewhat higher level of meaning. A formal description would also bring with it the risk of unnecessarily excluding anomaly variations. As a final introductory remark it should be noted that, despite this study’s extensive literature review, the long and rich history of anomaly research makes it impossible to include each and every relevant publication.
This article proceeds as follows. Section 2 explains key concepts and discusses related research. Section 3 introduces the typology of anomalies. Section 4 discusses various properties of the typology and compares it with other research. Finally, Sect. 5 is for conclusions.

2 Theory

2.1 Key terms and concepts

This section defines the employed concepts to ensure that the reader understands the terms as intended, regardless of his or her discipline (senior scholars may choose to only do a quick scan). An anomaly, in its broadest meaning, is something that is different or peculiar given what is usual or expected [8890]. In the philosophy of science, anomalies play a crucial role as observations or predictions that are inconsistent with the models in the prevailing academic paradigm [9194]. Such anomalies require an explanation and consequently initiate the advancement of knowledge by the refinement of current theories. Over time, anomalies that constitute fundamental novelties may accumulate and trigger an academic crisis in which the old paradigm is replaced by a wholly different one. Newtonian physics, for example, was succeeded by Einstein’s theory of general relativity, which was better capable of predicting and explaining a variety of observed astronomical phenomena, such as anomalies pertaining to the perihelion of Mercury. In statistics, data mining and AI an anomalous occurrence deviates from some notion of normality for the given data and setting. Deviants that can be detected in an unsupervised fashion, which are the focus of this study, can be defined more precisely. An anomaly in this context is a case, or a group of cases, that in some way is unusual and does not fit the general patterns exhibited by the majority of the data [3, 4, 8, 10, 11, 69, 325, 326]. The detection of anomalies is a highly relevant task, not only because they should be handled appropriately during inferential research, but also because the goal of analyses is often to discover interesting new phenomena [9, 3739, 9598]. The remainder of this section will focus on terms and concepts pertaining to anomalies in data.
The term cases refers to the individual instances in a dataset, also called data points, rows, records, or observations [57, 99, 323]. These cases are described by one or more attributes, also referred to as variables, columns, fields, dimensions or features. Some of these attributes will be required for data management and context, such as identification (ID) and time variables. In addition, the dataset will contain substantive attributes, i.e., the meaningful domain-specific variables of interest, such as income and temperature. Measuring and recording the actual attribute values is prone to errors, the discovery of which may indeed be one of the reasons to conduct anomaly detection. The term occurrence is used here in a broad fashion and may refer to an individual case or a group of cases, an object or an event, and anomalous or regular data.
The term dependency is used in the literature to refer to two aspects of relationships, both of which are relevant for this study. First, there can be a dependency between the attributes, meaning there is a relationship between the variables [59, 96, 99101, 182]. Income, for example, may be correlated with education and parental financial status. A second form of dependency, referred to as dependent data, deals with the relationship between the dataset’s individual cases or rows [7, 20, 57, 102, 323]. A set with such dependent cases contains an intrinsic relation between the observations. Examples are time series, spatial and graph data, and sets with hierarchical relationships. The dependencies in such datasets are typically captured by time, location, linking or grouping attributes. These inter-case relations are absent from independent data, such as in i.i.d. random samples for cross-sectional surveys, in which every row represents a stand-alone observation.
Describing and understanding the different types of anomalies in a concrete and data-centric manner is not feasible without referring to the functional data structures that host them. This section therefore shortly discusses several important formats for organizing and storing data [cf. 5, 57, 95, 106, 110115, 184]. Some analyses are conducted on unstructured and semi-structured text documents. However, most datasets have an explicitly structured format. Cross-sectional data consist of observations on unit instances—e.g., individual people, organizations or countries—at one point in time. The cases in such a set are generally considered to be unordered and otherwise independent, as opposed to the following structures with dependent data. Time series data consist of observations on one unit instance (e.g., one country) at different points in time. Time-oriented panel data, or longitudinal data, consist of a set of time series and are therefore comprised of observations on multiple individual entities at different points in time (e.g., income history for a sample of citizens followed over a five-year period). The general term sequence data will be used to refer to time series, time-oriented panel data, as well as to sets with an ordering not based on time. Sequence data have broad applications and, besides time-oriented phenomena, are able to capture genomic and other biological features, user actions, spectroscopy wavelengths, trajectories, audio, and even visual information such as the shape of physical objects and moving elements in a video [5, 10, 114, 116123, 278]. Each of the above data structures can be implemented with a single matrix or table, but when several inter-related entities need to be modeled a relational model is often used [95, 124, 125]. This allows many functional structures, including domain-specific designs and analytical star schemas [95, 103, 104]. A graph is a related data structure and typically consists of vertices (nodes), edges (connections or links), edge directions and edge weights [20, 57, 95, 106, 112, 113]. An attributed graph has, in addition to these structural properties, any number of substantive domain-specific variables. Such structures are highly relevant for modeling, e.g., social networks, chemical compounds, Internet data, and wireless sensor networks. Graphs can take many forms, including tree data structures. A tree consists of a root, a given amount of parent and child nodes, and does not feature any closed paths (so-called cycles). Storing graphs typically involves both a set of vertices (e.g., as a list of nodes and their properties) and a set of edges (e.g., as an adjacency matrix with relations, directions and weights). This is similar to spatial data, which usually consist of a set of coordinates and a set of substantive features [8, 66, 95, 126129, 277, 323]. The latter may pertain to, e.g., population density, settlement type or availability of utility infrastructure elements. The representations often constitute points (atomic positions such as addresses), lines, arcs (e.g., roads or rivers) and polygons (regions such as neighborhoods or states). However, a rasterization of continuous data can also be used, such as satellite imagery and brain scans represented as a grid of pixels. This format therefore also captures image material in general, with the data points being 2D pixels or 3D voxels. The coordinates represent a position on a canvas or frame, while the features store the visual information as gray intensities or color information (e.g., RGB, multi- or hyperspectral). Spatio-temporal data feature a sequence dimension in addition to the coordinates and may capture, e.g., video and historical geographical information [281, 283]. Even more detailed distinctions can be made, but the key formats described above suffice to properly discuss the wide variety of anomaly types.
The concept of an aggregate is often used in the context of dealing with noise or obtaining a more abstract representation at the level of interest. When aggregating the cases the analyst is able to treat multiple individual rows as a whole or a group and consequently obtain summary statistics—e.g., means and totals—or other derived properties of the collective [5, 57, 95, 103106, 282, 323]. This allows the data and perspective to be transformed, for example, from days to months or from individual people to households. In terms of data structures, typical examples of aggregates are subgraphs, subsequences, and regions in spatial data. Often, however, the AD analysis will simply focus on the individual cases, i.e., on the atomic level of the set’s microdata. One can also aggregate the attributes in order to reduce dimensionality or to obtain for individual or grouped cases meaningful and complex latent variables or manifolds [3, 96, 107109]. However, this may mainly be relevant in the context of high-level semantic anomalies, in which such aggregates are generally difficult to determine without any prior theory, rules or supervised training (see Sect. 3.2 for more information) [13, 310].
To conclude this section it is valuable to briefly discuss what constitutes a typology. To theoretically distinguish between concepts, scholars have various intellectual tools at their disposal, amongst which are taxonomies, classifications, dendrograms, and typologies [130]. These all make use of one or more classificatory principles (explicit dimensions) to differentiate between the relevant elements. A classification uses a single principle, whereas a typology uses two or more simultaneously. A typology is therefore well suited to theoretically distinguish between complex concept types—offering not only a fundamental and summarized description of a general concept, but also an exhaustive and mutually exclusive overview of its distinct but related types. The term classification will be used more loosely in this study and will also refer to conceptualizations with classes that are not based on clear principles and that are neither mutually exclusive nor jointly exhaustive.
The literature acknowledges various ways to distinguish between different manifestations of anomalies. Barnett and Lewis [2, cf. 31, 131] make a distinction between extreme but genuine members of the main population, i.e., random fluctuations at the tails of the focal distribution, and contaminants, which are observations from a different distribution.
Wainer [34] differentiates between distant outliers, which exhibit extreme values and are clearly in error, and fringeliers, which are unusual but with their position about three standard deviations from the majority of the data cannot be said to be extremely rare and unequivocally erroneous. Essentially the same distinction is made in [132] with white crows and in-disguise anomalies, respectively. Relatedly, in [5, 133] a distinction is made between a weak outlier (noise) and a strong outlier (a significant deviation from normal behavior). The latter category can be sub-divided in events, i.e., unusual changes in the real-world state, and measurement errors, such as a faulty sensor [134, 135]. An overall classification is presented in [96], with the classes of anomalies indicating the underlying reasons for their deviant nature: a procedural error (e.g., a coding mistake), an extraordinary event (such as a hurricane), an extraordinary observation (unexplained deviation), and a unique value combination (which has normal values for its individual attributes). Other sources refer to similar explanations in a more free-format fashion [39, 97, 136]. In [184] a distinction is made between 9 types of anomalies. Another broad classification is that of [7], which differentiates between three general categories. A point anomaly refers to one or several individual cases that are deviant with respect to the rest of the data. A contextual anomaly appears normal at first, but is deviant when an explicitly selected context is taken into account [cf. 137]. An example is a temperature value that is only remarkably low in the context of the summer season. Finally, a collective anomaly refers to a collection of data points that belong together and, as a group, deviate from the rest of the data.
Several specific and concrete classifications are also known, especially those dedicated to sequence and graph analysis. Many of their anomaly types will be described in detail in Sect. 3. In time series analysis several within-sequence types are acknowledged, such as the additive outlier, temporary change, level shift and innovational outlier [138141, 191]. The taxonomy presented in [142] focuses on between-sequence anomalies in panel data and makes a distinction between isolated outliers, shift outliers, amplitude outliers, and shape outliers. Another specific classification is known from regression analysis, in which it is common to distinguish between outliers, high-leverage points and influential points [3, 143145]. Two anomalies with regard to the trajectories of moving entities are presented in [118, cf. 146, 147], namely the positional outlier, which is positioned in a low-density area of the trajectory space, and the angular outlier, which has a direction different from regular trajectories. The subfield of graph mining has also acknowledged several specific classes of anomalies, with anomalous vertices, edges, and subgraphs being the basic forms [18, 20, 112, 113, 148, 149]. Table 1 summarizes the anomaly classes acknowledged in the extant literature. In Sect. 3 these anomalies, particularly those that allow a data-centric definition, will be discussed in more detail and positioned within this study’s typology.
The classifications in Table 1 are either too general and abstract to provide a clear and concrete understanding of anomaly types, or feature well-defined types that are only relevant for a specific purpose (such as time series analysis, graph mining or regression modeling). The fifth column also makes clear that extant overviews hardly offer clear principles to systematically partition the classificatory space to obtain meaningful categories of anomalies. They thus do not constitute a classification or typology as defined by [130]. To the best of my knowledge this study’s framework and its predecessors offer the first overall typology of anomalies that presents a comprehensive overview of concrete anomaly types.
Many of the existing overviews also do not offer a data-centric conceptualization. Classifications often involve algorithm- or formula-dependent definitions of anomalies [cf. 8, 11, 17, 86, 150, 184], choices made by the data analyst regarding the contextuality of attributes [e.g., 7, 137], or assumptions, oracle knowledge, and references to unknown populations, distributions, errors and phenomena [e.g., 1, 2, 39, 96, 131, 136]. This does not mean these conceptualizations are not valuable. On the contrary, they often provide important insights as to the underlying reasons why anomalies exist and the options that a data analyst can exploit. However, this study exclusively uses the intrinsic properties of the data to define and distinguish between the different sorts of anomalies, because this yields a typology that is generally and objectively applicable. Referencing external and unknown phenomena in this context would be problematic because the true underlying causes usually cannot be ascertained, which means distinguishing between, e.g., extreme genuine observations and contaminants is difficult at best and subjective judgments necessarily play a major role [2, 4, 5, 34, 314, 323]. A data-centric typology also allows for an integrative and all-encompassing framework, as all anomalies are ultimately represented as part of a data structure. This study’s principled and data-oriented typology therefore offers an overview of anomaly types that not only is general and comprehensive, but also comes with tangible, meaningful and practically useful descriptions.
To end this section it is good to note that many valuable classifications of anomaly detection techniques are available [5, 7, 13, 14, 55, 84, 135, 150152, 299301, 318320, 330]. Because the core focus of the current study is on anomalies, detection techniques are only discussed if valuable in the context of the typification of data deviations. A review of AD techniques is therefore out of scope, but note that the many references direct the reader to information on this topic.

3 A typology of anomalies

3.1 Classificatory principles

This section presents the five fundamental data-oriented dimensions employed to describe the types and subtypes of anomalies: data type, cardinality of relationship, anomaly level, data structure, and data distribution. The typology’s framework, as depicted in Fig. 2, comprises three main dimensions, namely data type, cardinality of relationship and anomaly level, each of which represents a classificatory principle that describes a key characteristic of the nature of data [57, 96, 101, 106]. Together these dimensions distinguish between nine basic anomaly types. The first dimension represents the types of data involved in describing the behavior of the occurrences. This pertains to these data types of the attributes responsible for the deviant character of a given anomaly type [10, 57, 96, 97, 114, 161]:
  • Quantitative: The variables that capture the anomalous behavior all take on numerical values. Such attributes indicate both the possession of a certain property and the degree to which the case may be characterized by it and are measured at the interval or ratio scale. This kind of data generally allows meaningful arithmetic operations, such as addition, subtraction, multiplication, division, and differentiation. Examples of such variables are temperature, age, and height, which are all continuous. Quantitative attributes can also be discrete, however, such as the amount of people in a household.
  • Qualitative: The variables that capture the anomalous behavior are all categorical in nature and thus take on values in distinct classes (codes or categories). Qualitative data indicate the presence of a property, but not the amount or degree. Examples of such variables are gender, country, color and animal species. Words in a social media stream and other symbolic information also constitute qualitative data. Identification attributes, such as unique names and ID numbers, are categorical in nature as well because they are essentially nominal (even if they are technically stored as numbers). Note that although qualitative attributes always have discrete values, there can be a meaningful order present, such as with the ordinal martial arts classes ‘lightweight,’ ‘middleweight’ and ‘heavyweight.’ However, arithmetic operations such as subtraction and multiplication are not allowed for qualitative data.
  • Mixed: The variables that capture the anomalous behavior are both quantitative and qualitative in nature. At least one attribute of each type is thus present in the set describing the anomaly type. An example is an anomaly that involves both country of birth and body length.
The second dimension is the cardinality of relationship, which represents how the various attributes relate to each other when describing anomalous behavior. These attributes are individually or jointly responsible for the deviant character of the occurrences [39, 59, 96, 100, 105, 106, 136, 158, 285]:
  • Univariate: Except for being part of the same set, no relationship between the variables exists to which the anomalous behavior of the deviant case can be attributed. To describe and detect the anomaly, its variables can therefore be referred to separately. In other words, the analysis can assume independence between the attributes.
  • Multivariate: The deviant behavior of the anomaly can be attributed to the relationship between its variables. The anomaly needs to be described and detected by referring to the joint distribution, meaning the individual attributes cannot be studied separately. Variables have to be analyzed jointly in order to take into account their relation, i.e., their combination of values. The term ‘relationship’ should be interpreted broadly here and includes correlations, partial correlations, interactions, collinearity, concurvity, (non)collapsibility, and associations between attributes of different data types.
The cardinality of relationship essentially refers to whether one attribute is sufficient to define and detect the anomaly type or that multiple attributes need to be taken into account simultaneously. Note that, owing to the massive data collection nowadays, a dataset is likely to contain many attributes beyond the hosting subspace (i.e., the subset of attributes required to describe and detect a given anomaly). As a matter of fact, an occurrence can be deviant in one subspace and normal in others [133, 162164, 180, 182, 303]. An occurrence could even be one type of anomaly in one subspace and another type in a second subspace.
The third dimension is the anomaly level, which represents the distinction between atomic anomalies (individual low-level cases or data points) versus aggregate anomalies (groups or collective structures). In theory this is also an independent dimension, but in practice univariate data only contain atomic anomalies. Multivariate data may also host aggregate anomalies, which alongside substantive attributes typically require data management attributes (e.g., time stamps or group designations) that allow the formation of collective structures. However, should future research introduce noteworthy examples of aggregate anomalies in univariate data, the framework can be easily extended to accommodate this.
The fourth dimension represents the data structure, which is used to distinguish between the subtypes within the nine cells of the typology. A given cell may contain multiple anomaly subtypes, which have defining characteristics that can be traced back to the specific data formats that host them, such as graphs and time series. Also note that the difference between dependent and independent data is treated as a characteristic of the data structure here. See Sect. 2.1 for an overview of the different structures.
The fifth dimension is the data distribution, which refers to the collection of attribute values and their pattern or dispersion throughout the data space [98, 165]. An anomaly, per definition, is defined by its difference with regard to the remainder of the data, which makes the distribution of the dataset an important factor to take into account. The distribution is strongly dependent on the classificatory factors mentioned above, but allows focusing on density and other dispersion-related aspects of the set. It therefore offers additional descriptive and delineating capabilities.1 This dimension will not only be used to subdivide between anomaly subtypes within the typology’s nine cells, but occasionally also to illustrate how an altered distribution would result in a different manifestation of a given anomaly.
The five classificatory principles of the typology are not only fundamental in the sense that they describe theoretically crucial properties of data, but also because they deeply impact analysis and storage solutions. Some examples of this: jointly analyzing qualitative and quantitative data requires specialized multivariate techniques; analyzing dependent data usually needs to account for autocorrelation; and locating clusters and other patterns in multidimensional data implies discovering inter-variable relationships and dealing with exponential scaling issues as datasets increase in size.
The preliminary typology presented in [69, 70, cf. 6] is summarized in the first row of Table 1 (it essentially lacked the lowest layer for aggregate anomalies present in Fig. 2). Although this version was able to implicitly accommodate complex anomalies, several discussions at conferences pointed to the fact that the types in the multivariate row were rather broad and demanded further subdivision and clarification. Atomic and aggregate anomalies are therefore acknowledged explicitly in the framework now, yielding nine basic anomaly types. In addition, some of the terminology is updated. The new typology framework is depicted in Fig. 2. Detailed subtypes are included in Fig. 3 and illustrated in the data plots throughout this article. The nine main types of anomalies, which follow naturally and objectively from the classificatory principles, are described in Sect. 3.2. (Note on visualization: in many of the diagrams the data points’ colors and shapes represent different categorical values; the reader might want to zoom in on a digital screen to see colors, shapes and patterns in detail.)

3.2 Overview of anomaly types and subtypes

This section presents the anomaly types and their concrete subtypes. The typology’s rows represent three broad groups of anomaly types. Atomic univariate anomalies are single cases with a deviant value for one or possibly multiple individual attributes. They are relatively easy to describe and detect because the individual values of these observations are unusual. Relationships between attributes or cases are not relevant for such occurrences. An example is an extremely high numerical value, such as a person reported to be 246 cm high. There may be several anomalous atomic occurrences (albeit apparently not in a way so as to form a ‘normal pattern’), but the essence is that each individual case is anomalous in its own right. Moreover, should an individual case have multiple unusual values, then each of them will be anomalous (e.g., not only 246 cm high, but also 117 years old). Atomic multivariate anomalies are single cases whose deviant nature lies in their relationships, with the individual values not being anomalous. In independent data this will manifest itself in the unusual combination of a case’s own attribute values, such as a 10-year-old person with a body length of 180 cm. However, the multivariate nature also allows defining and detecting deviations in dependent data, i.e., in the relation with the other cases to which the given case is linked. An example is a time series temperature measurement that is unusually high for winter, but that would have been normal in summer. Atomic multivariate anomalies hide in multidimensionality, as they cannot be described and detected by simply analyzing the individual variables separately. Finally, aggregate anomalies are groups of cases that deviate as a collective, of which the constituent cases usually are not individually anomalous. Relationships between attributes and between cases play a key role here, not only to position an occurrence in the set with dependent data, but often also to form a pre-defined or derived group. Owing to their complex and intricate nature, these anomalies are generally the most difficult to describe and detect. A deviant subsequence is one manifestation of an aggregate anomaly, such as a whole winter with many unusually high temperatures compared to other winters. Although the above may be abstract at first reading, the detailed discussion below will offer a concrete understanding.
Before presenting the individual types and subtypes it is worthwhile to make some assumptions explicit. It is assumed that an atomic case (individual row) with p attributes represents a single data point in p-dimensional space (not a set of p distinct data points). A time series consists of multiple atomic data points, each of which has p attributes. The typology also assumes a parsimonious data structure, without redundant information. For example, the degree of a vertex, i.e., the number of edges that connect it to other vertices in the graph, is a latent characteristic of which the value is seen as being derived runtime during the analysis and is therefore assumed not to be explicitly included in the original dataset. When relevant the set does explicitly include management and dependency attributes, such as ID, sequence, group and link information, as these represent crucial structural properties (note that in the special case of text or symbolic data the sequence may be present implicitly). The typology also assumes the unaltered and original dataset in which one aims to declare anomalies. The reason for this is that, e.g., normalization [16, 86], dimensionality reduction [166], log transformations [167] and data type conversions [70] have all been shown to have significant impact on the presence and detection of anomalies. To be sure, transformations are allowed, but the typology then either assumes the newly derived dataset as the starting point for typification or remains agnostic as to any transformations performed as part of the AD algorithm. Finally, if one needs to choose between potential anomaly types, then the norm is to opt for the simplest type that captures the deviant occurrence (see the Discussion for more on this).
The types and subtypes are visualized schematically in Fig. 3 and discussed in detail in the remainder of this section. Since even the subtypes can be quite broad when multivariate in nature, ample examples are also provided.

3.2.1 Atomic univariate anomalies.

This section provides an overview of anomaly types that consist of a single case with a deviant value for one or possibly several attributes, with each individual value being deviant in its own right. The more unusual a value is or the more attributes take on unusual values, the more anomalous the respective case is.
I. Uncommon number anomaly
This is a case with an extremely high, low, or otherwise unusual value for one or multiple individual quantitative attributes [5, 97, 168]. These deviant numbers often manifest themselves as an extreme tail value (depicted as subtype ST-Ia in Fig. 3). They are hosted by the given attribute’s numerical vector, which may contain one or more extreme values at the far ends of its statistical distribution. Figure 4 shows two plots of the national Polis administration of Dutch income transactions [6], with various ST-Ia occurrences. Figures 5 and 6 present examples as well. Traditional univariate statistics typically offers methods to detect this subtype, e.g., by using a measure of central tendency and a given degree of variation [5, 7, 30, 96, 97, 143, 153, 184]. Cases that clearly exceed a threshold are considered extreme and very distant ST-Ia instances. It follows that cases lying near this decision boundary, so-called fringeliers, are more difficult to interpret [34, cf. 5, 132]. Extreme tail values are literally ‘outliers’, as they lie in an isolated region of the numerical space. However, this does not necessarily mean the case is located far from the other data. An example of an extreme value lying relatively near the bulk of the data points can be found in real-world income data, as depicted at the left of Fig. 5 (which in this context may point to an error or improvised corrective transaction). Moreover, given a different data distribution, isolated low-density values can also be located in the middle of the value range [5, 59, 169, 307]. These isolated intermediate values (subtype ST-Ib) do not only lie outside the dense regions, but also in between them. They can manifest themselves, for example, in multimodal or disjoint probability distributions, where they may be extreme members of one of the populations. Traditional AD techniques for ST-Ia anomalies often cannot detect ST-Ib cases (see the Grubbs and GESD example in the Discussion section).
The distribution of the variable affects the way Type I anomalies can manifest themselves in other ways as well [1, 153, 170, 171]. Skewed distributions [39, 167, 172], leptokurtic distributions [173, 174] and heavy-tailed distributions [131, 175, 176] tend to generate substantially more extreme cases than normal distributions do. Masking and swamping are also relevant from a distributional perspective [1, 2, 28, 36, 177179].
II. Uncommon class anomaly
The unusual class (ST-IIa) is a case with a unique or rare categorical value for one or several individual qualitative variables. The studies [60, 184, 309] discuss this type of anomaly. Case ST-IIa in Fig. 4 is a truly unique class, with the orange color representing the sole instance of the respective categorical value. The two ST-IIa cases in the left panel of Fig. 6 are the only square and reversed triangle. The red and orange colors of the ST-IIa points in the right panel of Fig. 6 are non-unique rare code values. These may not be clear-cut anomalies and thus may at some moment in the AD process demand that the concept of rarity is arbitrarily defined, e.g., by using a threshold [60, 85, cf. 34]. The deviant repeater (ST-IIb) is category that occurs frequently, while the norm is to be non-frequent due to a highly skewed distribution. Such anomalies can occur in, e.g., identification, IP address or name attributes [181].
III. Simple mixed data anomaly
This is a case that is both a Type I and a Type II anomaly, i.e., with at least one isolated numerical value and one uncommon class. The subtype extreme tail uncommon class (ST-IIIa) has a rare or unique class value at the tail of the distribution, whereas the subtype intermediate uncommon class (ST-IIIb) has an unusual class at an isolated intermediate location in the numerical space. Case ST-IIIa in Fig. 6 is an example. A Type III anomaly deviates with regard to multiple data types, requiring deviant values for at least two attributes, each anomalous in its own right [69, 70]. However, like Type I and II anomalies, analyzing the attributes jointly is unnecessary because the case in question is not multivariately anomalous. In other words, this type requires a set of individually deviant attribute values, not a deviant combination of attribute values. This is fundamentally different from the types described in 3.2.2.

3.2.2 Atomic multivariate anomalies

This section discusses anomalies that comprise a single case with a deviant combination of attribute values. In dependent data the deviancy typically lies in the relationship between the cases.
IV. Multidimensional numerical anomaly
This is a case that does not fit the general patterns when the relationship between multiple quantitative attributes is taken into account, without showing unusual values for any of the individual attributes that partake in this relationship. Type IV anomalies may reside not only in independent data, but also in dependent data because the multivariate character of the set allows taking into account the inter-case relationships. In independent data the anomalous nature of a case of this type lies in the unusual combination of its numerical attribute values [38, 39, 52, 182, 185].
Several quantitative attributes therefore need to be jointly taken into account to describe and detect such an anomaly. An example is a person who is 182 cm tall and weighs 53 kilos, i.e., an unusual combination of normal individual values [34]. In independent data such a case is literally ‘outlying’ from the relatively dense multivariate clouds and is thus located in an isolated area [cf. 101, 179]. This can be a peripheral point (ST-IVa), such as illustrated by the ST-IVa cases in Figs. 4 and 6. A second subtype is the enclosed point (ST-IVb), which means the anomaly is surrounded by normal data. An example is an anomaly located inside an annular region [302, 303, 307], illustrated by case ST-IVb in Fig. 5. Another example is a case in a spiral shape or other maze-like distribution [305]. Some methods, such as one-class support vector machines or iForest, are able to detect peripheral points, but are not geared toward identifying enclosed points [6, 305].
Another question becomes relevant if the dataset contains multiple clusters that have different densities. The outlyingness of an individual case can then be seen as being dependent upon the degree of isolation relative to its local area rather than to the global space [8, 17, 53, 55]. A local density anomaly (ST-IVc) is a case that is only isolated in the context of its neighborhood. Techniques to detect these anomalies, such as LOF and LOCI, need to account for the density of both the case in question and its neighbors. See the Discussion section for more on the topic of locality. A dataset may also predominantly consist of random noise or large clusters, except for a few data points located close to each other. These points are global density anomalies (ST-IVd). Although they could be perceived as a single (albeit tiny) cluster, they are often conceptualized and detected as individual cases [9, 184, 305, 307]. ST-IVc and ST-IVd occurrences could in principle also have univariate equivalents, although these do not seem to be discussed in the literature.
For independent data the description of a Type IV instance requires multiple substantive attributes, as illustrated in the examples provided above. With dependent data the anomaly may also be defined by a single substantive variable, e.g., temperature, although at least one other attribute is typically still needed to link the related individual cases. In a quantitative context this usually concerns time series data, comprising a variable for ordered linking and a numerical substantive measure such as weight, wage, volume or heart rate [16, 114]. The local additive anomaly (ST-IVe) captures anomalous observations in time series and other numerical sequences. It features a short-lived spike that deviates from the local temporal neighborhood—e.g., the current season or trend—without exhibiting globally extreme values [cf. 141, 187189]. As such this subtype implies that the substantive and sequence attributes are acknowledged and described jointly, i.e., multivariately. Case ST-IVe in Fig. 8.A is an example. Note that a globally extreme occurrence, such as case ST-Ia in the same figure, is simply a Type I extreme tail value for which the time attribute is irrelevant (unless the position in the sequence should be known). If the anomalous event transpires slowly relative to the measurement resolution, it may span multiple observations and should be considered an aggregate Type VII occurrence. However, the classic definition of an additive anomaly is that it is an abrupt change that pertains to a single observation, i.e., a Type IV anomaly [21, 105, 138, 141, 193].
A deviant numerical spatial point (ST-IVf) is a case that is unusual due to its quantitative spatial and possibly substantive features. If time is also a relevant factor, the case is a deviant numerical spatio-temporal point (ST-IVg). Due to their quantitative nature these anomalies typically reside in images and videos, respectively [68, 122, 194]. An anomaly then is an individual pixel or voxel that, given its location in the frame and possibly in time, has an unusual color or multispectral measurement. Anomalies are known to occur at this granular data point level, for example in satellite imagery [67, 68]. However, anomalies in this context are usually aggregates (e.g., a group of pixels), so this topic will be discussed in detail in the section on Type VII deviations. ST-IVf and ST-IVg occurrences can also be geographical anomalies, but examples thereof will be discussed as Type VI cases because they usually reside in mixed data.
V. Multidimensional categorical anomaly
This is a case that does not fit the general patterns when the relationship between multiple qualitative attributes is taken into account, without showing unusual values for any of the individual attributes that partake in this relationship. In short, a case with a rare or unique combination of class values, which can reside in independent or dependent data. In independent data two or more substantive categorical attributes from the same case need to be jointly taken into account to describe and identify a multidimensional categorical anomaly. An example is this curious combination of values from three attributes used to describe dogs: ‘male’, ‘puppy’, and ‘pregnant’. A visual example is case ST-Va in Fig. 6, as it is the only red circle in the set—despite the fact that neither circles nor red shapes are unusual. These two illustrations are instances of an uncommon class combination (ST-Va). The studies [181, 195] deal with this subtype.
A high-dimensional set may also constitute a so-called corpus, in which the individual cases represent different texts (e.g., documents, blog posts, or e-mails). In this purely qualitative context the case’s word order is irrelevant for the anomaly’s description and detection. The anomaly may reside in unstructured or semi-structured documents, CSV files with a single message on each row, bag-of-words representations, or sets of a similar nature such as market basket data [100, 323]. A transaction consisting of an unusual combination of common retail products is an example of a market basket anomaly [196, 197]. Text cases such as blog posts or e-mails may be deviant because they contain unexpected topics or feature a different writing style [198201]. See the ST-VIIIa subtype below for more details on text style and topic analysis.
Dependent data afford wholly different subtypes. A tree, essentially an acyclic graph comprising qualitative identifiers of parent and child nodes, is a data structure well-suited for hosting Type V anomalies. One subtype in this context is the deviant categorical vertex (ST-Vb). An individual node in a tree can be anomalous as a result of its structural relationships. This requires at least the vertex ID (a qualitative designation identifying the individual nodes) and the edges (parent–child relationships). For example, a leaf node per definition is dependent on its structural relationships: there needs to be a parent, but children are absent. A leaf node that is deviant due to its graph context, e.g., because it is the terminal node of an extremely short path to the root, is therefore an instance of an ST-Vb anomaly (see Fig. 7a). Other examples are vertices with an unusual amount of children (see Fig. 7a as well) and vertices connected by an edge that has unexpected labels [cf. 132]. Note that a vertex with a single uncommon categorical value is simply a Type II anomaly, since no dependent data are required to describe and detect it in a flat node list. An ST-Vb anomaly is not necessarily a node in a tree. It can also be part of a regular graph, assuming that weights or other numerical properties are not involved in the anomalous behavior. An example is a vertex that is entirely unconnected (see ‘A.F’ in Fig. 7b) or does not belong to an identifiable community [202]. A node can also be deviant because it is connected to an extreme amount of other vertices, which in various domains is known as a ‘super spreader’. In biology this refers to a single individual who disproportionately infects a large number of other people and as such contributes to the speed and degree of the outbreak, a phenomenon observed for Covid-19 and other viruses [154156]. Likewise, in a security context this may be an infected source node in a computer network that communicates with many other nodes, possibly with malicious intent [203, 296]. Graphs are well-equipped to deal with notions of locality by taking into account adjacent nodes or the broader community. This allows anomalies such as a vertex with a class label that is unexpected at that position in the graph [20, 204, 295]. Examples are a smoker in a group of non-smokers and vertex ‘B.X’ in Fig. 7b (seemingly mislocated in the ‘A’ group). The connectedness of neighboring nodes can also be analyzed [205]. An anomalous vertex then is a node whose neighbors are all highly connected or mostly unconnected. A node connected to two otherwise separated graph communities, such as vertex ‘A.E’ connecting the ‘A’ and ‘B’ groups in Fig. 7b, can also be seen as an anomaly [20, 206]. In real-world data such community-crossing occurrences may point to intrusion attempts [207]. A related subtype is the deviant categorical edge (ST-Vc). Many of the examples provided above for the ST-Vb subtype have an analogue for the deviant categorical edge. Examples are a relationship that connects two otherwise separated communities [cf. 20, 206], a hyperlink between two web pages with unrelated information [324], and a link that is attached to a vertex with an uncommon class label.
VI. Multidimensional mixed data anomaly
This is a case that does not fit the general patterns when the relationship between multiple quantitative and qualitative attributes is taken into account, without being an atomic univariate anomaly with regard to any of the individual attributes that partake in this relationship. It concerns a case with an unusual combination of qualitative and quantitative attributes, which can reside in both independent and dependent data. As with all multivariate anomalies, multiple attributes need to be jointly taken into account to describe and identify them. As a matter of fact, multiple data types need to be considered, as anomalies of this type per definition are comprised of both numerical and categorical variables.
In a set with independent data the anomalous case generally has a class value, or a combination of class values, that in itself is not rare in the dataset from a global perspective, but is only uncommon in its own neighborhood. Such cases therefore seem to be mislabeled or misplaced. The incongruous common class (ST-VIa) is such an anomaly and this subtype has been described in various studies [6, 70, 160, 208]. The right panel of Fig. 6 shows several real-world ST-VIa occurrences identified in a data quality analysis of the Polis administration, with multiple blue and pink dots seemingly misplaced or mislabeled. Not all detected anomalies necessarily represent erroneous data, as complex real-world phenomena sometimes simply result in strange (but correct) data. However, this specific analysis showed that some occurrences proved to be indicative of real data quality problems, which were subsequently remedied by improving the software [6]. Cases ST-Vla in Fig. 4 are also examples in this administration, as they are data points with a color (class label) rarely seen in their respective neighborhoods.
In dependent data a Type VI anomaly can manifest itself in many other ways. An incongruous common sequential class (ST-VIb) is an individual deviant in a sequence of class values of one or several substantive attributes. A quantitative time or sequence indicator is required here to link the dependent substantive values, although in symbolic data the order may be implicit. An example is the bold italic class phaseB at an unexpected position in this symbolic sequence:
phaseA, phaseB, phaseC, phaseA, phaseB, phaseC, phaseB, phaseA, phaseB, phaseC, phaseD, phaseA, phaseB, phaseC
(Note that the bold underlined case phaseD is a Type II anomaly because it is an entirely novel class.) Another example can be found in a DNA segment. This is a symbolic sequence in which each of the characters represents one of four nucleotide bases, namely A, G, T or C [10, 57, 183]. After reading the data the individual characters of the genome sequence are automatically verified and corrected in order to obtain a complete and accurate representation of the chromosomes. The order of the base symbols herein contains information that can be used for this verification and correction task [121, 209]. The characters in this example constitute qualitative data, but the substantive information in ST-VIb occurrences may also consist of mixed data. In fact, the verification process that determines the quality of the DNA character reading often also utilizes the underlying quantitative chromatogram data that are available for a given base [ibid.]. Another example is when a numerical sequence variable, substantive numerical variables (e.g., ‘amount of money’) and categorical variables (e.g., ‘type of transaction’) form a time series that hosts anomalies. The blue dot in Fig. 10 is an example in crop biomass data, which may indicate a wrong label of the data point.
A graph, comprised of numerical weights and nominal vertex IDs and edge directions, is also a structure capable of hosting Type VI anomalies [cf. 112, 113, 148, 149]. In this context an anomaly can take the form of a deviant vertex (ST-VIc). A specific example is a node connected by multiple edges with high weights, which may be of interest because such a vertex potentially has a high impact in the network. From a security perspective such an ST-VIc node could be infected if it sends many packages or may be subject to a DDoS (distributed denial-of-service) attack if it receives many packages from a great number of sources [152, 210]. From a technical perspective a node with many high weights may also point to faulty equipment [205]. A node with exactly one very heavy link constitutes an anomaly as well, which in a who-calls-whom network could indicate a stalker who keeps calling one of his or her contacts [ibid.]. (Note that the edge with the overly high weight, such as shown in Fig. 7b, is itself an ST-Ia anomaly because it simply is an extreme value in a weight vector.) Attributed graphs readily afford the detection of local anomalies, i.e., vertices featuring substantive values that differ from their neighbors [211]. An interesting example can be found in a graph representing individual people (vertices with attributes such as monthly income) and their friendships (edges that connect people). A person with an income below average and connected only to rich people will likely be a rare occurrence [169]. A deviant edge (ST-VIg) is another subtype of the Type VI anomaly. An example is a link with a weight that can be considered normal in the entire graph but is relatively high or low in the local community or subgraph, such as the ST-VIg example in Fig. 7b. In a communication network such edges may point to fake or redundant message exchanges between vertices [152].
In biology a phylogenetic tree represents the evolutionary relationships of species, individuals or genes from ancestors to descendants [106, 212, 213]. Such a tree shows that the brown bear and the polar bear evolved relatively recently from a common ancestor, while the split between these two species and the giant panda occurred closer to the root, thus in a more distant past. Although the topology can be represented with purely categorical data, biologists often use a mixed data tree in which the branch lengths (edge weights) represent the genetic distance. An individual tree branch (edge) can be anomalous if it is significantly shorter or longer than the other branches in that neighborhood of the tree, and as such may point to an interesting difference in the evolutionary rate of species or to a methodological problem [212, 214219]. Individual branches may also be anomalous because they are unstable, which means these edges easily jump to very different positions in the tree. This may be observed when comparing trees generated with different samples or by different tree-building algorithms, or when the parameters are slightly changed [215217].
When dealing with mixed data the focus of study can also be a dynamic graph, in which time-dependent behavior is taken into account [20, 112, 113, 149]. This may take the form of irregular changes in the respective time series, such as spikes or level shifts with regard to the edge weights, attribute values, or the frequency of vertices and edges [20, 112, cf. 204, 220]. See the different sequence-based subtypes for a full overview of how these dynamics can manifest themselves (i.e., ST-IVe and ST-VIb for atomic anomalies, and ST-VIIa-f and ST-IXa-i for aggregate occurrences). Notable events in this context can also be graph-specific, in the form of unusual insertions, modifications or removals of vertices (ST-VId-f) and edges (ST-VIh-j) in the network [112]. An example is an ‘evolutionary community outlier’, i.e., a node whose time-dependent behavior is different from that of its neighbors or community members [221]. A node that at some moment in time switches in terms of community membership can be regarded as an ST-VIe anomaly [112].
A deviant spatial point (ST-VIk) is a case with coordination data, often in combination with substantive properties, that can be seen as unusual. Although deviations in this context can be global [279], the explicit coordinates can be naturally exploited to define neighborhoods and detect local anomalies. For Type VI cases this typically concerns geographical sets, which are known to generally involve mixed data [126128, 222]. An ST-VIk anomaly usually represents a unit location with one or more properties considered to be abnormal in that spatial neighborhood [211, 222, 223]. Examples that combine labels and the point’s area are a dam in a residential area and a car in the middle of an ocean [cf. 316]. When a time dimension is also present the set may host deviant spatio-temporal points (ST-VIl). These are cases with one or more values that seem unusual when both their temporal patterns and neighboring points are taken into account [277, 283]. For example, a case’s temperature, wind direction (e.g., ‘NNW’) and wind speed—measured at a given time and location—can be unexpected in the context of the historical data of that geographical area [128, 224]. Spatio-temporal anomalies like this have been shown to point to complex climatic phenomena such as El Niño [128, 184, 225].

3.2.3 Aggregate anomalies

This section provides an overview of aggregate anomalies. Such an anomaly is a group of related cases that deviate as a collective. The cases are generally not individually anomalous, but multiple cases are jointly involved in a deviation from the dataset’s regular inter-case patterns that can be expressed in terms of several qualitative and/or quantitative variables.
VII. Aggregate numerical anomaly
This is a group of related cases that deviate as a collective with regard to their quantitative attributes. Such an anomaly is typically found in time series data, in which it constitutes a subsequence of the entire sequence. A time series is capable of hosting a variety of aggregate anomaly subtypes, the discovery of which is strongly related to the task of change detection. A first subtype is the deviant cycle anomaly (ST-VIIa), illustrated in Fig. 8c. This subtype occurs when the time series consists of cycles—such as climatic seasons—that demonstrate similar patterns, with the discord following a different pattern [7, 16, 69, 189]. Deviant cycles can be observed in many natural and societal phenomena, and have also been shown to correspond to unexpected physical gestures that were originally represented as video imagery [114]. The cycles can generally be detected in an unsupervised fashion, but for very specific deviations, such as certain medically relevant heartbeat patterns in an electrocardiogram, a supervised approach may be required [226].
Another subtype is the temporary change (ST-VIIb), which is a rise or fall of the substantive value that requires a certain period to get back to the regular level [138, 140]. This subtype has many practical uses, such as detecting wild fires and other ecosystem disturbances [304]. Figure 8b shows an example of an abrupt change that gradually returns to the normal range, a real-life example of which is the burst in the volume of news articles following an earthquake, major crime or other dramatic event [227, 228]. Another example is a so-called ′transient′ in audio data, i.e., a sudden increase in amplitude followed by a decay [123, 229]. Examples of this are a gunshot and a microphone being dropped on the floor. Although the initial spike can be identified as one or several atomic extreme value anomalies, the slowly diminishing tail is also an intrinsic part of the anomaly. It renders this a collective that can only be described and detected as a combination of multiple cases and attributes. A traditional temporary change anomaly is often described as abruptly starting and gradually returning to the regular level [138, 140, 315]. However, the ST-VIIb subtype in this typology also allows gradual starts and sudden recoveries so as to accommodate more variations, akin to how the ‘patch outlier’ of [187] and the ‘spike’ and ‘stuck-at’ deviations of [314] can manifest themselves. An interesting astronomical example can be found in the light curves that represent the brightness of stars. Figure 9a shows the time series of the star WASP-47, based on publicly available observations from NASA’s Kepler space telescope [250]. The sudden dip in brightness, which extends over several data points, can be explained by various phenomena. In this case it represents a planet transiting the star, and such dimming events thus offer a way to discover exoplanets [230, 231]. Note that this exhibits only a 1% dip, which requires these measurements to be very precise.
Another subtype of a Type VII anomaly is the level shift (ST-VIIc), which is an abrupt structural change to a higher or lower value level, i.e., a permanent step change [138, 140]. Such a shift, illustrated in Fig. 8b, comprises at least two consecutive data points and should therefore be regarded as a dyad or a larger group. A variation of this subtype, the ‘seasonal level shift’, implies a step change of the level of the recurring cycles or their amplitude [140, cf. 188]. An innovational outlier (ST-VIId) is a complex anomaly that goes beyond a temporary change and usually consists of an initial shock followed by an impact on potentially both the cycle and trend components and may be temporary or permanent in nature [21, 138141]. A trend change (ST-VIIe) represents the start or end of a structural trend [232, cf. 184, 233]. Finally, the variation change (ST-VIIf) is an anomaly in which the random fluctuation changes over time [313, 329]. For example, the variance that was observed earlier may suddenly increase or drop to zero, possibly due to sensor failures, low battery levels or environmental circumstances that exceed the hardware range [314]. Note that in practice the variation change may be observed simultaneously with a temporary change or level shift, so in certain situations it may be worthwhile to acknowledge such a combined subtype separately and add it to the typology.
When the data exhibit non-stationarity or drift, there may be an overlap with the aggregate time-dependent anomalies. Level shifts, trend changes, and possibly innovational outliers are associated with a permanent alteration of the time series. These are related to the types of change in the underlying distribution that are also acknowledged in the literature on concept drift [234].
Spatial and spatio-temporal data comprise a set of coordinates, a set of numerical substantive features and possibly a time dimension, and often manifest themselves as images and videos. Although sometimes residing at the data point level, an image or video anomaly usually represents a region-of-interest, i.e., an aggregate rather than an individual pixel or voxel [67, 68, 122, 194, 235, 281]. A deviant numerical spatial region (ST-VIIg) is a quantitative aggregate that is unusual due to its spatial and possibly substantive features, e.g., a surprising object, area or person in a static image. Due to the spatial context local anomalies can readily be acknowledged. For example, the small blue region at the right of Fig. 9c is anomalous with regard to its neighborhood but normal from a global perspective. Other occurrences may feature an unusual texture in an image, such as the different surface pattern to the south-east of the blue region. Identifying deviating textures has practical applications, including detecting scratches, dents and other sorts of damage during production processes in the manufacturing industry [312]. Nuanced high-level semantic anomalies, such as detecting a cat-like dog amongst multiple cats, can also be detected, although this may require prior theory, rules or supervised training because the needed domain knowledge cannot be leveraged otherwise [13, 310, 322]. A deviant numerical spatio-temporal region (ST-VIIh) is similar but also takes the time dimension into account [277]. This pertains to an area of the frame that is significantly different between images or video shots [194]. The identified differences between images or shots can reflect, e.g., moved objects, altered light sources, transformed colors and changed camera positions. The region of the image change can also cover the whole frame, e.g., when it is significantly brighter or inserted as a subliminal shot [68, 122, 235, 236]. Deviant spatio-temporal patterns also figure largely in the video surveillance of streets, parks and train stations. In non-crowded scenes anomalies may be an individual person or vehicle that demonstrates abnormal walking, running, crawling, driving or stopping behavior [68, 293]. In crowded scenes individual people cannot easily be distinguished, so the focus is on even more aggregated and abstract motion patterns that capture multiple subjects simultaneously [237]. Examples are pedestrians that move against the general flow, an empty local area that is normally crowded (e.g., a ticket gate during rush hour), and groups of people that obstruct traffic.
Aggregate anomalies are mostly found in dependent data. However, research has shown that they may also occur in i.i.d. data [288291]. The first subtype in this context is the point-based aggregate anomaly (ST-VIIi) and simply consists of a set of anomalous data points, i.e., a microcluster of points that are individually deviant. The current typology positions them as an aggregate because the literature regularly discusses this subtype as such [e.g., 288, 290, 291]. However, in certain contexts it may be more appropriate to treat them as Type IV cases. The second subtype is the distribution-based aggregate anomaly (ST-VIIj), which necessarily is an aggregate anomaly because its deviant nature is dependent on group-level characteristics. A dataset may consist of different clusters, with the anomalous cluster exhibiting, e.g., a deviant variance, covariance, mean or group frequency [282, 290, 291]. The scagnostics approach also acknowledges relevant distributional metrics regarding density and shape, such as to what degree a collection of data points is striated, stringy, skewed and clumpy [307, 308]. An example of a density-based VIIj anomaly is when it takes the form of an excess density pattern on top of the normally observed distribution [289].
VIII. Aggregate categorical anomaly
This is a group of related cases that deviate as a collective with regard to their qualitative attributes. A deviant class aggregate (ST-VIIIa) often manifests itself as a deviant text paragraph, section, or document. An individual symbolic segment in this context is not conveniently stored in a neatly structured format (as with Type V occurrences, with one case being a single document, e-mail, transaction, or blog post). The segment here exists as an aggregate concept, e.g., as multiple rows or sentences in an unstructured text or bag-of-words, or as multiple sections in a semi-structured text. For example, an aggregate of transactions in a market basket set, grouped over, e.g., time, region or client, may be anomalous. An ST-VIIIa anomaly may also be a novel text that differs with regard to topics and content [100, 198, 227, 238]. Similarly, a text may stand out in terms of style or tone [199, 201, 239]. This has practical applications because a segment with a deviant style may point to plagiarism [200]. Examples of textual and distributional features relevant here are the percentage of words of a given type (e.g., pronouns, adjectives, nouns, prepositions), the ratio of adjectives to nouns, the average number of syllables per word, spelling mistakes, the ratio of positive versus negative words, and the percentage of words that occur only once (note that the unique word itself is a Type II anomaly). These characteristics, which do not require word order, can be used to identify the most dissimilar texts.
Similar to Type V cases a tree or other graph is a structure suitable for hosting Type VIII anomalies. A deviant categorical subgraph (ST-VIIIb) is a subset of a graph and is unusual in terms of its qualitative attributes. A typical manifestation is a subtree, which comprises multiple vertices and edges. Various characteristics of the dataset may underlie the anomalous structure, such as an unusually long or short path from leaf node to root, or an otherwise uncommon path in the collection of paths. Figure 7a features two examples, namely the unusually short path ‘AA-AC-AH’ as well as vertex ‘BA’ in combination with its unusually large number of descendants. An uncommon split in a tree should also be regarded as an aggregate anomaly, which comprises at least two edges and three vertices. In addition to these topological aspects, the anomaly may involve substantive attributes. A subgraph that deviates from a regular pattern of domain-specific class labels is an example of this, such as linked vertices of classes that normally are observed to be unconnected [18, 204].
A deviant relational aggregate (ST-VIIIc) is an anomalous occurrence of a non-atomic concept represented by its relationships. Such complex collectives are usually comprised of several domain-specific entities that are inter-related by one-to-many relationships and are typically stored in different tables in a relational database [95, 124, 125]. The structural relations between the entities are modeled using nominal ID or key attributes, which can demonstrate patterns and deviations [19, 95, 240]. Similar to graphs, the topological structure alone—thus not taking into account any substantive attributes—allows for patterns and anomalies. For example, if normal cases relate to one or two relationship-instances of another entity, an occurrence with a large collection of such instances can be considered an anomaly, such as a person with seven jobs in income data. Also, suboptimal data models and systems may lead to several well-known database issues, namely insertion, deletion, and update anomalies [125]. An example is an ‘orphaned record’ whose foreign key relation points to a previously deleted record in the primary table [241]. Substantive categorical attributes may also play a role. For example when a case from a given entity type (stored in database table A) is unlike regular occurrences because it has an unexpected class value in a related entity type (stored in table B). A concrete example is the sales transaction of an item that at that moment had the unusual status of being out of stock. What is ‘expected’ can be based solely on patterns in the given dataset, but in practice often also on the data model, domain-specific rules or a supervised approach. Note that if numerical attributes are also part of the definition of the aggregate deviant, it will be a Type IX anomaly (to avoid redundancy this variant is not explicitly described in the next section).
IX. Aggregate mixed data anomaly
This is a group of related cases that deviate as a collective with regard to both numerical and categorical variables. Owing to its mixed data and diverse ways in which relationships can manifest themselves, this type allows for a wide variety of complex anomaly subtypes. To start, an anomaly can be a deviant group of class values within the larger symbolic sequence of one or more attributes [5, 7, 85, 114, 183, 242]. Such subsequences can for example reside in DNA strings, system logs or time-based text messages. Order or time information is required to link the consecutive data points. A first subtype in this context is the class change (ST-IXa), in which a sequence suddenly changes its symbolic value or pattern. This is akin to the aforementioned level shift in purely numerical data (ST-VIIc) and comprises at least two consecutive cases. A simple example is when the function of a given real estate asset is at some point changed from ‘commercial’ to ‘residential’. A more complex manifestation occurs when the stochastic univariate or multivariate pattern of the given categorical attributes changes. This could be observed in a time series of market basket data when two or more products are increasingly bought together, with this pattern being nonexistent in the past [192]. A third example of the ST-IXa subtype is akin to the temporary change and can be observed when one or multiple news streams suddenly introduce a new topic, perhaps as a result of a major disaster or crime [227, 228]. (Note that the example of bursty news topics presented above as a Type VII anomaly simply pertains to the time-related frequency of news items on a given topic, whereas the current example focuses on the topics themselves, i.e., as a pattern of words.) In the real estate and market basket examples the underlying distribution of the dataset changes, meaning that it is subject to some form of data drift [190, 192, 234].
Another subtype that may be found in sequence data is the deviant class cycle (ST-IXb), in which an entire subsequence is anomalous because it does not adhere to the cycle pattern. The pair of bold italic classes in the following phase-sequence can therefore be regarded as such a subtype:
phaseA, phaseB, phaseC, phaseA, phaseB, phaseC, phaseA, phaseC, phaseA, phaseB, phaseC, phaseB, phaseA, phaseB, phaseC
(Note that the bold underlined phaseB case is an ST-VIb anomaly because it is a known single class at an unexpected position.) Such anomalous n-grams or other forms of subsequences are typically of interest in (intrusion) detection systems, where deviations from regular symbolic sequences may indicate a defect or attack [60, 85]. A concrete example is when the short login-password event, which usually is observed once every now and then, suddenly occurs very frequently in a row and as such may represent a hacking attempt [183, 275]. An example from a different domain is a DNA sequence that contains genes from another organism [243]. A more intricate variation of the ST-IXb subtype combines, apart from the sequence attribute, substantive numerical variables with categorical variables [244]. An interesting example can be found in crop biomass monitoring, in which vegetation quantities (represented by the NDVI index) and crop classes are included in a single time series [292]. Cycle 14 in Fig. 10 is an example, with the anomaly possibly pointing out a data quality problem because the cycle’s crop labels may very well be erroneous. A symbolic sequence can also be anomalous in its entirety when compared to other sequences. A real-life example of such a deviant class sequence (ST-IXc) would be an anomalous trace in a collection of traces representing logged system or business processes [85, 183, 294]. Another example can be found in a dedicated genomic database that contains an erroneously included DNA sequence from an entirely different organism [243]. Finally, subtype ST-IXc may represent an anomalous text paragraph, section or document. This is similar to the topic and style deviations of ST-VIIIa, although the order of the words now plays a crucial role. For example, texts may deviate in terms of sentiment, which is a relevant issue in detecting fake reviews [157]. Word order is especially important here to properly deal with negations and other types of sequential dependencies [157, 245, 246, 299].
Several related subtypes are unusual individual time series in a panel dataset hosting multiple time series [116, 247, 282]. The set’s substantive information consists of numerical (and possibly categorical) data, whereas the individual series are distinguished by a nominal attribute [57, 111]. The deviant sequence (ST-IXd-i) consists of six subtypes [142, 233, 280, 314]. The anomalous series may be isolated from the other series for a short time interval or an extended period. In case of the latter, the curve may be deviant due to a shift (having a normal shape but at a different location), a distinct shape (positioned at the same location as other curves but showing another shape), a different amplitude (having the same shape but with a different range), an unusual trend (that makes the sequence slowly drift away from the other sequences) or with different variation levels (exhibiting a different random fluctuation). Figure 8d shows an ST-IXe anomaly that has a deviant shift with respect to its categorical property represented by a blue color, as well as an ST-IXf occurrence with a deviant shape. Another example is a deviant sound recording in a music collection, such as a song that stands out in terms of loudness, rhythm, melody, harmony or timbre [248].
The field of astronomy also offers an intriguing example with the star KIC 8462852. When analyzing its light curves as measured by the Kepler space telescope one can observe brightness dips, a type of event that was declared earlier in this study a temporary change anomaly. However, to understand exactly why astronomers where so excited about KIC 8462852 it is necessary to view the anomaly in the context of the usually observed dips. Figure 9a represents a normal occurrence, i.e., a fluent dip of around 1% that lasts a couple of hours, which may very well point to a transiting exoplanet (which is indeed the case here). KIC 8462852, on the other hand, exhibits several irregular, aperiodic brightness fluctuations that last multiple days, with strong light dips of up to 22% [249]. Figure 9b shows this anomaly, based on publicly available real data from the Kepler telescope [250]. Compared with the normal dips of other stars this is thus an ST-IXf deviant shape sequence due to its erratic and extended dimming. The cause of this anomalous event is unknown, but the fluctuations cannot be attributed to the light being blocked by a planet orbiting the star. Hypotheses that have been put forward are an uneven ring of dust, a swarm of asteroids or comet fragments, and even the spectacular explanation of an artificial megastructure built by an advanced extraterrestrial civilization, i.e., a so-called Dyson sphere for harvesting the star’s energy [249, 250, 251].
Note that deviations with regard to seasonality, which besides the trend is another basic component of time series [111, 232, 253], are captured by the deviant shape and amplitude subtypes. Furthermore, the five ST-IXd-h subtypes can also be used to typify trajectory anomalies because time series are conceptually very similar to sets with information on moving entities [5, 116, 119, 120, 278, 325]. Examples are a ship that deviates from the normal route [254] and a taxi that takes an unusual amount of turns [316]. Beyond this, time series are able to represent visual shapes of physical objects. In this context sequences with a deviating shape have been used to detect skulls from a primate species that differs from the rest of the collection [114].
A graph dataset can host a deviant subgraph (ST-IXj), which is an anomaly comprised of multiple vertices and edges. A specific example is a group of linked vertices with significantly different substantive values than those observed in other parts of the graph. The anomaly can also reside in a set of domain-specific subgraphs, which are defined by a group ID or shared property. The deviation of the subgraph may be due to unusual structural relationships, weights or attribute values. Alternatively, a set of subgraphs may be derived by community detection, after which uncommon (sub)communities can be identified [95, 169, 255]. The subcommunity below left in Fig. 7b with its high weights forms an example of such a phenomenon. The evolutionary trees used in biology also provide informative examples of graph anomalies. A so-called molecular clock may be assumed in such a tree, in which the branch length (edge weight) represents a time estimate for the evolution of one species into another [106, 213]. The evolutionary paths from the leaf nodes to the root need to have the same length because the evolution of a group is generally expected to have a constant rate. A given path from root to leaf that is significantly shorter or longer than the other paths can therefore be seen as an example of an anomaly [106, 212, 214, 218, 219, 256]. A clade (i.e., a subtree of an ancestor and its descendants) may also be considered anomalous if it is unstable when certain parameters are changed, features conspicuous differences in its branch lengths, or has several long branches—all of which may indicate methodological errors in the tree building process [212, 215, 216, 218, 257, 258].
In dynamic graphs a time dimension affords analyzing the evolution of graphs and subgraphs [20, 112, 220, 259]. Analogous to Type VI graph dynamics this may take the form of the aforementioned sequence-based anomalies such as spikes, level shifts and other changes (see the sequence-dependent subtypes ST-IVe and ST-VIb for atomic anomalies, and ST-VIIa-f and ST-IXa-i for aggregate occurrences). Such time-aware analysis of aggregate anomalies has been shown to be relevant for detecting faults in a network of application services, where monitoring nodes and edges at the individual level would not properly account for clusters and noisy traffic fluctuations [260]. Anomalous events can also be graph-specific, manifesting themselves as (sub)graphs that appear, disappear, flicker, merge, split, grow, shrink or demonstrate eccentric behavior (ST-IXk-r) [20, 112, 221, 261, 262, 287]. An example of a subgraph exhibiting highly eccentric behavior, which incidentally requires a rule-based detection approach, is a fraudulent group in a financial network that features specific trading ring patterns [263]. The group members first follow a ‘blackhole’ pattern by exclusively trading amongst themselves, and subsequently a ‘volcano’ pattern by selling the stocks—which by then have increased in price—to non-involved traders.
A deviant spatial region (ST-IXs) is an aggregate that is unusual due to its quantitative spatial and possibly substantive features. Such an anomaly is typically hosted by a geographical dataset with mixed data. An example is a deviant area, i.e., a polygon comprised of multiple lines, such as a land parcel with an unusual structure, color or class (e.g., water, development area or coastal scrub). Another example is a (poly)line located in an area where that class of object is normally not found, such as a river in the middle of a lake. These are examples that require not only linking different data elements to form polylines or other aggregates, but also relating them to both the wider area or polygon they are located in as well as any relevant domain-specific attributes. This is illustrated in [222, cf. 223] by counties (represented as polygons) in the USA, with Los Angeles and downtown Chicago being anomalies with an unusually high population density compared to adjacent counties. Spatial data can also be analyzed from a time perspective. A deviant spatio-temporal region (ST-IXt) is a polygon or other aggregated object with one or more substantive values that deviate when both its temporal pattern and spatial area are taken into account [279, 283]. Alternatively, it can be viewed as a temporal occurrence that shows a pattern unlike its spatial neighbors. In other words, it is a deviant (sub)sequence, such as one of the ST-IXc-i subtypes described above, but typically one that is uncommon in the local region rather than in the entire global space [224, 277]. An example is a region and time interval where the risk of suffering from a global disease outbreak is increasing significantly faster than elsewhere [281]. A more specific manifestation is a ‘flow anomaly’, a spatially marked subsequence that does not adhere to the pattern of values flowing from one location to another with a given time lag [283, 284]. Such occurrences may be observed if multiple sensors are placed in rivers and may point to flood conditions or chemical spills.
Finally, i.i.d. data with mixed data types may also host aggregate anomalies. A point-based mixed data aggregate anomaly (ST-IXu) is a group of cases that each have one or more unusual categorical and numerical values [290]. A distribution-based mixed data aggregate anomaly (ST-IXv) is a group of cases that is unusual in terms of its categorically and numerically determined group-level characteristics. An example is a cluster of neighboring points that is anomalous with respect to its distribution of categorical values [288]. See subtypes ST-VIIi and ST-VIIj for more information on their purely numerical counterparts.
To summarize, Sect. 3 has introduced nine basic anomaly types, each of which is discussed in a tangible way by a variety of subtypes and ample real-world and synthetic examples. The basic types are stable due to the fundamental classificatory principles of the typology, while the set of subtypes is extensible.

4 Discussion

This section discusses several relevant topics, such as deciding on the anomaly type, the evaluation of AD algorithms, explainable anomaly detection, and local versus global anomalies.

4.1 Deciding on the anomaly type

In order to sharply determine the nature of a given data deviation, one should opt for the simplest applicable (sub)type. For example, a case that is a Type II anomaly, per definition, will also have unique class value combinations in a larger subspace that includes additional categorical attributes. However, this does not imply one should see this instance as a Type V anomaly. After all, the deviation can be defined more parsimoniously. To be sure, this does not exclude the possibility that the case in question is also a Type V anomaly, but that should then pertain to a different subset of attributes.
There are several general principles to determine which (sub)types are simpler than others. The univariate types are simpler than the multivariate types. Anomalies that require only qualitative or quantitative attributes are simpler than those defined in terms of mixed data. Subtypes based on independent data are simpler than those based on dependent data, and atomic anomalies are simpler than aggregate types.
Simple subtypes such as the extreme tail value and unusual class may be part of a larger set with dependent data, e.g., one that constitutes a graph. The fact that the graph structure need not be referenced in the definition of these anomalies obviously does not prohibit the researcher to meaningfully discuss the deviation in the context of the given graph. Often it makes perfect sense to discuss a Type II occurrence as an ‘anomalous node’, as long as one acknowledges that the graph structure itself is not required to define and detect the anomaly from a data perspective. The same holds for other complex data structures, such as spatial data and time series. This insight is the reason that the typology does not feature an anomaly subtype for a globally extreme high or low time series value. This is simply a Type I anomaly and, unless the position in the sequence should be identified, the time-related dependency with other cases in the dataset is irrelevant for defining and detecting the deviation.
This section concludes with a brief tightening of the terminology used in this article. The term anomaly and deviant are synonyms and used as general terms. The term outlier refers to numerically isolated occurrences, such as the classical Type I and Type IVa-d cases. The term novelty can also be defined more strictly, as referring to occurrences that in some way represent new and hitherto unknown events or objects.

4.2 Evaluation of algorithms

In addition to offering an understanding of the nature and types of anomalies, the typology is aimed at facilitating the evaluation of AD algorithms. This is a relevant contribution because most research publications do not make it very clear which types can be identified by the anomaly detection algorithms studied, nor do they position the targeted anomalies in a broader context. However, given the wide variety of anomalies, it is clear that individual algorithms will be incapable of identifying all types [6, 17, 60, 82, 8486, 184]. Researchers can thus employ the predefined typology to provide a clear and objective insight into the functional capabilities of their AD algorithms by explicitly stating which anomaly (sub)types can be detected. Using the typology in this way also gives due acknowledgment of the no free lunch theorem [8083] and demand for transparent and explainable analytics and AI [7175] (also see next section).
However, the typology offers more opportunities for algorithm evaluation than merely clarifying which types and subtypes can be detected, since the typology is ideally also used for creating test sets. AD studies often evaluate algorithms by using existing AD benchmark datasets that are flawed [321]. Moreover, the common practice of treating (a sample of) a minority class as anomalies [9, 17, 86, 133, 159, 163, 182, 186, 195, 316] also poses problems. The cases of such a class may be very similar because they are part of a true pattern, and may even be very similar to other normal classes in the dataset. This latter situation can indeed be observed for several classes in the above-mentioned real-world Polis administration. In addition, there is no guarantee that all relevant anomaly subtypes will be present in such a test set. A better approach for creating AD test sets is therefore to use the typology as a basis for systematically creating and inserting instances of each relevant anomaly subtype in a real-world or simulated dataset. Such an injection approach ensures that the different anomalies are present and a thorough evaluation of the algorithm can subsequently be conducted. Researchers should aim to include the subtypes that, given the domain and typology dimensions, are relevant for the problem being studied.
Table 2 illustrates how the typology can facilitate the evaluation of several unsupervised algorithms for detecting anomalies in independent data. The focus is mainly on the algorithms, which are presented in the rows of the table, with the columns representing evaluation characteristics such as the capability to detect the individual anomaly types, metrics such as the AUC (area under the curve), F1 and sensitivity, as well as any remarks that may be relevant. Such an evaluation is appropriate when various (versions of) algorithms are evaluated and evaluation characteristics need to be presented at the level of the algorithm.
Grubbs’ parametric test aims at verifying whether a vector contains one or two outliers [30, 264], while the related GESD procedure is intended for testing whether a vector contains multiple outliers [35]. SECODA is a nonparametric AD algorithm for mixed data [6, 70]. Distance-based algorithms use a nearest neighbor approach to detect anomalies [51, 52, 54]. One could also include several versions of the algorithms or pre-processing steps. For example, with distance-based AD techniques the numerical attributes could be normalized and the categorical attributes transformed using dummy variables or inverse document frequency IDF (inverse document frequency), and such techniques could be evaluated in several combinations. Also, evaluation metrics based on the ROC (receiver operating characteristic) and confusion matrices could be calculated and reported for each anomaly (sub)type separately.
Table 3 presents the anomaly types in the rows, with the columns providing more details on different evaluation characteristics. This format was used in [70] for studying the impact of discretization and is appropriate if the focus is mainly on the anomaly (sub)types and few algorithms are being compared.

4.3 Explainable anomaly detection

The typology provides a generic framework for understanding anomalies through a data lens and is relevant for both research and practice. Typifying an individual deviant case as a specific anomaly subtype means it is described meaningfully in terms of five fundamental dimensions. This provides transparency and explains the nature of the deviation, i.e., makes clear how it differs from the normal cases in terms of key data characteristics. This adds value to an anomaly analysis because AD algorithms yield an anomaly score or label, but, although they may be able to detect multiple subtypes, typically do not provide information on how the individual anomalies differ from the rest of the data. The typology provides a structured way to analyze this and clarify the detection results.
For example, a general-purpose AD analysis on independent data, using, e.g., distance or density based algorithms, may detect 12 subtypes, namely ST-Ia-b, IIa-b, IIIa-b, IVa-d, Va and VIa. These obviously represent a wide variety of deviations that may be present in the dataset. If the detection algorithm merely informs the analyst on whether (or to what degree) a case is anomalous, the results therefore remain a black box. The typology can be used to bring about the necessary clarification, with its 12 clearly distinguishable subtypes and names, as well as five dimensions that explain how each subtype differs from normal data. Figure 4 illustrates different anomalies in a real-life dataset. Some of these occurrences differ from regular data because they have an extreme numerical value (ST-Ia) or have numerical values that, although individually normal, in combination position them outside the regular space (ST-IVa). Some cases are deviant because they feature a rare code (ST-IIa), while others have a code that, although normal, is unusual in their own numerical neighborhood (ST-VIa). By employing the typology these different subtypes can be clearly distinguished, labeled and understood. The plot also makes clear that visualization can be valuable during this explanation process and can be of help in typifying the detected anomalies.
Understanding the nature of the anomaly types present in a set is also relevant because of their different implications. In the context of data management AD may be conducted as an exploratory data quality analysis, which can be used to decide what kind of automated checks and corrections should be implemented. In real-time monitoring processes ST-Ia cases may then be handled with a simple threshold, ST-Ib cases with an interval, ST-IVa cases with a rule that combines thresholds or intervals, and perhaps it is decided that ST-IVc cases should be ignored because they merely represent subtle deviations.
The typology also yields tangible clues for further interpretation and sense-making. For example, a limited number of dispersed ST-Ia or b anomalies are likely to be non-informative random events or glitches, while the aggregate ST-VIIa, b, i and j occurrences may very well imply a more significant event or mechanism, and ST-VIIc and e even come with a drift in the data that represents a fundamental distributional change.

4.4 Local anomalies

There are several perspectives on the concept of locality, all of which can be meaningfully described in terms of the dimensions of anomalies that have been put forward in this study. The first perspective focuses on data structures with independent data and uses the cardinality of relationship to define the difference between local and global. Univariate anomalies are simply seen as global because they are unconditionally deviant relative to the remainder of the rows in the dataset [69, 70]. A single variable describes the entire (univariate) data space, which renders an unusual case in this view per definition a global anomaly. Therefore, when taking all the set’s cases into account, Type I anomalies will always have an extremely low, high, or otherwise unusual numerical value for the given attribute, without any condition and regardless of the other attributes. A similar argument can be given for Type II and III anomalies. The multivariate anomaly types, on the other hand, are only deviant given the categorical condition or the specific numerical area the case in question is located in. This is due to the fact that a multivariate anomaly is only unusual as a combination of values from multiple attributes and is therefore normal across the entire one-dimensional space. This is clearly illustrated with the mixed data types of the ST-VIa cases in the right plot of Fig. 6. These anomalies are normal with regard to the values of each individual numerical and categorical attribute. However, while, e.g., the blue points are normal in the global space, they are deviant in their own local numerical neighborhood. A local anomaly thus exists in some area, subsegment or class of the data [278]. Other examples are provided by [57] in a discussion on global versus local anomalies. A male with a body length of 175 cm is normal in the general population, but is an anomaly within the local class of professional basketball players. The reverse is also true: someone with a body length of 195 cm may be unusually tall with respect to the population, but not when only considering the class of professional basketball players.
A second perspective on the concept of locality focuses on data structures with independent data as well, but uses the data distribution to make the distinction between local and global. Local anomalies are described in terms of neighborhood density or similar characteristics, a perspective that is particularly relevant if the set contains multiple clusters that differ in this regard [8, 17, 53, 55, 273]. The outlyingness of a single case can be seen as being dependent upon the degree of isolation relative to its local neighborhood (rather than to the global space). Techniques for this setting, such as LOF and LOCI, therefore determine the density of a case in relation to the density of its neighboring points.
A third perspective on locality focuses on data structures with dependent data. In such datasets the individual cases are by their very nature intrinsically related, allowing the data management or contextual attributes used for linking the data points to naturally define neighborhoods [8, 126, 128, 222, 223]. Local anomalies in this context are typically deviations from autocorrelation patterns. They can perhaps most clearly be illustrated with spatial data, in which latitude–longitude attributes or other sorts of coordinates explicitly define locations and neighborhoods. An occurrence is locally anomalous if the values of one or more substantive attributes are unusual in its own spatial neighborhood, but normal in other regions. This logic also pertains to images and videos, with data points being pixels or voxels with a fixed position in the canvas or frame. An example of a local anomaly in an aerial photograph is an isolated tree in a certain region of the picture, while a large forest is present in another region [67]. The small blue region in Fig. 9c is an example as well. A similar reasoning holds for time series data, in which the timestamp explicitly positions cases at time points and in periods, which are the temporal equivalents of spatial locations and neighborhoods. A local anomaly then has a value that is normal when taking into account the entire history, but unusual in the period in which the occurrence lies. The ST-IVe subtype is such an anomaly and is illustrated in Fig. 8a. Local spatio-temporal anomalies can be viewed in the same vein. Finally, graphs also feature explicit structural positions and neighborhoods, although their visualization generally allows more freedom in where to graphically depict the nodes or cases.

4.5 Other classifications

The typology presented here offers an all-encompassing framework to describe the types of anomalies acknowledged in the literature, on the condition that they can be defined in terms of their data properties. For example, the typology can accommodate the well-known time series anomalies, i.e., the additive, temporary change, level shift, and innovational outlier [138, 140, 141]. In fact, the typology makes a more detailed distinction, because the classic additive outlier type does not distinguish between outliers that are globally extreme and outliers that are only deviant from a local perspective, e.g., in their climatic season [141]. This study’s typology identifies them as extreme tail values (ST-Ia) and local additive anomalies (ST-IVe), respectively. Another notable classification is that of [184], as it is both broad and data-oriented. However, it distinguishes between 9 concrete anomaly classes instead of 63 and does not use any classificatory principles.
The anomalies acknowledged in classifications that are not data-centric are not explicitly present in the current typology. For example, [96] presents classes of outliers that are not defined in terms of observed data characteristics, but instead refer to external causal phenomena that are often beyond the knowledge of the data analyst. This particularly holds for the procedural error (e.g., a data entry mistake), the extraordinary event (e.g., a hurricane), and the extraordinary observation (a non-explained measurement). Other classifications seemingly refer to the data, but are ultimately grounded in phenomena external to the dataset. Causes of outliers presented in [136] are, e.g., measurement errors and data from other distributions. To ascertain whether this is the case, one often requires additional information and subjective interpretation [2, 4, 34, 323]. This is by no means to say that these conceptualizations are not valuable, because analysts should certainly possess knowledge of the potential causes of anomalies. However, this study defines anomalies in terms of observable data characteristics and five theoretical dimensions. It allows the objective and principled declaration of anomaly (sub)types in a tangible and explainable fashion, using the data at hand and leaving relatively little room for discussion and doubt.
The classification in [7] distinguishes between point, contextual and collective anomalies. This differs from the three broad groups of this study’s typology (i.e., atomic univariate anomalies, atomic multivariate anomalies, and aggregate anomalies), which are rooted in the requirements a typology brings with it. The former classification features classes of anomalies that are not mutually exclusive, because a collective anomaly can also be a contextual anomaly. This is an undesirable property for any well-formed typology or classification, as the aim is to offer clear distinctions between concepts [130]. Strong classificatory principles and mutual exclusiveness were therefore demanded for the study at hand. The classification in [7] is also very general in nature, yielding rather abstract anomaly types. This is made clear by the fact that Type I to VI occurrences can all manifest themselves as a point anomaly, and a similar argument holds for contextual anomalies. In order to provide a concrete understanding, the current study offers not only a high-level framework hosting 3 broad groups and 9 basic types, but also a full typology with 63 tangible and detailed subtypes.

4.6 Conceptual variations

The concept of the anomaly refers to occurrences being both rare and different [9, 17, 319]. This can be seen as ultimately referring to anomalies being non-concentrated and positioned in the lowest density areas [13, 66, 311], with them being more extreme if they have more attributes that deviate and with values that deviate in a more severe fashion [297, 298]. However, it is worth discussing some nuances, mainly in the context of the typology’s data distribution dimension. For example, the global density anomaly (ST-IVd) shows that for a numerical dataset in which random noise is the norm, a small cluster actually forms the anomaly [184, 307]. Similarly, high-density regions may constitute the anomalies in dependent data (ST-VIk-l), such as when detecting geographical hot-spots of traffic accidents or disease outbreaks [66, 277]. Relatedly, categorical data may consist of nearly-unique vales, meaning that values that do repeat form the exception (ST-IIb) [181].
Anomalies can also be deviant on only one or two attributes and show unremarkable behavior on the other variables [57, 162, 163, 298]. A more complex manifestation is the high-density anomaly (HDA), which is an occurrence that deviates from the norm but in some subspace is located in a high-density region, and as such is positioned amongst or is a member of the most normal cases [297]. In cross-sectional (independent) data, subtypes IIa-b, Va, and VIa may turn out to be a HDA in its most basic form, but in principle all 63 subtypes can have high-density counterparts when taking into account an additional subspace. HDAs can be interpreted as deviant occurrences that hide in normality, and are especially relevant in misbehavior detection. Identifying them implies solving a delicate balancing problem, taking both anomalousness and normalness into account. The centrally positioned ST-IIa case in the left panel of Fig. 6 is a HDA, while the top one is positioned in a moderate or low density area.

4.7 Domain-specific anomalies

The AD field features many overviews of anomalies that are specific to a given domain. An example is the classification of [265, cf. 254], which describes a collection of anomaly types in maritime traffic data that may point to erroneous or falsified messages. Examples of types are ‘too fast for the given vessel,’ ‘vessel type incompatible with size,’ ‘non-declared flag change’ and ‘outside of usual roads.’ Examples of anomaly types observed on stock markets are ‘forward rate bias,’ ‘the new December effect,’ ‘short-term price drift’ and ‘the weekend effect’ [266]. Examples from the domain of computer network traffic are ‘port scans,’ ‘denial of service attacks,’ ‘alpha flows,’ and ‘outage events’ [267]. Other domain-specific classifications describe land parcel anomalies [268], data center anomalies [269], biological malformations [270], and wireless sensor network threats [152, 271]. Some of these domain types can be detected by unsupervised techniques (and can be typified using this study’s typology). However, many types represent deviations from specific patterns and are only relevant for a given domain or problem and thus require supervised or rule-based detection methods.

5 Conclusion

This study has presented a comprehensive theoretical conceptualization of anomalies that offers a concrete understanding of the nature and different types of anomalies in datasets. The contributions of this study can be summarized as follows:
  • It presents the first all-encompassing, theoretically principled, data-centric, general and domain-independent typology that offers a tangible understanding of the nature and types of anomalies. Apart from preliminary versions [6, 69, 70] no comparable typology, classification or conceptualization seems to have been published before. An extensive literature review has been conducted to ground the typology and overview of anomaly types in the rich contributions of extant research.
  • Rather than presenting a mere summing-up, the anomaly types are discussed in terms of fundamental dimensions, or classificatory principles. These dimensions offer a deep insight into the nature of the theoretical concept of the anomaly, and, as they systematically partition the classificatory space, serve to differentiate between the various mutually exclusive types and subtypes. The study employs five data-oriented dimensions to understand and define the concept of anomalies and to distinguish between the multitude of anomaly types and subtypes. These five cardinal aspects of anomalies are the data type, cardinality of relationship, anomaly level, data structure, and data distribution. By employing these dimensions this work aims to turn the generally ‘vague’ view on anomalies into a grounded and tangible theoretical concept, and to yield a typology that is principled, meaningful, non-arbitrary and offers explanatory power. The typology’s framework is presented in Fig. 2, and the full typology, this study’s core contribution, is summarized in Fig. 3.
  • By using three levels of abstraction the typology offers a hierarchical insight into the different manifestations of anomalies:
    • o Three general groups: atomic univariate anomalies, atomic multivariate anomalies, and aggregate anomalies.
    • o Nine basic and stable types of anomalies.
    • o An extensible set of different subtypes that offer a concrete understanding of how the basic types can manifest themselves in datasets. Based on the data types, cardinality and level, the subtypes can be positioned principally and logically in one of the framework’s nine main anomaly type cells, within which they can be described in more detail using the data structure and distribution. This study has presented 63 subtypes, but future research may discover new ones, for example as a result of entirely new data structures. Figure 3 provides a summary of all subtypes.
  • The typology can be used to meaningfully comprehend and explain the results of data analyses in both academia and practice, and to evaluate anomaly detection algorithms in a transparent and understandable fashion. It facilitates the creation of test sets and serves to clarify which types and subtypes can and cannot be detected by different (versions or parameterizations of) AD algorithms.
  • More in general, this study shows that attention should not merely be paid to algorithms and the detection process, but also to understanding the anomalies themselves by using a data-centric perspective. This helps to comprehend and explain the data and ultimately the world and may offer opportunities for developing new knowledge. For this reason both academics and practitioners would do well to not see the field as limited to anomaly detection, but to adopt the broader perspective of anomaly analysis and detection (AAAD). After all, in addition to detecting anomalies it is important to understand and explain why a given occurrence is anomalous, especially because follow-up actions are often required to manage the identified deviations.
  • Finally, the typology can be employed to scope and position academic studies, and to structure publications, courses, lectures, tutorials and projects on the basis of, for example, three general anomaly groups or nine basic types.
With these contributions this study aims to advance the maturity of the field. Not only by presenting a comprehensive overview of anomaly types, but also by offering an overarching, integrative and fundamental conceptualization of the field’s focal topic, the anomaly. This research has centered its attention on anomaly types that can be meaningfully described in terms of data and can be identified by unsupervised AD methods. Future research may therefore extend the scope to rare classes and categories that require (semi-)supervised methods to be detected [164, 272]. Research has shown that these share various characteristics with anomalous occurrences that may be unlabeled and detectable by unsupervised methods [182, 196]. As the current study has primarily focused on anomalies that can be characterized by their intrinsic data properties and thus be detected in an unsupervised mode, this similarity may bring with it interesting opportunities. Another topic for further research is studying in more detail how the data distribution can be used for further classification and clarification of anomaly subtypes. The way in which the distribution impacts anomalies in graphs and other complex data structures can also be studied, for example in the context of the current trend of AD in data streams. Regardless of future work, it is hoped this study has shown the inspiring richness of anomaly analysis and detection as well as the many contributions this field can make to both science and practice.
Table 1
Existing classifications for distinguishing between anomalies.
Reference
G/S
DC?
Classes of anomalies
Explicit classificatory dimensions
[6, 69, 70]
G
Y
Extreme value ano, rare class ano, simple mixed data ano, multidimensional numerical ano, multidimensional rare class ano, multidimensional mixed data ano
Types of data, cardinality of relationship
[2, cf. 31]
G
N
Extreme genuine member, contaminant
None
[34]
G
Y
Fringelier, distant outlier
None
[52]
G
Y
Strongest outlier, weak outlier, trivial outlier
Attribute subspace
[132]
G
Y
white crow, in-disguise anomaly
None
[5, 133]
G
Y
Weak outlier, strong outlier
None
[96]
G
N
Procedural error, extraordinary event, extraordinary observation, unique value combination
None
[136]
G
N
Data error, normal variance, data from other distributions, distributional assumption
None
[7]
G
N
Point anomaly, contextual anomaly, collective anomaly
None
[184]
G
Y
Known distribution ano, sparse distribution ano, local density-based ano, global density-based ano, rare instance ano, burst ano, deviant sequence ano, trend ano, irregularity ano
None
[182]
G
Y
Trivial outlier, non-trivial outlier
None
[3, 143]
S
N
Outlier, high-leverage point, influential point
None
[138, cf. 141]
S
Y
Additive outlier, temporary change, level shift, innovational outlier
None
[187]
S
Y
Isolated outlier, patch outlier, level shift
None
[142]
S
Y
Isolated outlier, shift outlier, amplitude outlier, shape outlier
None
[233]
S
Y
Trend anomaly, seasonality anomaly
None
[314]
S
Y/N
Outlier, spike, stuck-at, high-noise (plus several non-data-centric anomalies)
None
[281]
S
Y
Various spatio-temporal change patterns
Temporal, spatial, raster/vector
[20]
S
Y
Deviant vertex, deviant edge, deviant subgraph
None
[205]
S
Y
Near-star, near-clique, heavy vicinity, dominant edge
None
[125]
S
Y
Insertion, update and deletion anomaly
Based on database CRUD functions
[60]
S
Y
Foreign-symbol, foreign n-gram, rare n-gram
None
[118, cf. 146]
S
Y
Positional outlier, angular outlier
None
G/S refers to a general (broad and usually abstract) versus specific way to distinguish between classes of anomalies. DC stands for data-centric, meaning the anomalies can be distinguished by analyzing the dataset, without a reference to or dependency on external factors (such as unknown real-world events or arbitrary analyst decisions)
Table 2
Illustration of using the typology to evaluate anomaly detection algorithms.
Algorithm
Type
Remarks
I
II
III
IV
V
VI
Grubbs/GESD test
a: ✓ b: ×
a: × b: ×
a: ✓ b: ×
a: × b: ×
c: × d: ×
a: ×
a: ×
Also provides statistical significance metric. ST-IIIa will be detected using quantitative data only, and thus cannot be directly distinguished from ST-Ia.
SECODA
a: ✓ b: ✓
a: ✓ b: ✓
a: ✓ b: ✓
a: ✓ b: ✓
c: ✓ d: ✓
a: ✓
a: ✓
No data type transformations or rescaling required, but vulnerable to the curse of dimensionality. ST-IIb cases are represented by high anomaly scores instead of low scores.
Distance-based AD
a: ✓ b: ✓
a: × b: ×
a: ✓ b: ✓
a: ✓ b: ✓
c: × d: ✓
a: ×
a: ×
Needs rescaling for optimal performance that corresponds with human intuition. With pre-processing (e.g., dummy variables or IDF) categorical data can also be analyzed. Type III occurrences cannot be directly distinguished from Type I outliers.
Table 3
Illustration of using the typology to evaluate anomaly detection algorithms, with the focus on the types.
Type
Impact?
Useful?
Explanation [ED = equidepth / EW = equiwidth discretization]
I
Y
N
ED cannot discriminate between univariate numerical values and is intrinsically not equipped to detect this type.
II
N/Y
Y
ED is identical to EW when analyzing a single categorical attribute. It can be more useful than EW if the goal is to detect (non-unique) rare Type II anomalies in numerically high-density regions in an analysis of mixed data.
VI
Y
Y
ED tends to favor the detection of Type VI anomalies and can be more useful than EW if identifying them is the aim of the analysis.

Acknowledgements

This research has been partly supported by HEINEKEN, Loonaangifteketen and UWV, but did not receive a specific grant from funding agencies, nor is there any conflict of interest. The author thanks Arno Schilperoord and the anonymous reviewers for their valuable contributions. An earlier version of this article was published on arXiv on July 30, 2020. Preliminary versions of the typology were presented in [69] and the poster of [6]. Feel free to contact the author if anomaly (sub)types are deemed missing.
Open AccessThis article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://​creativecommons.​org/​licenses/​by/​4.​0/​.

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Footnotes
1
The term ‘distribution’ is usually not explicitly defined. One could argue that the concept of data distribution alone is sufficient to describe anomalies. However, such a simplified stance would defeat the purpose of this study, namely to offer fundamental and concrete insights into the nature and types of anomalies. The distribution here thus excludes the other dimensions.
 
Literature
2.
go back to reference Barnett, V., Lewis, T.: Outliers in Statistical Data, 3rd edn. Wiley, Chichester (1994)MATH Barnett, V., Lewis, T.: Outliers in Statistical Data, 3rd edn. Wiley, Chichester (1994)MATH
3.
go back to reference Izenman, A.J.: Modern Multivariate Statistical Techniques: Regression, Classification, and Manifold Learning. Springer, New York (2008)MATHCrossRef Izenman, A.J.: Modern Multivariate Statistical Techniques: Regression, Classification, and Manifold Learning. Springer, New York (2008)MATHCrossRef
4.
go back to reference Boddy, R., Smith, G.: Statistical Methods in Practice: For Scientists and Technologists. John Wiley & Sons, Chichester (2009)MATHCrossRef Boddy, R., Smith, G.: Statistical Methods in Practice: For Scientists and Technologists. John Wiley & Sons, Chichester (2009)MATHCrossRef
6.
go back to reference Foorthuis, R.: SECODA: Segmentation- and Combination-Based Detection of Anomalies. Proceedings of the 4th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2017), Tokyo, Japan, pp. 755–764 (2017) (Also see the poster for the typology’s framework: Foorthuis, R.: Anomaly Detection with SECODA. Poster Presentation at DSAA 2017) Foorthuis, R.: SECODA: Segmentation- and Combination-Based Detection of Anomalies. Proceedings of the 4th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2017), Tokyo, Japan, pp. 755–764 (2017) (Also see the poster for the typology’s framework: Foorthuis, R.: Anomaly Detection with SECODA. Poster Presentation at DSAA 2017)
7.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys, Vol. 41, No. 3 (2009) Chandola, V., Banerjee, A., Kumar, V.: Anomaly Detection: A Survey. ACM Computing Surveys, Vol. 41, No. 3 (2009)
8.
go back to reference Schubert, E., Zimek, A., Kriegel, H.P.: Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min. Knowl. Disc. 28(1), 190–237 (2014)MathSciNetMATHCrossRef Schubert, E., Zimek, A., Kriegel, H.P.: Local outlier detection reconsidered: a generalized view on locality with applications to spatial, video, and network outlier detection. Data Min. Knowl. Disc. 28(1), 190–237 (2014)MathSciNetMATHCrossRef
9.
go back to reference Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms. PloS ONE, 11(4) (2016) Goldstein, M., Uchida, S.: A comparative evaluation of unsupervised anomaly detection algorithms. PloS ONE, 11(4) (2016)
10.
go back to reference Shahbaba, B.: Biostatistics with R: An Introduction to Statistics Through Biological Data. Springer, New York (2012)MATHCrossRef Shahbaba, B.: Biostatistics with R: An Introduction to Statistics Through Biological Data. Springer, New York (2012)MATHCrossRef
11.
go back to reference Taha, A., Hadi, A.S.: anomaly detection methods for categorical data: a review. ACM Comput. Surv., 52(2) (2019) Taha, A., Hadi, A.S.: anomaly detection methods for categorical data: a review. ACM Comput. Surv., 52(2) (2019)
12.
14.
go back to reference Pimentel, M.A.F., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Signal Process. 99, 215–249 (2014)CrossRef Pimentel, M.A.F., Clifton, D.A., Clifton, L., Tarassenko, L.: A review of novelty detection. Signal Process. 99, 215–249 (2014)CrossRef
15.
go back to reference Fu, T.: A review on time series data mining. Eng. Appl. Artif. Intell. 24, 164–181 (2011)CrossRef Fu, T.: A review on time series data mining. Eng. Appl. Artif. Intell. 24, 164–181 (2011)CrossRef
16.
go back to reference Esling, P., Agon, C.: Time-series data mining. ACM Comput. Surv. 45(1) (2012) Esling, P., Agon, C.: Time-series data mining. ACM Comput. Surv. 45(1) (2012)
17.
go back to reference Campos, G.O., Zimek, A., Sander, J., Campello, R.J.G.B., Micenková, B., Schubert, E., Assent, I., Houle, M.E.: On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min. Knowl. Disc. 30(4), 891–927 (2016)MathSciNetCrossRef Campos, G.O., Zimek, A., Sander, J., Campello, R.J.G.B., Micenková, B., Schubert, E., Assent, I., Houle, M.E.: On the evaluation of unsupervised outlier detection: measures, datasets, and an empirical study. Data Min. Knowl. Disc. 30(4), 891–927 (2016)MathSciNetCrossRef
18.
go back to reference Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2003) Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (2003)
19.
go back to reference Maervoet, J., Vens, C., Vanden Berghe, G., Blockeel, H., De Causmaecker, P.: Outlier detection in relational data: a case study in geographical information systems. Expert Syst. Appl. 39(5), 4718–4728 (2012)CrossRef Maervoet, J., Vens, C., Vanden Berghe, G., Blockeel, H., De Causmaecker, P.: Outlier detection in relational data: a case study in geographical information systems. Expert Syst. Appl. 39(5), 4718–4728 (2012)CrossRef
20.
go back to reference Akoglu, L., Tong, H., Koutra, D.: Graph-based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626–688 (2015)MathSciNetCrossRef Akoglu, L., Tong, H., Koutra, D.: Graph-based anomaly detection and description: a survey. Data Min. Knowl. Disc. 29(3), 626–688 (2015)MathSciNetCrossRef
21.
go back to reference Box, G.E.P., Jenkins, G.M., Reinsel, G.C.: Time Series Analysis: Forecasting and Control, 3rd edn. Prentice-Hall, Upper Saddle River (1994)MATH Box, G.E.P., Jenkins, G.M., Reinsel, G.C.: Time Series Analysis: Forecasting and Control, 3rd edn. Prentice-Hall, Upper Saddle River (1994)MATH
22.
go back to reference Bernoulli, D.: The Most probable choice between several discrepant observations and the formation therefrom of the most likely induction. In: Transl by C.G. Allen, Biometrika, 48(1–2), pp. 3–18 (1777) (The original was published in Latin in Acta Acad. Petrop.) (1961) Bernoulli, D.: The Most probable choice between several discrepant observations and the formation therefrom of the most likely induction. In: Transl by C.G. Allen, Biometrika, 48(1–2), pp. 3–18 (1777) (The original was published in Latin in Acta Acad. Petrop.) (1961)
23.
go back to reference Legendre, A.M.: On the Method of Least Squares. In: Smith, D.E., A Source Book in Mathematics, Vol. II, pp. 576–579, McGraw-Hill 1929 and Dover 1959 (1805) Legendre, A.M.: On the Method of Least Squares. In: Smith, D.E., A Source Book in Mathematics, Vol. II, pp. 576–579, McGraw-Hill 1929 and Dover 1959 (1805)
24.
go back to reference Peirce, B.: Criterion for the rejection of doubtful observations. Astron. J. 2(45), 161–163 (1852)CrossRef Peirce, B.: Criterion for the rejection of doubtful observations. Astron. J. 2(45), 161–163 (1852)CrossRef
25.
go back to reference Glaisher, J.W.L.: On the Rejection of Discordant Observations. Mon. Not. R. Astron. Soc. 33, 391–402 (1873)MATHCrossRef Glaisher, J.W.L.: On the Rejection of Discordant Observations. Mon. Not. R. Astron. Soc. 33, 391–402 (1873)MATHCrossRef
26.
go back to reference Edgeworth, F.Y.: On discordant observations. Lond. Edinburgh Dublin Philos. Mag. J. Sci. 23(143), 364–375 (1887)MATHCrossRef Edgeworth, F.Y.: On discordant observations. Lond. Edinburgh Dublin Philos. Mag. J. Sci. 23(143), 364–375 (1887)MATHCrossRef
27.
go back to reference Irwin, J.O.: On a criterion for the rejection of outlying observations. Biometrika 17(3/4), 238–250 (1925)MATHCrossRef Irwin, J.O.: On a criterion for the rejection of outlying observations. Biometrika 17(3/4), 238–250 (1925)MATHCrossRef
28.
go back to reference Pearson, E.S., Chandra Sekar, C.: The efficiency of statistical tools and a criterion for the rejection of outlying observations. Biometrika 28(3/4), 308–320 (1936)MATHCrossRef Pearson, E.S., Chandra Sekar, C.: The efficiency of statistical tools and a criterion for the rejection of outlying observations. Biometrika 28(3/4), 308–320 (1936)MATHCrossRef
29.
go back to reference Nair, K.R.: The distribution of the extreme deviate from the sample mean and its studentized form. Biometrika 35(1/2), 118–144 (1948)MathSciNetMATHCrossRef Nair, K.R.: The distribution of the extreme deviate from the sample mean and its studentized form. Biometrika 35(1/2), 118–144 (1948)MathSciNetMATHCrossRef
32.
go back to reference Proschan, F.: Rejection of outlying observations. Am. J. Phys. 21(7), 520–525 (1953)CrossRef Proschan, F.: Rejection of outlying observations. Am. J. Phys. 21(7), 520–525 (1953)CrossRef
34.
go back to reference Wainer, H.: Robust statistics: a survey and some prescriptions. J. Educ. Stat. 1(4), 285–312 (1976)CrossRef Wainer, H.: Robust statistics: a survey and some prescriptions. J. Educ. Stat. 1(4), 285–312 (1976)CrossRef
35.
go back to reference Rosner, B.: Percentage points for a generalized ESD many-outlier procedure. Technometrics 25(2), 165–172 (1983)MATHCrossRef Rosner, B.: Percentage points for a generalized ESD many-outlier procedure. Technometrics 25(2), 165–172 (1983)MATHCrossRef
36.
go back to reference Rousseeuw, P.J., Leroy, A.M.: Robust Regression and Outlier Detection. John Wiley & Sons, New York (1987)MATHCrossRef Rousseeuw, P.J., Leroy, A.M.: Robust Regression and Outlier Detection. John Wiley & Sons, New York (1987)MATHCrossRef
37.
go back to reference Osborne, J.W., Overbay, A.: The power of outliers (and why researchers should always check for them). Prac. Assess. Res. Eval. 9(6) (2004) Osborne, J.W., Overbay, A.: The power of outliers (and why researchers should always check for them). Prac. Assess. Res. Eval. 9(6) (2004)
38.
go back to reference Hoaglin, D.C., Mosteller, F., Tukey, J.W.: Exploring Data Tables, Trends, and Shapes. Wiley, Hoboken (2006)MATHCrossRef Hoaglin, D.C., Mosteller, F., Tukey, J.W.: Exploring Data Tables, Trends, and Shapes. Wiley, Hoboken (2006)MATHCrossRef
39.
go back to reference Tabachnick, B.G., Fidell, L.S.: Using Multivariate Statistics, 6th edn. Pearson, Boston (2012) Tabachnick, B.G., Fidell, L.S.: Using Multivariate Statistics, 6th edn. Pearson, Boston (2012)
40.
go back to reference Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. In: Technical Report, Washington (1980) Anderson, J.P.: Computer Security Threat Monitoring and Surveillance. In: Technical Report, Washington (1980)
41.
go back to reference Mann, N.R.: Optimal outlier tests for a weibull model - to identify process changes or to predict failure times. In: Technical paper, Office of Naval Research, Arlington, Virginia (1981) Mann, N.R.: Optimal outlier tests for a weibull model - to identify process changes or to predict failure times. In: Technical paper, Office of Naval Research, Arlington, Virginia (1981)
42.
go back to reference Tietjen, G.L.: The Analysis and detection of Outliers. In: D’Agostino, R.B., Stephens, M.A., Goodness-of-Fit Techniques, pp. 497–522. Marcel Dekker, New York (1986) Tietjen, G.L.: The Analysis and detection of Outliers. In: D’Agostino, R.B., Stephens, M.A., Goodness-of-Fit Techniques, pp. 497–522. Marcel Dekker, New York (1986)
43.
go back to reference Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987) Denning, D.E.: An intrusion-detection model. IEEE Trans. Softw. Eng. SE-13(2), 222–232 (1987)
44.
go back to reference Smaha, S.E.: Haystack: An intrusion detection system. In: Proceedings of the Fourth Aerospace Computer Security Applications Conference, pp. 37–44 (1988) Smaha, S.E.: Haystack: An intrusion detection system. In: Proceedings of the Fourth Aerospace Computer Security Applications Conference, pp. 37–44 (1988)
45.
go back to reference Lunt, T.F., Jagannathan, R.: A Prototype real-time intrusion-detection expert system. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 59–66 (1988) Lunt, T.F., Jagannathan, R.: A Prototype real-time intrusion-detection expert system. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 59–66 (1988)
46.
go back to reference Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D.: A Network security monitor. In; Technical Report, University of California (1989) Heberlein, L.T., Dias, G.V., Levitt, K.N., Mukherjee, B., Wood, J., Wolber, D.: A Network security monitor. In; Technical Report, University of California (1989)
47.
go back to reference Javitz, H., Valdes, A.: The SRI IDES statistical anomaly detector. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA (1991) Javitz, H., Valdes, A.: The SRI IDES statistical anomaly detector. In: Proceedings of the IEEE Symposium on Security and Privacy, Oakland, USA (1991)
48.
go back to reference Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proceedings of the IEEE Symposium on Security and Privacy (1989) Vaccaro, H.S., Liepins, G.E.: Detection of anomalous computer session activity. In: Proceedings of the IEEE Symposium on Security and Privacy (1989)
49.
go back to reference Major, J.A., Riedinger, D.R.: EFD: A hybrid knowledge/statistical-based system for the detection of fraud. Int. J. Intell. Syst. 7(7), 687–703 (1992)CrossRef Major, J.A., Riedinger, D.R.: EFD: A hybrid knowledge/statistical-based system for the detection of fraud. Int. J. Intell. Syst. 7(7), 687–703 (1992)CrossRef
50.
go back to reference Burge, P., Shawe-Taylor, J.: Detecting cellular fraud using adaptive prototypes. In: Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management (1997) Burge, P., Shawe-Taylor, J.: Detecting cellular fraud using adaptive prototypes. In: Proceedings of the AAAI-97 Workshop on AI Approaches to Fraud Detection and Risk Management (1997)
51.
go back to reference Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: VLDB-98, Proceedings of the 24th International Conference on Very Large Data Bases, New York (1998) Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: VLDB-98, Proceedings of the 24th International Conference on Very Large Data Bases, New York (1998)
52.
go back to reference Knorr, E.M., Ng, R.T.: finding intensional knowledge of distance-based outliers. In: VLDB-99, Proceedings of the 25th International Conference on Very Large Data Bases, Edinburgh, Scotland (1999) Knorr, E.M., Ng, R.T.: finding intensional knowledge of distance-based outliers. In: VLDB-99, Proceedings of the 25th International Conference on Very Large Data Bases, Edinburgh, Scotland (1999)
53.
go back to reference Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the ACM SIGMOD Conference on Management of Data (2000) Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: Proceedings of the ACM SIGMOD Conference on Management of Data (2000)
54.
go back to reference Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, USA (2000) Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the ACM SIGMOD International Conference on Management of Data, Dallas, USA (2000)
55.
go back to reference Papadimitriou, S., Kitagawa, H., Faloutsos, C., Gibbons, P.B.: LOCI: Fast outlier detection using the local correlation integral. In: Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE’03), Bangalore, India (2003) Papadimitriou, S., Kitagawa, H., Faloutsos, C., Gibbons, P.B.: LOCI: Fast outlier detection using the local correlation integral. In: Proceedings of the 19th IEEE International Conference on Data Engineering (ICDE’03), Bangalore, India (2003)
56.
go back to reference Bay, S.D., Schwabacher, M.: Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the Ninth ACM SIGKDD, pp. 29–38 (2003) Bay, S.D., Schwabacher, M.: Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of the Ninth ACM SIGKDD, pp. 29–38 (2003)
57.
go back to reference Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley, Boston (2006) Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley, Boston (2006)
58.
go back to reference van der Loo, M., de Jonge, E.: Statistical Data Cleaning with Applications in R. Wiley, Hoboken (2018) van der Loo, M., de Jonge, E.: Statistical Data Cleaning with Applications in R. Wiley, Hoboken (2018)
59.
go back to reference Mason, R.L., Young, J.C.: Multivariate Statistical Process Control with Industrial Applications. ASA-SIAM, Philadelphia (2002)MATHCrossRef Mason, R.L., Young, J.C.: Multivariate Statistical Process Control with Industrial Applications. ASA-SIAM, Philadelphia (2002)MATHCrossRef
60.
go back to reference Maxion, R.A., Tan, K.M.C.: Benchmarking anomaly-based detection systems. In: First International Conference on Dependable Systems & Networks: New York, USA (2000) Maxion, R.A., Tan, K.M.C.: Benchmarking anomaly-based detection systems. In: First International Conference on Dependable Systems & Networks: New York, USA (2000)
61.
go back to reference Gartner: Hype Cycle for Data Science and Machine Learning, 2018. Gartner, Inc. (2018) Gartner: Hype Cycle for Data Science and Machine Learning, 2018. Gartner, Inc. (2018)
62.
go back to reference Forrester: The Forrester Wave: Security Analytics Platforms, Q1 2017. Forrester Research, Inc. (2017) Forrester: The Forrester Wave: Security Analytics Platforms, Q1 2017. Forrester Research, Inc. (2017)
63.
go back to reference Anodot: Ultimate guide to building a machine learning anomaly detection system. Anodot (2017) Anodot: Ultimate guide to building a machine learning anomaly detection system. Anodot (2017)
64.
go back to reference Riveiro, M.: Visual Analytics for Maritime Anomaly Detection. Örebro University, Örebro (2011) Riveiro, M.: Visual Analytics for Maritime Anomaly Detection. Örebro University, Örebro (2011)
65.
go back to reference Zimek, A., Campello, R.J.G.B., Sander, J.: Ensembles for unsupervised outlier detection: challenges and research questions. ACM SIGKDD Explor. 15(1), 11–22 (2013)CrossRef Zimek, A., Campello, R.J.G.B., Sander, J.: Ensembles for unsupervised outlier detection: challenges and research questions. ACM SIGKDD Explor. 15(1), 11–22 (2013)CrossRef
66.
go back to reference Schubert, E., Weiler, M., Zimek, A.: Outlier detection and trend detection: two sides of the same coin. In: Proceedings of the 15th IEEE International Conference on Data Mining Workshops (2015) Schubert, E., Weiler, M., Zimek, A.: Outlier detection and trend detection: two sides of the same coin. In: Proceedings of the 15th IEEE International Conference on Data Mining Workshops (2015)
67.
go back to reference Matteoli, S., Diani, M., Corsini, G.: A tutorial overview of anomaly detection in hyperspectral images. IEEE Aerosp. Electron. Syst. Mag. 25(7), 5–28 (2010)CrossRef Matteoli, S., Diani, M., Corsini, G.: A tutorial overview of anomaly detection in hyperspectral images. IEEE Aerosp. Electron. Syst. Mag. 25(7), 5–28 (2010)CrossRef
68.
go back to reference Roshtkhari, M.J., Levine, M.D.: An on-line, real-time learning method for detecting anomalies in videos using spatio-temporal compositions. Comput. Vis. Image Underst. 117(10), 1436–1452 (2013)CrossRef Roshtkhari, M.J., Levine, M.D.: An on-line, real-time learning method for detecting anomalies in videos using spatio-temporal compositions. Comput. Vis. Image Underst. 117(10), 1436–1452 (2013)CrossRef
69.
go back to reference Foorthuis, R.: A typology of data anomalies. In: Proceedings of the 17th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2018), Cádiz, Spain, CCIS 854 (2018) Foorthuis, R.: A typology of data anomalies. In: Proceedings of the 17th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based Systems (IPMU 2018), Cádiz, Spain, CCIS 854 (2018)
70.
go back to reference Foorthuis, R.: All or in-cloud: how the identification of six types of anomalies is affected by the discretization method. In: Atzmueller M., Duivesteijn W. (eds) Artificial Intelligence. BNAIC 2018. Springer, Communications in Computer and Information Science, vol. 1021, pp 25–42 (2019) Foorthuis, R.: All or in-cloud: how the identification of six types of anomalies is affected by the discretization method. In: Atzmueller M., Duivesteijn W. (eds) Artificial Intelligence. BNAIC 2018. Springer, Communications in Computer and Information Science, vol. 1021, pp 25–42 (2019)
71.
go back to reference Mittelstadt, B.D., Allo, P., Taddeo, M., Wachter, S., Floridi, L.: The ethics of algorithms: mapping the debate. Big Data Soc., 3(2), July–December (2016) Mittelstadt, B.D., Allo, P., Taddeo, M., Wachter, S., Floridi, L.: The ethics of algorithms: mapping the debate. Big Data Soc., 3(2), July–December (2016)
72.
go back to reference Ziewitz, M.: Governing algorithms: myth, mess, and methods. Sci. Technol. Human Values 41(1), 3–16 (2016)CrossRef Ziewitz, M.: Governing algorithms: myth, mess, and methods. Sci. Technol. Human Values 41(1), 3–16 (2016)CrossRef
73.
go back to reference Marcus, G.: Deep learning: a critical appraisal. arXiv: 1801.00631 (2018) Marcus, G.: Deep learning: a critical appraisal. arXiv: 1801.00631 (2018)
74.
go back to reference O’Neil, C.: Weapons of Math Destruction. Crown Publishers, New York (2016)MATH O’Neil, C.: Weapons of Math Destruction. Crown Publishers, New York (2016)MATH
75.
go back to reference EU: Ethics guidelines for trustworthy AI. In: The EU’s High-Level Expert Group on Artificial Intelligence. Brussels: European Commission (2019) EU: Ethics guidelines for trustworthy AI. In: The EU’s High-Level Expert Group on Artificial Intelligence. Brussels: European Commission (2019)
76.
go back to reference Lipton, Z.C.: The mythos of model interpretability. In: Proceedings of the ICML Workshop on Human Interpretability in Machine Learning (WHI 2016), New York (2016) Lipton, Z.C.: The mythos of model interpretability. In: Proceedings of the ICML Workshop on Human Interpretability in Machine Learning (WHI 2016), New York (2016)
77.
go back to reference Sculley, D. et al.: Hidden technical debt in machine learning systems. In: Proceedings of NIPS’15, Vol. 2, pp. 2503–2511 (2015) Sculley, D. et al.: Hidden technical debt in machine learning systems. In: Proceedings of NIPS’15, Vol. 2, pp. 2503–2511 (2015)
78.
go back to reference Breck, E., Cai, S., Nielsen, E., Salib, M., Sculley, D.: What’s your ML test score? A rubric for ML production systems. In: Proceedings of NIPS’16 (2016) Breck, E., Cai, S., Nielsen, E., Salib, M., Sculley, D.: What’s your ML test score? A rubric for ML production systems. In: Proceedings of NIPS’16 (2016)
79.
go back to reference Lazer, D., Kennedy, R., King, G., Vespignani, A.: The parable of google Flu: traps in big data analysis. Science 343(6176), 1203–1205 (2014)CrossRef Lazer, D., Kennedy, R., King, G., Vespignani, A.: The parable of google Flu: traps in big data analysis. Science 343(6176), 1203–1205 (2014)CrossRef
80.
go back to reference Wolpert, D.H., Macready, W.G.: No free lunch theorems for search. In: Technical Report SFI-TR-95–02–010, Santa Fe Institute (1996) Wolpert, D.H., Macready, W.G.: No free lunch theorems for search. In: Technical Report SFI-TR-95–02–010, Santa Fe Institute (1996)
81.
go back to reference Clarke, B., Fokoué, E., Zhang, H.H.: Principles and Theory for Data Mining and Machine Learning. Springer, New York (2009)MATHCrossRef Clarke, B., Fokoué, E., Zhang, H.H.: Principles and Theory for Data Mining and Machine Learning. Springer, New York (2009)MATHCrossRef
82.
go back to reference Janssens, J.H.M.: Outlier selection and one-class classification. In: PhD Thesis, Tilburg University (2013) Janssens, J.H.M.: Outlier selection and one-class classification. In: PhD Thesis, Tilburg University (2013)
83.
go back to reference Rokach, L., Maimon, O.: Data Mining With Decision Trees: Theory and Applications, 2nd edn. World Scientific Publishing, Singapore (2015)MATH Rokach, L., Maimon, O.: Data Mining With Decision Trees: Theory and Applications, 2nd edn. World Scientific Publishing, Singapore (2015)MATH
84.
go back to reference Orair, G.H., Teixeira, C.H.C., Meira Jr., W., Wang, Y., Parthasarathy, S.: Distance-based outlier detection: consolidation and renewed bearing. proceedings of the vldb endowment, 3(2) (2010) Orair, G.H., Teixeira, C.H.C., Meira Jr., W., Wang, Y., Parthasarathy, S.: Distance-based outlier detection: consolidation and renewed bearing. proceedings of the vldb endowment, 3(2) (2010)
85.
go back to reference Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the IEEE Symposium on Security and Privacy, Washington, USA, pp. 133–145 (1999) Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the IEEE Symposium on Security and Privacy, Washington, USA, pp. 133–145 (1999)
86.
go back to reference Kandanaarachchi, S., Muñoz, M.A., Hyndman, R.J., Smith-Miles, K.: On normalization and algorithm selection for unsupervised outlier detection. In: Working paper, ISSN 1440–771X, Monash University (2018) Kandanaarachchi, S., Muñoz, M.A., Hyndman, R.J., Smith-Miles, K.: On normalization and algorithm selection for unsupervised outlier detection. In: Working paper, ISSN 1440–771X, Monash University (2018)
87.
go back to reference Keogh, E., Lonardi, S., Ratanamahatana, C.A.: Towards parameter-free data mining. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, USA (2004) Keogh, E., Lonardi, S., Ratanamahatana, C.A.: Towards parameter-free data mining. In: Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, USA (2004)
88.
go back to reference Collins: Collins Cobuild Advanced Learner’s English Dictionary. HarperCollins Publishers (2006) Collins: Collins Cobuild Advanced Learner’s English Dictionary. HarperCollins Publishers (2006)
90.
go back to reference Stevenson, A.: Oxford Dictionary of English, 3rd edn. Oxford University Press, Oxford (2010) Stevenson, A.: Oxford Dictionary of English, 3rd edn. Oxford University Press, Oxford (2010)
91.
go back to reference Kuhn, T.S.: The Structure of Scientific Revolutions, 3rd edn. The University of Chicago Press, London (1996)CrossRef Kuhn, T.S.: The Structure of Scientific Revolutions, 3rd edn. The University of Chicago Press, London (1996)CrossRef
92.
go back to reference Lakatos, I.: The Methodology of Scientific Research Programmes. Philosophical Papers, vol. 1. Cambridge University Press, Cambridge (1978) Lakatos, I.: The Methodology of Scientific Research Programmes. Philosophical Papers, vol. 1. Cambridge University Press, Cambridge (1978)
93.
go back to reference Audi, R.: The Cambridge Dictionary of Philosophy, 2nd edn. Cambridge University Press, Cambridge (1999) Audi, R.: The Cambridge Dictionary of Philosophy, 2nd edn. Cambridge University Press, Cambridge (1999)
94.
go back to reference Hollis, M.: The Philosophy of Social Science: An Introduction. Cambridge University Press, Cambridge (1994)CrossRef Hollis, M.: The Philosophy of Social Science: An Introduction. Cambridge University Press, Cambridge (1994)CrossRef
95.
go back to reference Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, Amsterdam (2006)MATH Han, J., Kamber, M.: Data Mining: Concepts and Techniques, 2nd edn. Elsevier, Amsterdam (2006)MATH
96.
go back to reference Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate Data Analysis. Seventh Ed. Pearson Prentice Hall (2010) Hair, J.F., Black, W.C., Babin, B.J., Anderson, R.E.: Multivariate Data Analysis. Seventh Ed. Pearson Prentice Hall (2010)
97.
go back to reference Bluman, A.G.: Elementary Statistics: A Step by Step Approach, Eight McGraw-Hill, New York (2012) Bluman, A.G.: Elementary Statistics: A Step by Step Approach, Eight McGraw-Hill, New York (2012)
98.
go back to reference Cramer, D., Howitt, D.: The SAGE Dictionary of Statistics. SAGE Publications, London (2004)CrossRef Cramer, D., Howitt, D.: The SAGE Dictionary of Statistics. SAGE Publications, London (2004)CrossRef
99.
go back to reference Fielding, J., Gilbert, N.: Understanding Social Statistics. SAGE Publications, London (2000) Fielding, J., Gilbert, N.: Understanding Social Statistics. SAGE Publications, London (2000)
100.
go back to reference Lantz, B.: Machine Learning with R, 2nd edn. Packt Publishing, Birmingham (2015) Lantz, B.: Machine Learning with R, 2nd edn. Packt Publishing, Birmingham (2015)
101.
go back to reference Johnson, R., Wichern, D.: Applied Multivariate Statistical Analysis. Sixth Edition. Pearson, Harlow (2014) Johnson, R., Wichern, D.: Applied Multivariate Statistical Analysis. Sixth Edition. Pearson, Harlow (2014)
102.
go back to reference Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Elsevier, Amsterdam (2011) Witten, I.H., Frank, E., Hall, M.A.: Data Mining: Practical Machine Learning Tools and Techniques, 3rd edn. Elsevier, Amsterdam (2011)
103.
go back to reference Kimball, R., Ross, M.: The Datawarehouse Toolkit. The Complete Guide to Dimensional Modeling. Second Edition. Wiley, New York (2002) Kimball, R., Ross, M.: The Datawarehouse Toolkit. The Complete Guide to Dimensional Modeling. Second Edition. Wiley, New York (2002)
104.
go back to reference Inmon, W.H.: Building the Data Warehouse, 3rd edn. Wiley, New York (2002) Inmon, W.H.: Building the Data Warehouse, 3rd edn. Wiley, New York (2002)
105.
go back to reference Everitt, B.S., Skrondal, A.: The Cambridge Dictionary of Statistics, 4th edn. Cambridge University Press, Cambridge (2010)MATHCrossRef Everitt, B.S., Skrondal, A.: The Cambridge Dictionary of Statistics, 4th edn. Cambridge University Press, Cambridge (2010)MATHCrossRef
106.
go back to reference Sullivan, R.: Introduction to Data Mining for the Life Sciences. Springer, New York (2012)CrossRef Sullivan, R.: Introduction to Data Mining for the Life Sciences. Springer, New York (2012)CrossRef
107.
go back to reference Law, K.S., Wong, C., Mobley, W.H.: Toward a taxonomy of multidimensional constructs. Acad. Manag. Rev. 23(4), 741–755 (1998)CrossRef Law, K.S., Wong, C., Mobley, W.H.: Toward a taxonomy of multidimensional constructs. Acad. Manag. Rev. 23(4), 741–755 (1998)CrossRef
108.
go back to reference Polites, G.L., Roberts, N., Thatcher, J.: Conceptualizing models using multidimensional constructs: a review and guidelines for their use. Eur. J. Inf. Syst. 21(1), 22–48 (2012)CrossRef Polites, G.L., Roberts, N., Thatcher, J.: Conceptualizing models using multidimensional constructs: a review and guidelines for their use. Eur. J. Inf. Syst. 21(1), 22–48 (2012)CrossRef
109.
go back to reference Maaten, L.J.P. van der, Postma, E.O., Herik, H.J. van der.: Dimensionality reduction: a comparative review. In: Technical Report, TiCC TR 2009–005, Tilburg University (2009) Maaten, L.J.P. van der, Postma, E.O., Herik, H.J. van der.: Dimensionality reduction: a comparative review. In: Technical Report, TiCC TR 2009–005, Tilburg University (2009)
110.
go back to reference Feelders, A.: Data mining in economic science. In: Meij, J. (ed.), Dealing with the Data Flood: Mining Data, Text and Multimedia. STT65. Study Centre for Technology Trends, The Hague (2002) Feelders, A.: Data mining in economic science. In: Meij, J. (ed.), Dealing with the Data Flood: Mining Data, Text and Multimedia. STT65. Study Centre for Technology Trends, The Hague (2002)
111.
go back to reference Wooldridge, J.M.: Introductory Econometrics: A Modern Approach. Fifth Edition. Cengage Learning (2012) Wooldridge, J.M.: Introductory Econometrics: A Modern Approach. Fifth Edition. Cengage Learning (2012)
112.
go back to reference Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks. A survey. WIREs Computational Statistics 7(3), 223–247 (2015)MathSciNetCrossRef Ranshous, S., Shen, S., Koutra, D., Harenberg, S., Faloutsos, C., Samatova, N.F.: Anomaly detection in dynamic networks. A survey. WIREs Computational Statistics 7(3), 223–247 (2015)MathSciNetCrossRef
113.
go back to reference Jurdak, R., Wang, R., Obst, O., Valencia, P.: Wireless Sensor network anomalies. Diagnosis and detection strategies. In A. Tolk, & L. C. Jain (Eds.), Intelligence-Based Systems Engineering. Berlin: Springer, Springer Nature (2011) Jurdak, R., Wang, R., Obst, O., Valencia, P.: Wireless Sensor network anomalies. Diagnosis and detection strategies. In A. Tolk, & L. C. Jain (Eds.), Intelligence-Based Systems Engineering. Berlin: Springer, Springer Nature (2011)
114.
go back to reference Keogh, E., Lin, J., Lee, S., Van Herle, H.: Finding the most unusual time series subsequence: algorithms and applications. Knowl. Inf. Syst. 11(1), 1–27 (2006)CrossRef Keogh, E., Lin, J., Lee, S., Van Herle, H.: Finding the most unusual time series subsequence: algorithms and applications. Knowl. Inf. Syst. 11(1), 1–27 (2006)CrossRef
115.
go back to reference Brockwell, P.J., Davis, R.A.: Introduction to Time Series and Forecasting, 3rd edn. Springer, Switzerland (2016)MATHCrossRef Brockwell, P.J., Davis, R.A.: Introduction to Time Series and Forecasting, 3rd edn. Springer, Switzerland (2016)MATHCrossRef
116.
go back to reference Gupta, M., Gao, J., Aggarwal, C. C., Han, J.: outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng., 25(1) (2014) Gupta, M., Gao, J., Aggarwal, C. C., Han, J.: outlier detection for temporal data: a survey. IEEE Trans. Knowl. Data Eng., 25(1) (2014)
117.
go back to reference Gupta, M., Gao, J., Aggarwal, C. C., Han, J.: Outlier detection for temporal data: tutorial. In: SIAM International Conference on Data Mining (2013) Gupta, M., Gao, J., Aggarwal, C. C., Han, J.: Outlier detection for temporal data: tutorial. In: SIAM International Conference on Data Mining (2013)
118.
go back to reference Lee, J.G., Han, J., Li, X.: Trajectory outlier detection: a partition-and-detect framework. In: Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE), Cancun, Mexico (2008) Lee, J.G., Han, J., Li, X.: Trajectory outlier detection: a partition-and-detect framework. In: Proceedings of the 24th IEEE International Conference on Data Engineering (ICDE), Cancun, Mexico (2008)
119.
go back to reference Li, X., Han, J., Kim, S., Gonzales, H.: ROAM: Rule- and motif-based anomaly detection in massive moving object data sets. In: Proceedings of the 2007 SIAM International Conference on Data Mining (2007) Li, X., Han, J., Kim, S., Gonzales, H.: ROAM: Rule- and motif-based anomaly detection in massive moving object data sets. In: Proceedings of the 2007 SIAM International Conference on Data Mining (2007)
120.
go back to reference Agrawal, R., Psaila, G., Wimmers, E.L., Zaït, M.: querying shapes of histories. In: Proceedings of the 21st VLDB Conference, Zürich, Switzerland (1995) Agrawal, R., Psaila, G., Wimmers, E.L., Zaït, M.: querying shapes of histories. In: Proceedings of the 21st VLDB Conference, Zürich, Switzerland (1995)
121.
go back to reference Gajer, P., Schatz, M., Salzberg, S.L.: Automated correction of genome sequence errors. Nucleic Acids Res. 32(2), 562–569 (2004)CrossRef Gajer, P., Schatz, M., Salzberg, S.L.: Automated correction of genome sequence errors. Nucleic Acids Res. 32(2), 562–569 (2004)CrossRef
122.
go back to reference Rousseeuw, P.J., Raymaekers, J., Hubert, M.: A measure of directional outlyingness with applications to image data and video. J. Comput. Graph. Stat. 27(2), 345–359 (2018)MathSciNetCrossRef Rousseeuw, P.J., Raymaekers, J., Hubert, M.: A measure of directional outlyingness with applications to image data and video. J. Comput. Graph. Stat. 27(2), 345–359 (2018)MathSciNetCrossRef
123.
go back to reference Schedl, M., Gómez, E., Urbano, J.: Music Information Retrieval: Recent Developments and Applications. Found. Trends Inf. Retr. 8(2–3), 127–261 (2014)CrossRef Schedl, M., Gómez, E., Urbano, J.: Music Information Retrieval: Recent Developments and Applications. Found. Trends Inf. Retr. 8(2–3), 127–261 (2014)CrossRef
124.
go back to reference Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13(6), 377–387 (1970)MATHCrossRef Codd, E.F.: A relational model of data for large shared data banks. Commun. ACM 13(6), 377–387 (1970)MATHCrossRef
125.
go back to reference Date, C.J.: Database Design and Relational Theory. O’Reilly, Sebastopol (2012) Date, C.J.: Database Design and Relational Theory. O’Reilly, Sebastopol (2012)
126.
go back to reference Burrough, P.A., McDonnell, R.A.: Principles of Geographical Information Systems. Oxford University Press, Oxford (1998) Burrough, P.A., McDonnell, R.A.: Principles of Geographical Information Systems. Oxford University Press, Oxford (1998)
127.
go back to reference Galati, S.R.: Geographic Information Systems Demystified. Artech House, Boston (2006) Galati, S.R.: Geographic Information Systems Demystified. Artech House, Boston (2006)
128.
go back to reference By, R.A. de: Principles of Geographical Information Systems: An Introductory Textbook. ITC, Enschede (2001) By, R.A. de: Principles of Geographical Information Systems: An Introductory Textbook. ITC, Enschede (2001)
129.
go back to reference Daróczi, G.: Mastering Data Analysis with R. Packt Publishing, Birmingham (2015) Daróczi, G.: Mastering Data Analysis with R. Packt Publishing, Birmingham (2015)
130.
go back to reference Marradi, A.: Classification, typology, taxonomy. Qual. Quant. 24(2), 129–157 (1990)CrossRef Marradi, A.: Classification, typology, taxonomy. Qual. Quant. 24(2), 129–157 (1990)CrossRef
131.
go back to reference Schluter, C., Trede, M.: Identifying multiple outliers in heavy-tailed distributions with an application to market crashes. J. Empir. Financ. 15(4), 700–713 (2008)CrossRef Schluter, C., Trede, M.: Identifying multiple outliers in heavy-tailed distributions with an application to market crashes. J. Empir. Financ. 15(4), 700–713 (2008)CrossRef
132.
go back to reference Padmanabhan, K., Chen, Z., Lakshminarasimhan, S., Ramaswamy, S.S., Richardson, B.T.: Graph-based anomaly detection. In: Samatova et al. (Eds.), Practical Graph Mining with R. CRC Press, Boca Raton (2014) Padmanabhan, K., Chen, Z., Lakshminarasimhan, S., Ramaswamy, S.S., Richardson, B.T.: Graph-based anomaly detection. In: Samatova et al. (Eds.), Practical Graph Mining with R. CRC Press, Boca Raton (2014)
133.
go back to reference Aggarwal, C.C., Yu, P.S.: An effective and efficient algorithm for high-dimensional outlier detection. VLDB J. 14(2), 211–221 (2005)CrossRef Aggarwal, C.C., Yu, P.S.: An effective and efficient algorithm for high-dimensional outlier detection. VLDB J. 14(2), 211–221 (2005)CrossRef
134.
go back to reference Fawzy, A., Mokhtar, H.M.O., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inf. J. 14(2), 157–164 (2013) Fawzy, A., Mokhtar, H.M.O., Hegazy, O.: Outliers detection and classification in wireless sensor networks. Egypt. Inf. J. 14(2), 157–164 (2013)
135.
go back to reference Zhang, Y., Meratnia, N., Havinga, P.: Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials, 12(2) (2010) Zhang, Y., Meratnia, N., Havinga, P.: Outlier detection techniques for wireless sensor networks: a survey. IEEE Commun. Surv. Tutorials, 12(2) (2010)
136.
go back to reference Kotu, V., Deshpande, B.: Predictive Analytics and Data Mining: Concepts and Practice with RapidMiner. Elsevier, Amsterdam (2015) Kotu, V., Deshpande, B.: Predictive Analytics and Data Mining: Concepts and Practice with RapidMiner. Elsevier, Amsterdam (2015)
137.
go back to reference Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631–645 (2007)CrossRef Song, X., Wu, M., Jermaine, C., Ranka, S.: Conditional anomaly detection. IEEE Trans. Knowl. Data Eng. 19(5), 631–645 (2007)CrossRef
138.
go back to reference Chen, C., Liu, L.: Joint estimation of model parameters and outlier effects in time series. J. Am. Stat. Assoc. 88(421), 284–297 (1993)MATH Chen, C., Liu, L.: Joint estimation of model parameters and outlier effects in time series. J. Am. Stat. Assoc. 88(421), 284–297 (1993)MATH
140.
go back to reference Kaiser, R., Maravall, A.: Seasonal outliers in time series. Universidad Carlos III de Madrid, working paper number 99–49 (1999) Kaiser, R., Maravall, A.: Seasonal outliers in time series. Universidad Carlos III de Madrid, working paper number 99–49 (1999)
141.
go back to reference Fox, A.J.: Outliers in time series. J. R. Stat. Soc. Se. B Methodol. 34(3): 350–363 (1972) Fox, A.J.: Outliers in time series. J. R. Stat. Soc. Se. B Methodol. 34(3): 350–363 (1972)
142.
143.
144.
go back to reference James, G., Witten, D., Hastie, T., Tibshirani, R.: An introduction to statistical learning: with applications in R, 8th edn. Springer, New York (2017)MATH James, G., Witten, D., Hastie, T., Tibshirani, R.: An introduction to statistical learning: with applications in R, 8th edn. Springer, New York (2017)MATH
145.
go back to reference Fox, J., Weisberg, S.: An R Companion to Applied Regression, 3rd edn. Sage, Los Angeles (2019) Fox, J., Weisberg, S.: An R Companion to Applied Regression, 3rd edn. Sage, Los Angeles (2019)
146.
go back to reference Ge, Y., Xiong, H., Zhou, Z., Ozdemir, H., Yu, J., Lee, K.C.: TOP-EYE: top-k evolving trajectory outlier detection. In: Proceedings of the 19th ACM Conference on Information and Knowledge Management (CIKM 2010), pp. 1733–1736 (2010) Ge, Y., Xiong, H., Zhou, Z., Ozdemir, H., Yu, J., Lee, K.C.: TOP-EYE: top-k evolving trajectory outlier detection. In: Proceedings of the 19th ACM Conference on Information and Knowledge Management (CIKM 2010), pp. 1733–1736 (2010)
147.
go back to reference Chabiyyam, M., Reddy, R.D., Dogra, D.P., Bhaskar, H., Mihaylova, L.: Motion anomaly detection and trajectory analysis in visual surveillance. Multimedia Tools Appl. 77(13), 16223–16248 (2017)CrossRef Chabiyyam, M., Reddy, R.D., Dogra, D.P., Bhaskar, H., Mihaylova, L.: Motion anomaly detection and trajectory analysis in visual surveillance. Multimedia Tools Appl. 77(13), 16223–16248 (2017)CrossRef
148.
go back to reference Suthaharan, S., Alzahrani, M., Rajasegarar, S., Alzahrani, M., Leckie, C., Palaniswami, M.: Labelled data collection for anomaly detection in wireless sensor networks. In: Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Brisbane (2010) Suthaharan, S., Alzahrani, M., Rajasegarar, S., Alzahrani, M., Leckie, C., Palaniswami, M.: Labelled data collection for anomaly detection in wireless sensor networks. In: Proceedings of the 6th International Conference on Intelligent Sensors, Sensor Networks and Information Processing, Brisbane (2010)
149.
go back to reference Henderson, K. Eliassi-Rad, T., Faloutsos, C., Akoglu, L., Li, L., Maruhashi, K., Prakash, B.A., Tong, H.: Metric forensics: a multi-level approach for mining volatile graphs. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, United States (2010) Henderson, K. Eliassi-Rad, T., Faloutsos, C., Akoglu, L., Li, L., Maruhashi, K., Prakash, B.A., Tong, H.: Metric forensics: a multi-level approach for mining volatile graphs. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, United States (2010)
150.
go back to reference Vries, T. de, Chawla, S., Houle, M.E.: Finding local anomalies in very high dimensional space. In: Proceedings of the 2010 IEEE International Conference on Data Mining (2010) Vries, T. de, Chawla, S., Houle, M.E.: Finding local anomalies in very high dimensional space. In: Proceedings of the 2010 IEEE International Conference on Data Mining (2010)
151.
go back to reference Kathiresan, V., Vasanthi, N.A.: A survey on outlier detection techniques useful for financial card fraud detection. Int. J. Innov. Eng. Technol. 6(1), 226–235 (2015) Kathiresan, V., Vasanthi, N.A.: A survey on outlier detection techniques useful for financial card fraud detection. Int. J. Innov. Eng. Technol. 6(1), 226–235 (2015)
152.
go back to reference Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRef Xie, M., Han, S., Tian, B., Parvin, S.: Anomaly detection in wireless sensor networks: a survey. J. Netw. Comput. Appl. 34(4), 1302–1325 (2011)CrossRef
153.
go back to reference Leys, C., Ley, C., Klein, O., Bernard, P., Licata, L.: Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. J. Exp. Soc. Psychol. 49(4), 764–766 (2013)CrossRef Leys, C., Ley, C., Klein, O., Bernard, P., Licata, L.: Detecting outliers: do not use standard deviation around the mean, use absolute deviation around the median. J. Exp. Soc. Psychol. 49(4), 764–766 (2013)CrossRef
154.
go back to reference Small, M., Tse, C.K., Walker, D.M.: Super-spreaders and the Rate of Transmission of the SARS Virus. Physica D 215(2), 146–158 (2006)MathSciNetMATHCrossRef Small, M., Tse, C.K., Walker, D.M.: Super-spreaders and the Rate of Transmission of the SARS Virus. Physica D 215(2), 146–158 (2006)MathSciNetMATHCrossRef
155.
go back to reference Wong, G., Liu, W., Liu, Y., Zhou, B., Bi, Y., Gao, G.F.: MERS, SARS, and Ebola: the role of super-spreaders in infectious disease. Cell Host Microbe 18, 398–401 (2015)CrossRef Wong, G., Liu, W., Liu, Y., Zhou, B., Bi, Y., Gao, G.F.: MERS, SARS, and Ebola: the role of super-spreaders in infectious disease. Cell Host Microbe 18, 398–401 (2015)CrossRef
157.
go back to reference Liu, B.: Sentiment Analysis and Opinion Mining. Morgan & Claypool Publishers, Williston (2012)CrossRef Liu, B.: Sentiment Analysis and Opinion Mining. Morgan & Claypool Publishers, Williston (2012)CrossRef
158.
go back to reference Shyu, M, Chen, S., Sarinnapakorn, K., Chang, L.: A Novel anomaly detection scheme based on principal component classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, Melbourne, FL., USA, pp. 172–179 (2003) Shyu, M, Chen, S., Sarinnapakorn, K., Chang, L.: A Novel anomaly detection scheme based on principal component classifier. In: Proceedings of the IEEE Foundations and New Directions of Data Mining Workshop, Melbourne, FL., USA, pp. 172–179 (2003)
159.
go back to reference Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural networks. In: Proceedings of the International Conference on Data Warehousing and Knowledge Discovery (2002) Hawkins, S., He, H., Williams, G., Baxter, R.: Outlier detection using replicator neural networks. In: Proceedings of the International Conference on Data Warehousing and Knowledge Discovery (2002)
160.
go back to reference Valko, M., Kveton, B., Valizadegan, H., Cooper, G.F., Hauskrecht, M.: Conditional anomaly detection with soft harmonic functions. In: Proceedings of the 11th International Conference on Data Mining (ICDM), Vancouver, Canada (2011) Valko, M., Kveton, B., Valizadegan, H., Cooper, G.F., Hauskrecht, M.: Conditional anomaly detection with soft harmonic functions. In: Proceedings of the 11th International Conference on Data Mining (ICDM), Vancouver, Canada (2011)
161.
go back to reference Yang, Y., Webb, G.I., Wu, X.: Discretization Methods. In: Maimon, O., Rokach, L. (Eds.), Data Mining and Knowledge Discovery Handbook. Springer, New York (2005) Yang, Y., Webb, G.I., Wu, X.: Discretization Methods. In: Maimon, O., Rokach, L. (Eds.), Data Mining and Knowledge Discovery Handbook. Springer, New York (2005)
162.
go back to reference Müller, E., Assent, I., Iglesias, P., Mülle, Y., Böhm, K.: Outlier ranking via subspace analysis in multiple views of the data. In: Proceedings of the 12th IEEE International Conference on Data Mining (2012) Müller, E., Assent, I., Iglesias, P., Mülle, Y., Böhm, K.: Outlier ranking via subspace analysis in multiple views of the data. In: Proceedings of the 12th IEEE International Conference on Data Mining (2012)
163.
go back to reference Lazarevic, A., Kumar, V.: Feature bagging for outlier detection. In: Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, Chicago, USA (2005) Lazarevic, A., Kumar, V.: Feature bagging for outlier detection. In: Proceedings of the 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, Chicago, USA (2005)
164.
go back to reference Zhou, D., He, J., Candan, K.S., Davalcu, H.: MUVIR: Multi-view rare category detection. In: Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), Buenos Aires, Argentina (2015) Zhou, D., He, J., Candan, K.S., Davalcu, H.: MUVIR: Multi-view rare category detection. In: Proceedings of the 24th International Joint Conference on Artificial Intelligence (IJCAI), Buenos Aires, Argentina (2015)
165.
go back to reference Urdan, T.C.: Statistics in Plain English, 3rd edn. Routledge, New York (2010)MATH Urdan, T.C.: Statistics in Plain English, 3rd edn. Routledge, New York (2010)MATH
166.
go back to reference Onderwater, M.: Outlier preservation by dimensionality reduction techniques. Int. J. Data Anal. Techniq. Strateg. 7(3), 231–252 (2015)CrossRef Onderwater, M.: Outlier preservation by dimensionality reduction techniques. Int. J. Data Anal. Techniq. Strateg. 7(3), 231–252 (2015)CrossRef
167.
go back to reference Seo, S.: A review and comparison of methods for detecting outliers in univariate data sets. In: Master Thesis, University of Pittsburgh (2006) Seo, S.: A review and comparison of methods for detecting outliers in univariate data sets. In: Master Thesis, University of Pittsburgh (2006)
168.
go back to reference Embrechts, P., Resnick, S.I., Samorodnitsky, G.: Extreme value theory as a risk management tool. North Am. Actuarial J. 3(2), 30–41 (1999)MathSciNetMATHCrossRef Embrechts, P., Resnick, S.I., Samorodnitsky, G.: Extreme value theory as a risk management tool. North Am. Actuarial J. 3(2), 30–41 (1999)MathSciNetMATHCrossRef
169.
go back to reference Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., Han, J.: On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2010), Washington, USA (2010) Gao, J., Liang, F., Fan, W., Wang, C., Sun, Y., Han, J.: On community outliers and their efficient detection in information networks. In: Proceedings of the 16th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2010), Washington, USA (2010)
171.
go back to reference Neyman, J., Scott, E.L.: Outlier Proneness of Phenomena and of Related Distributions. In: Proceedings of the Symposium Optimizing Methods in Statistics, Ohio, USA, pp. 413-430 (1971) Neyman, J., Scott, E.L.: Outlier Proneness of Phenomena and of Related Distributions. In: Proceedings of the Symposium Optimizing Methods in Statistics, Ohio, USA, pp. 413-430 (1971)
172.
go back to reference Kennedy, D., Lakonishok, J., Shaw, W.H.: Accommodating outliers and nonlinearity in decision models. J. Acc. Audit. Financ. 7(2), 161–190 (1992) Kennedy, D., Lakonishok, J., Shaw, W.H.: Accommodating outliers and nonlinearity in decision models. J. Acc. Audit. Financ. 7(2), 161–190 (1992)
173.
go back to reference DeCarlo, L.T.: On the meaning and use of Kurtosis. Psychol. Methods 2(3), 292–307 (1997)CrossRef DeCarlo, L.T.: On the meaning and use of Kurtosis. Psychol. Methods 2(3), 292–307 (1997)CrossRef
174.
go back to reference Kennedy, J.: Probability and dynamics in the particle swarm. In: Proceedings of the IEEE Congress on Evolutionary Computation, Portland, USA (2004) Kennedy, J.: Probability and dynamics in the particle swarm. In: Proceedings of the IEEE Congress on Evolutionary Computation, Portland, USA (2004)
175.
go back to reference Katz, R.W., Brush, G.S., Parlange, M.B.: Statistics of extremes: modeling ecological disturbances. Ecology 86(5), 1124–1134 (2005)CrossRef Katz, R.W., Brush, G.S., Parlange, M.B.: Statistics of extremes: modeling ecological disturbances. Ecology 86(5), 1124–1134 (2005)CrossRef
176.
go back to reference Reiss, R., Thomas, M.: Statistical Analysis of Extreme Values: With Applications to Insurance, Finance, Hydrology and Other Fields. Third Edition. Birkhäuser, Basel (2007) Reiss, R., Thomas, M.: Statistical Analysis of Extreme Values: With Applications to Insurance, Finance, Hydrology and Other Fields. Third Edition. Birkhäuser, Basel (2007)
177.
go back to reference Fieller, N.R.J.: Some problems related to the rejection of outlying observations. PhD Thesis, The University of Hull (1976) Fieller, N.R.J.: Some problems related to the rejection of outlying observations. PhD Thesis, The University of Hull (1976)
178.
go back to reference Woolley, T.W.: An investigation of the effect of the swamping phenomenon on several block procedures for multiple outliers in univariate samples. Open J. Stat. 3(5), 299–304 (2013)CrossRef Woolley, T.W.: An investigation of the effect of the swamping phenomenon on several block procedures for multiple outliers in univariate samples. Open J. Stat. 3(5), 299–304 (2013)CrossRef
179.
go back to reference Ben-Gal I.: Outlier Detection. In: Maimon, O., Rokach, L. (Eds.), Data Mining and Knowledge Discovery Handbook. Kluwer Academic Publishers (2005) Ben-Gal I.: Outlier Detection. In: Maimon, O., Rokach, L. (Eds.), Data Mining and Knowledge Discovery Handbook. Kluwer Academic Publishers (2005)
180.
go back to reference Trittenbach, H., Böhm, K.: Dimension-based subspace search for outlier detection. Int. J. Data Sci. Anal. 7, 87–101 (2018)CrossRef Trittenbach, H., Böhm, K.: Dimension-based subspace search for outlier detection. Int. J. Data Sci. Anal. 7, 87–101 (2018)CrossRef
181.
go back to reference Das, K., Schneider, J.: Detecting anomalous records in categorical datasets. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, USA (2007) Das, K., Schneider, J.: Detecting anomalous records in categorical datasets. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Jose, USA (2007)
182.
go back to reference Keller, F., Muller, E., Bohm, K.: HiCS: High contrast subspaces for density-based outlier ranking. In: Proceedings of the 28th IEEE International Conference on Data Engineering (2012) Keller, F., Muller, E., Bohm, K.: HiCS: High contrast subspaces for density-based outlier ranking. In: Proceedings of the 28th IEEE International Conference on Data Engineering (2012)
183.
go back to reference Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng., 24(5) (2012) Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng., 24(5) (2012)
184.
go back to reference King, J., Fineman, J.T., Palermo, V., Singh, L.: Combining pure anomalies to describe unusual behavior in real world data sets. In: Presented at ODDx3, the ACM SIGKDD Workshop on Outlier Definition, Detection and Description, Sydney, Australia (2015) King, J., Fineman, J.T., Palermo, V., Singh, L.: Combining pure anomalies to describe unusual behavior in real world data sets. In: Presented at ODDx3, the ACM SIGKDD Workshop on Outlier Definition, Detection and Description, Sydney, Australia (2015)
185.
go back to reference Penny, K.I.: Appropriate critical values when testing for a single multivariate outlier by using the mahalanobis distance. J. Roy. Stat. Soc. 45(1), 73–81 (1996)MATH Penny, K.I.: Appropriate critical values when testing for a single multivariate outlier by using the mahalanobis distance. J. Roy. Stat. Soc. 45(1), 73–81 (1996)MATH
186.
go back to reference Steinbuss, G., Böhm, K.: Hiding outliers in high-dimensional data spaces. Int. J. Data Sci. Anal. 4(3), 173–189 (2017)CrossRef Steinbuss, G., Böhm, K.: Hiding outliers in high-dimensional data spaces. Int. J. Data Sci. Anal. 4(3), 173–189 (2017)CrossRef
187.
go back to reference Maronna, R., Martin, D., Yohai, V.: Robust Statistics: Theory and Methods. Wiley, Chichester (2006)MATHCrossRef Maronna, R., Martin, D., Yohai, V.: Robust Statistics: Theory and Methods. Wiley, Chichester (2006)MATHCrossRef
188.
go back to reference Huang, A., Lai, K., Li, Y., Wang, S.: Forecasting container throughput of qingdao port with a hybrid model. J. Syst. Sci. Complexity 28(1), 105–121 (2015)MATHCrossRef Huang, A., Lai, K., Li, Y., Wang, S.: Forecasting container throughput of qingdao port with a hybrid model. J. Syst. Sci. Complexity 28(1), 105–121 (2015)MATHCrossRef
189.
go back to reference Dunning, T., Friedman, E.: Practical Machine Learning: A New Look at Anomaly Detection. O’Reilly, Sebastopol (2014) Dunning, T., Friedman, E.: Practical Machine Learning: A New Look at Anomaly Detection. O’Reilly, Sebastopol (2014)
190.
go back to reference Gama, J., Medas, P., Castillo, G., Rodrigues, P.: Learning with drift detection. In: Proceedings of the 17th Brazilian Symposium on Artificial Intelligence (SBIA), Sao Luis, Brazil (2004) Gama, J., Medas, P., Castillo, G., Rodrigues, P.: Learning with drift detection. In: Proceedings of the 17th Brazilian Symposium on Artificial Intelligence (SBIA), Sao Luis, Brazil (2004)
191.
go back to reference Kirchgässner, G., Wolters, J.: Introduction to Modern Time Series Analysis. Springer, Berlin (2007)MATHCrossRef Kirchgässner, G., Wolters, J.: Introduction to Modern Time Series Analysis. Springer, Berlin (2007)MATHCrossRef
192.
go back to reference Chakrabarti, S., Sarawagi, S., Dom, B.: Mining surprising patterns using temporal description length. In: VLDB-98, Proceedings of the 24th International Conference on Very Large Data Bases, New York (1998) Chakrabarti, S., Sarawagi, S., Dom, B.: Mining surprising patterns using temporal description length. In: VLDB-98, Proceedings of the 24th International Conference on Very Large Data Bases, New York (1998)
193.
194.
go back to reference Radke, R.J., Andra, S., Al-Kofahi, O., Roysam, B.: Image change detection algorithms: a systematic survey. IEEE Trans. Image Process. 14(3), 294–307 (2005)MathSciNetCrossRef Radke, R.J., Andra, S., Al-Kofahi, O., Roysam, B.: Image change detection algorithms: a systematic survey. IEEE Trans. Image Process. 14(3), 294–307 (2005)MathSciNetCrossRef
195.
go back to reference Pang, G., Cao, L., Chin, L.: Outlier detection in complex categorical data by modelling the feature value couplings. In: Proceedings of the 25th International Joint Conference on Artificial Intelligence (2016) Pang, G., Cao, L., Chin, L.: Outlier detection in complex categorical data by modelling the feature value couplings. In: Proceedings of the 25th International Joint Conference on Artificial Intelligence (2016)
196.
go back to reference Weiss, G.M.: Mining with rarity: a unifying framework. ACM SIGKDD Exploration Newsletter 6(1), 7–19 (2004)CrossRef Weiss, G.M.: Mining with rarity: a unifying framework. ACM SIGKDD Exploration Newsletter 6(1), 7–19 (2004)CrossRef
197.
go back to reference Dash, M., Lie, N.: Outlier detection in transactional data. Intell. Data Anal. 14(3), 283–298 (2010)CrossRef Dash, M., Lie, N.: Outlier detection in transactional data. Intell. Data Anal. 14(3), 283–298 (2010)CrossRef
198.
go back to reference Hansen, L.K., Sigurdsson, S., Kolenda, T., Nielsen, F.A, Kjems, U., Larsen, J.: Modeling text with generalizable gaussian mixtures. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Istanbul, Turkey (2000) Hansen, L.K., Sigurdsson, S., Kolenda, T., Nielsen, F.A, Kjems, U., Larsen, J.: Modeling text with generalizable gaussian mixtures. In: Proceedings of the IEEE International Conference on Acoustics, Speech, and Signal Processing, Istanbul, Turkey (2000)
199.
go back to reference Guthrie, D., Guthrie, L., Allison, B., Wilks, Y.: Unsupervised anomaly detection. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI’07), Hyderabad, India (2007) Guthrie, D., Guthrie, L., Allison, B., Wilks, Y.: Unsupervised anomaly detection. In: Proceedings of the 20th International Joint Conference on Artificial Intelligence (IJCAI’07), Hyderabad, India (2007)
200.
go back to reference Oberreuter, G., Velásquez, J.D.: Text mining applied to plagiarism detection: the use of words for detecting deviations in the writing style. Expert Syst. Appl. 40(9), 3756–3763 (2013)CrossRef Oberreuter, G., Velásquez, J.D.: Text mining applied to plagiarism detection: the use of words for detecting deviations in the writing style. Expert Syst. Appl. 40(9), 3756–3763 (2013)CrossRef
201.
go back to reference Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inform. Sci. Technol. 57(3), 378–393 (2006)CrossRef Zheng, R., Li, J., Chen, H., Huang, Z.: A framework for authorship identification of online messages: writing-style features and classification techniques. J. Am. Soc. Inform. Sci. Technol. 57(3), 378–393 (2006)CrossRef
202.
go back to reference Chouchane, A., Bouguessa, M.: Identifying anomalous nodes in multidimensional networks. In: Proceedings of the 4th IEEE International Conference on Data Science and Advanced Analytics (DSAA), Tokyo, Japan (2017) Chouchane, A., Bouguessa, M.: Identifying anomalous nodes in multidimensional networks. In: Proceedings of the 4th IEEE International Conference on Data Science and Advanced Analytics (DSAA), Tokyo, Japan (2017)
203.
go back to reference Venkataraman, S., Song, D.X., Gibbons, P.B., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: Proceedings of Network and Distributed System Security Symposium (NDSS’05), p. 149–166 (2005) Venkataraman, S., Song, D.X., Gibbons, P.B., Blum, A.: New streaming algorithms for fast detection of superspreaders. In: Proceedings of Network and Distributed System Security Symposium (NDSS’05), p. 149–166 (2005)
204.
go back to reference Eberle, W., Holder, L.: Discovering structural anomalies in graph-based data. In: Proceedings of the 7th IEEE International Conference on Data Mining (2007) Eberle, W., Holder, L.: Discovering structural anomalies in graph-based data. In: Proceedings of the 7th IEEE International Conference on Data Mining (2007)
205.
go back to reference Akoglu, L., McGlohon, M., Faloutsos, C.: Anomaly detection in large graphs. In: Technical Report, CMU-CS-09–173, Carnegie Mellon University (2009) Akoglu, L., McGlohon, M., Faloutsos, C.: Anomaly detection in large graphs. In: Technical Report, CMU-CS-09–173, Carnegie Mellon University (2009)
206.
go back to reference Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: Proceedings of the Fifth IEEE International Conference on Data Mining (2005) Sun, J., Qu, H., Chakrabarti, D., Faloutsos, C.: Neighborhood formation and anomaly detection in bipartite graphs. In: Proceedings of the Fifth IEEE International Conference on Data Mining (2005)
207.
go back to reference Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., Crovella, M.: Intrusion as (anti)social communication: characterization and detection.In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China (2012) Ding, Q., Katenka, N., Barford, P., Kolaczyk, E., Crovella, M.: Intrusion as (anti)social communication: characterization and detection.In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China (2012)
208.
go back to reference Barata, A.P., Bruin, G.J. de, Takes, F., Herik, J. van den, Veenman, C.: Finding anomalies in waste transportation data with supervised category models. In: Proceedings of the Proceedings of the 30th Benelux Conference on Artificial Intelligence (BNAIC), Den Bosch, the Netherlands (2018) Barata, A.P., Bruin, G.J. de, Takes, F., Herik, J. van den, Veenman, C.: Finding anomalies in waste transportation data with supervised category models. In: Proceedings of the Proceedings of the 30th Benelux Conference on Artificial Intelligence (BNAIC), Den Bosch, the Netherlands (2018)
209.
go back to reference Ma, E.Y.T., Ratnasingham, S., Kremer, S.C.: Machine learned replacement of N-labels for basecalled sequences in DNA barcoding. IEEE/ACM Trans. Comput. Biol. Bioinf. 15(1), 191–204 (2018)CrossRef Ma, E.Y.T., Ratnasingham, S., Kremer, S.C.: Machine learned replacement of N-labels for basecalled sequences in DNA barcoding. IEEE/ACM Trans. Comput. Biol. Bioinf. 15(1), 191–204 (2018)CrossRef
210.
go back to reference Sun, J., Xie, Y., Zhang, H., Faloutsos, C.: Less is More: Compact matrix decomposition for large sparse graphs. In: Proceedings of the 7th SIAM International Conference on Data Mining (SDM), Minneapolis, USA (2007) Sun, J., Xie, Y., Zhang, H., Faloutsos, C.: Less is More: Compact matrix decomposition for large sparse graphs. In: Proceedings of the 7th SIAM International Conference on Data Mining (SDM), Minneapolis, USA (2007)
211.
go back to reference Shekhar, S., Lu, C., Zhang, P.: Detecting graph-based spatial outliers: algorithms and applications (a summary of results). In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, USA (2001) Shekhar, S., Lu, C., Zhang, P.: Detecting graph-based spatial outliers: algorithms and applications (a summary of results). In: Proceedings of the Seventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, San Francisco, USA (2001)
212.
go back to reference Graur, D., Li, W.: Fundamentals of Molecular Evolution. Second Edition. Sinaur Associates, Sunderland (2000) Graur, D., Li, W.: Fundamentals of Molecular Evolution. Second Edition. Sinaur Associates, Sunderland (2000)
213.
go back to reference Jones, N.C., Pevzner, P.A.: An Introduction to Bioinformatics Algorithms. The MIT Press, Cambridge (2004) Jones, N.C., Pevzner, P.A.: An Introduction to Bioinformatics Algorithms. The MIT Press, Cambridge (2004)
214.
go back to reference Lesk, A.M.: Introduction to Bioinformatics. Oxford University Press, Oxford (2002)MATH Lesk, A.M.: Introduction to Bioinformatics. Oxford University Press, Oxford (2002)MATH
215.
go back to reference Spears, T., DeBry, R.W., Abele, L.G., Chodyla, K.: Peracarid monophyly and interordinal phylogeny inferred from nuclear small-subunit ribosomal DNA sequences (Crustacea: Malacostraca: Peracarida). Proc. Biol. Soc. Wash. 118(1), 117–157 (2005)CrossRef Spears, T., DeBry, R.W., Abele, L.G., Chodyla, K.: Peracarid monophyly and interordinal phylogeny inferred from nuclear small-subunit ribosomal DNA sequences (Crustacea: Malacostraca: Peracarida). Proc. Biol. Soc. Wash. 118(1), 117–157 (2005)CrossRef
216.
go back to reference Jenner, R.A., Dhubhghaill, C.N., Ferla, M.P., Wills, M.A.: Eumalacostracan phylogeny and total evidence: limitations of the usual suspects. BMC Evolution. Biol., 9(21) (2009) Jenner, R.A., Dhubhghaill, C.N., Ferla, M.P., Wills, M.A.: Eumalacostracan phylogeny and total evidence: limitations of the usual suspects. BMC Evolution. Biol., 9(21) (2009)
217.
go back to reference Giribet, G., Distel, D.L., Polz, M., Sterrer, W., Wheeler, W.C.: Triploblastic relationships with emphasis on the acoelomates and the position of gnathostomulida, cycliophora, plathelminthes, and chaetognatha: a combined approach of 18S rDNA sequences and morphology. Syst. Biol. 49(3), 539–562 (2000)CrossRef Giribet, G., Distel, D.L., Polz, M., Sterrer, W., Wheeler, W.C.: Triploblastic relationships with emphasis on the acoelomates and the position of gnathostomulida, cycliophora, plathelminthes, and chaetognatha: a combined approach of 18S rDNA sequences and morphology. Syst. Biol. 49(3), 539–562 (2000)CrossRef
218.
go back to reference Struck, T.H.: TreSpEx—detection of misleading signal in phylogenetic reconstructions based on tree information. Evol. Bioinforma. 10, 51–67 (2014)CrossRef Struck, T.H.: TreSpEx—detection of misleading signal in phylogenetic reconstructions based on tree information. Evol. Bioinforma. 10, 51–67 (2014)CrossRef
219.
go back to reference Petitjean, C., Makarova, K.S., Wolf, Y.I., Koonin, E.V.: Extreme deviations from expected evolutionary rates in archaeal protein families. Genome Biol. Evol. 9(10), 2791–2811 (2017)CrossRef Petitjean, C., Makarova, K.S., Wolf, Y.I., Koonin, E.V.: Extreme deviations from expected evolutionary rates in archaeal protein families. Genome Biol. Evol. 9(10), 2791–2811 (2017)CrossRef
220.
go back to reference Pincombe, B.: Anomaly detection in time series of graphs using ARMA processes. ASOR Bull 24(4), 2–10 (2005) Pincombe, B.: Anomaly detection in time series of graphs using ARMA processes. ASOR Bull 24(4), 2–10 (2005)
221.
go back to reference Gupta, M., Gao, J., Sun, Y., Han, J.: Integrating community matching and outlier detection for mining evolutionary community outliers. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China (2012) Gupta, M., Gao, J., Sun, Y., Han, J.: Integrating community matching and outlier detection for mining evolutionary community outliers. In: Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Beijing, China (2012)
222.
go back to reference Lu, C, Chen, D., Kou, Y.: Detecting spatial outliers with multiple attributes. In: Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, Sacramento, USA (2003) Lu, C, Chen, D., Kou, Y.: Detecting spatial outliers with multiple attributes. In: Proceedings of the 15th IEEE International Conference on Tools with Artificial Intelligence, Sacramento, USA (2003)
223.
go back to reference Chawla, S., Sun, P.: SLOM: a new measure for local spatial outliers. Knowl. Inf. Syst. 9(4), 412–429 (2006)CrossRef Chawla, S., Sun, P.: SLOM: a new measure for local spatial outliers. Knowl. Inf. Syst. 9(4), 412–429 (2006)CrossRef
224.
go back to reference Izakian, H., Pedrycz, W.: Anomaly detection and characterization in spatial time series data: a cluster-centric approach. IEEE Trans. Fuzzy Syst. 22(6), 1612–1624 (2013)CrossRef Izakian, H., Pedrycz, W.: Anomaly detection and characterization in spatial time series data: a cluster-centric approach. IEEE Trans. Fuzzy Syst. 22(6), 1612–1624 (2013)CrossRef
225.
go back to reference Das, M., Parthasarathy, S.: Anomaly detection and spatio-temporal analysis of global climate system. In: Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data (SensorKDD'09), Paris, France (2009) Das, M., Parthasarathy, S.: Anomaly detection and spatio-temporal analysis of global climate system. In: Proceedings of the Third International Workshop on Knowledge Discovery from Sensor Data (SensorKDD'09), Paris, France (2009)
226.
go back to reference Kiranyaz, S., Ince, T., Gabbouj, M.: Real-time patient-specific ECG classification by 1-D convolutional neural networks. IEEE Trans. Biomed. Eng. 63(3), 664–675 (2015)CrossRef Kiranyaz, S., Ince, T., Gabbouj, M.: Real-time patient-specific ECG classification by 1-D convolutional neural networks. IEEE Trans. Biomed. Eng. 63(3), 664–675 (2015)CrossRef
227.
go back to reference Allan, J., Papka, R., Lavrenko, V.: On-line new event detection and tracking. In: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (1998) Allan, J., Papka, R., Lavrenko, V.: On-line new event detection and tracking. In: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (1998)
228.
go back to reference Wang, X., Zhai, C., Hu, X., Sproat, R.: Mining correlated bursty topic patterns from coordinated text streams. In: Proceedings of the 13th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2007), San Jose, USA (2007) Wang, X., Zhai, C., Hu, X., Sproat, R.: Mining correlated bursty topic patterns from coordinated text streams. In: Proceedings of the 13th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD 2007), San Jose, USA (2007)
229.
go back to reference Bello, J.P., Daudet, L., Abdallah, S., Duxbury, C., Davies, M., Sandler, M.B.: A tutorial on onset detection in music signals. IEEE Trans. Speech Audio Process. 13(5), 1035–1047 (2005)CrossRef Bello, J.P., Daudet, L., Abdallah, S., Duxbury, C., Davies, M., Sandler, M.B.: A tutorial on onset detection in music signals. IEEE Trans. Speech Audio Process. 13(5), 1035–1047 (2005)CrossRef
231.
go back to reference Batalha, N.M., Rowe, J.F., Bryson, S.T. et al.: Planetary CANDIDATES OBserved by Kepler III: analysis of the first 16 months of data. Astrophys. J. Suppl. Ser., 204(2) (2013) Batalha, N.M., Rowe, J.F., Bryson, S.T. et al.: Planetary CANDIDATES OBserved by Kepler III: analysis of the first 16 months of data. Astrophys. J. Suppl. Ser., 204(2) (2013)
232.
go back to reference Cleveland, R.B., Cleveland, W.S., McRae, J.E., Terpenning, I.: STL: a seasonal-trend decomposition procedure based on loess (with discussion). J. Off. Stat. 6(1), 3–73 (1990) Cleveland, R.B., Cleveland, W.S., McRae, J.E., Terpenning, I.: STL: a seasonal-trend decomposition procedure based on loess (with discussion). J. Off. Stat. 6(1), 3–73 (1990)
233.
go back to reference Hyndman, R.J., Wang, E., Laptev, N.: Large-scale unusual time series detection. In: Proceedings of the IEEE International Conference on Data Mining. Atlantic City, USA, 14–17 (2015) Hyndman, R.J., Wang, E., Laptev, N.: Large-scale unusual time series detection. In: Proceedings of the IEEE International Conference on Data Mining. Atlantic City, USA, 14–17 (2015)
234.
go back to reference Gama, J., Žliobaite, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv., 46(4) (2014) Gama, J., Žliobaite, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv., 46(4) (2014)
235.
go back to reference Roshtkhari, M.J., Levine, M.D.: Online dominant and anomalous behavior detection in videos. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2013) Roshtkhari, M.J., Levine, M.D.: Online dominant and anomalous behavior detection in videos. In IEEE Conference on Computer Vision and Pattern Recognition, CVPR (2013)
236.
go back to reference Cooper, J., Cooper, G.: Subliminal motivation: a story revisited. J. Appl. Soc. Psychol. 32(11), 2213–2227 (2002)CrossRef Cooper, J., Cooper, G.: Subliminal motivation: a story revisited. J. Appl. Soc. Psychol. 32(11), 2213–2227 (2002)CrossRef
237.
go back to reference Kratz, L., Nishino, K.: Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, USA (2009) Kratz, L., Nishino, K.: Anomaly detection in extremely crowded scenes using spatio-temporal motion pattern models. In: Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition, Miami, USA (2009)
238.
go back to reference Wang, S., Manning, C.D.: Baselines and bigrams: simple, good sentiment and topic classification. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Jeju, Korea (2012) Wang, S., Manning, C.D.: Baselines and bigrams: simple, good sentiment and topic classification. In: Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics, Jeju, Korea (2012)
239.
go back to reference Ross, D., Jr., Rasche, R.H.: EYEBALL: a computer program for description of style. Comput. Humanit. 6(4), 213–221 (1972)CrossRef Ross, D., Jr., Rasche, R.H.: EYEBALL: a computer program for description of style. Comput. Humanit. 6(4), 213–221 (1972)CrossRef
240.
go back to reference Riahi, F., Schulte, O.: Propositionalization for unsupervised outlier detection in multi-relational data. In: Proceedings of the 29th International Florida Artificial Intelligence Research Society Conference (2016) Riahi, F., Schulte, O.: Propositionalization for unsupervised outlier detection in multi-relational data. In: Proceedings of the 29th International Florida Artificial Intelligence Research Society Conference (2016)
241.
go back to reference Feldman, J.: What’s wrong with my data? In: Purba, S. (ed.) High-Performance Web Databases: Design, Development, and Deployment. Auerbach, Boca Raton (2001) Feldman, J.: What’s wrong with my data? In: Purba, S. (ed.) High-Performance Web Databases: Design, Development, and Deployment. Auerbach, Boca Raton (2001)
242.
go back to reference Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)CrossRef Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6, 151–180 (1998)CrossRef
243.
go back to reference Murphy, D.J.: The future of oil palm as a major global crop: opportunities and challenges. J. Oil Palm Res. 26(1), 1–24 (2014) Murphy, D.J.: The future of oil palm as a major global crop: opportunities and challenges. J. Oil Palm Res. 26(1), 1–24 (2014)
244.
go back to reference Pilastre, B., Boussouf, L., D’Escrivan, S., Tourneret, J.: Anomaly detection in mixed telemetry data using a sparse representation and dictionary learning. Signal Process., 168 (2020) Pilastre, B., Boussouf, L., D’Escrivan, S., Tourneret, J.: Anomaly detection in mixed telemetry data using a sparse representation and dictionary learning. Signal Process., 168 (2020)
245.
go back to reference Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1–2), 1–135 (2008)CrossRef Pang, B., Lee, L.: Opinion mining and sentiment analysis. Found. Trends Inf. Retr. 2(1–2), 1–135 (2008)CrossRef
246.
go back to reference Mukherjee, S.: F# for Machine Learning Essentials. Packt Publishing, Birmingham (2016) Mukherjee, S.: F# for Machine Learning Essentials. Packt Publishing, Birmingham (2016)
247.
go back to reference Venturini, A.: Time Series outlier detection: a new non-parametric methodology (Washer). Statistica (Bologna) 71(3), 329–344 (2011)MATH Venturini, A.: Time Series outlier detection: a new non-parametric methodology (Washer). Statistica (Bologna) 71(3), 329–344 (2011)MATH
248.
go back to reference Panteli, M., Benetos, E., Dixon, S.: A computational study on outliers in world music. PLoS ONE, 12(12) (2017) Panteli, M., Benetos, E., Dixon, S.: A computational study on outliers in world music. PLoS ONE, 12(12) (2017)
249.
go back to reference Boyajian, T.S., LaCourse, D.M., Rappaport, S.A., Fabrycky, D. et al.: Planet Hunters X. KIC 8462852—Where’s the Flux? Monthly notices of the royal astronomical society, 457(4): 3988–4004 (2016) Boyajian, T.S., LaCourse, D.M., Rappaport, S.A., Fabrycky, D. et al.: Planet Hunters X. KIC 8462852—Where’s the Flux? Monthly notices of the royal astronomical society, 457(4): 3988–4004 (2016)
251.
go back to reference Wright, J.T., Cartier, K.M.S., Zhao, M., Jontof-Hutter, D., Ford, E.B.: The G search for extraterrestrial civilizations with large energy supplies. IV. The Signatures and Information Content of Transiting Megastructures. Astrophys. J., 816(1) (2016) Wright, J.T., Cartier, K.M.S., Zhao, M., Jontof-Hutter, D., Ford, E.B.: The G search for extraterrestrial civilizations with large energy supplies. IV. The Signatures and Information Content of Transiting Megastructures. Astrophys. J., 816(1) (2016)
252.
go back to reference Thompson, M.A., Scicluna, P., Kemper, F., Geach, J.E. et al.: Constraints on the Circumstellar Dust Around KIC 8462852. Monthly Notices R. Astron. Soc., 458(1): L39-L43 (2016) Thompson, M.A., Scicluna, P., Kemper, F., Geach, J.E. et al.: Constraints on the Circumstellar Dust Around KIC 8462852. Monthly Notices R. Astron. Soc., 458(1): L39-L43 (2016)
253.
go back to reference Wang, X., Smith, K., Hyndman, R.: Characteristic-based clustering for time series data. Data Min. Knowl. Disc. 13, 335–364 (2006)MathSciNetCrossRef Wang, X., Smith, K., Hyndman, R.: Characteristic-based clustering for time series data. Data Min. Knowl. Disc. 13, 335–364 (2006)MathSciNetCrossRef
254.
go back to reference Pallotta, G., Jousselme, A.: Data-driven detection and context-based classification of maritime anomalies. In: Proceedings of the 18th International Conference on Information Fusion, Washington DC, USA (2015) Pallotta, G., Jousselme, A.: Data-driven detection and context-based classification of maritime anomalies. In: Proceedings of the 18th International Conference on Information Fusion, Washington DC, USA (2015)
256.
go back to reference Grassly, N.C., Harvey, P.H., Holmes, E.C.: Population dynamics of HIV-1 inferred from gene sequences. Genetics 151(2), 427–438 (1999) Grassly, N.C., Harvey, P.H., Holmes, E.C.: Population dynamics of HIV-1 inferred from gene sequences. Genetics 151(2), 427–438 (1999)
257.
go back to reference Felsenstein, J.: Cases in which parsimony or compatibility methods will be positively misleading. Syst. Biol. 27(4), 401–410 (1978)CrossRef Felsenstein, J.: Cases in which parsimony or compatibility methods will be positively misleading. Syst. Biol. 27(4), 401–410 (1978)CrossRef
258.
go back to reference Driver, F., Milner, R.J., Trueman, J.W.H.: A taxonomic revision of metarhizium based on a phylogenetic analysis of rDNA sequence data. Mycol. Res. 104(2), 134–150 (2000)CrossRef Driver, F., Milner, R.J., Trueman, J.W.H.: A taxonomic revision of metarhizium based on a phylogenetic analysis of rDNA sequence data. Mycol. Res. 104(2), 134–150 (2000)CrossRef
259.
go back to reference Shoubridge, P., Kraetzl, M., Wallis, W., Bunke, H.: Detection of abnormal change in a time series of graphs. J. Interconn. Netw. 3(1–2), 85–101 (2002)CrossRef Shoubridge, P., Kraetzl, M., Wallis, W., Bunke, H.: Detection of abnormal change in a time series of graphs. J. Interconn. Netw. 3(1–2), 85–101 (2002)CrossRef
260.
go back to reference Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, USA (2004) Idé, T., Kashima, H.: Eigenspace-based anomaly detection in computer systems. In: Proceedings of the 10th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Seattle, USA (2004)
261.
go back to reference Araujo, M., Papadimitriou, S., Günnemann, S., Faloutsos, C., Basu, P., Swami, A., Papalexakis, E.E., Koutra, D.: Com2: Fast automatic discovery of temporal (‘comet’) communities. In: Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Tainan, Taiwan (2014) Araujo, M., Papadimitriou, S., Günnemann, S., Faloutsos, C., Basu, P., Swami, A., Papalexakis, E.E., Koutra, D.: Com2: Fast automatic discovery of temporal (‘comet’) communities. In: Proceedings of the 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD), Tainan, Taiwan (2014)
262.
go back to reference Gupta, M., Aggarwal, C.C., Han, J., Sun, Y.: Evolutionary clustering and analysis of bibliographic networks. In: Proceedings of the IEEE International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan (2011) Gupta, M., Aggarwal, C.C., Han, J., Sun, Y.: Evolutionary clustering and analysis of bibliographic networks. In: Proceedings of the IEEE International Conference on Advances in Social Networks Analysis and Mining, Kaohsiung, Taiwan (2011)
263.
go back to reference Li, Z., Xiong, H., Liu, Y., Zhou, A.: Detecting blackhole and volcano patterns in directed networks. In: Proceedings of the IEEE International Conference on Data Mining, Sydney, Australia (2010) Li, Z., Xiong, H., Liu, Y., Zhou, A.: Detecting blackhole and volcano patterns in directed networks. In: Proceedings of the IEEE International Conference on Data Mining, Sydney, Australia (2010)
265.
go back to reference Iphar, C., Napoli, A., Ray, C., Alincourt, E., Brosset, D.: Risk analysis of falsified automatic identification system for the improvement of maritime traffic safety. In: Proceedings of ESREL 2016, Glasgow, United Kingdom, pp. 606–613 (2016) Iphar, C., Napoli, A., Ray, C., Alincourt, E., Brosset, D.: Risk analysis of falsified automatic identification system for the improvement of maritime traffic safety. In: Proceedings of ESREL 2016, Glasgow, United Kingdom, pp. 606–613 (2016)
266.
go back to reference Singal, V.: Beyond the Random Walk: A Guide to Stock Market Anomalies and Low-Risk Investing. Oxford University Press, Oxford (2003) Singal, V.: Beyond the Random Walk: A Guide to Stock Market Anomalies and Low-Risk Investing. Oxford University Press, Oxford (2003)
267.
go back to reference Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the SIGCOMM’05 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, Philadelphia, USA, pp. 217–228 (2005) Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the SIGCOMM’05 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications, Philadelphia, USA, pp. 217–228 (2005)
268.
go back to reference Grandgirard, D., Zielinski, R.: Land parcel identification system (LPIS) anomalies’ sampling and spatial pattern. In: JRC Scientific and Technical Reports. European Commission, Luxembourg (2008) Grandgirard, D., Zielinski, R.: Land parcel identification system (LPIS) anomalies’ sampling and spatial pattern. In: JRC Scientific and Technical Reports. European Commission, Luxembourg (2008)
269.
go back to reference Aydillo, D.F.: Trust-ware: A methodology to analyze, design, and secure trust and reputation systems. In: Doctoral Thesis, University of Madrid (2015) Aydillo, D.F.: Trust-ware: A methodology to analyze, design, and secure trust and reputation systems. In: Doctoral Thesis, University of Madrid (2015)
270.
go back to reference Guernaoui, S., Ramaoui, K., Rahola, N., Barnabe, C., Sereno, D., Boumezzough, A.: Malformations of the Genitalia in Male Phlebotomus Papatasi (Scopoli) (Diptera: Psychodidae). J. Vector Ecol. 35(1), 13–19 (2010)CrossRef Guernaoui, S., Ramaoui, K., Rahola, N., Barnabe, C., Sereno, D., Boumezzough, A.: Malformations of the Genitalia in Male Phlebotomus Papatasi (Scopoli) (Diptera: Psychodidae). J. Vector Ecol. 35(1), 13–19 (2010)CrossRef
271.
go back to reference Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)CrossRef Karlof, C., Wagner, D.: Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Netw. 1(2–3), 293–315 (2003)CrossRef
272.
go back to reference Pelleg, D., Moore, A.: Active learning for anomaly and rare-category detection. In: Proceeding of NIPS’04, the 17th International Conference on Neural Information Processing Systems, pp. 1073–1080 (2004) Pelleg, D., Moore, A.: Active learning for anomaly and rare-category detection. In: Proceeding of NIPS’04, the 17th International Conference on Neural Information Processing Systems, pp. 1073–1080 (2004)
273.
go back to reference Kumpulainen, P., Hätönen, K.: Local anomaly detection for network system log monitoring. In: Proceedings of the 10th International Conference on Engineering Applications of Neural Networks (EANN), Greece (2007) Kumpulainen, P., Hätönen, K.: Local anomaly detection for network system log monitoring. In: Proceedings of the 10th International Conference on Engineering Applications of Neural Networks (EANN), Greece (2007)
274.
go back to reference Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philos. Trans. R. Soc. Lond. 222, 309–368 (1922)MATHCrossRef Fisher, R.A.: On the mathematical foundations of theoretical statistics. Philos. Trans. R. Soc. Lond. 222, 309–368 (1922)MATHCrossRef
275.
go back to reference Gwadera, R., Atallah, M.J., Szpankowski, W.: Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4), 415–437 (2005)CrossRef Gwadera, R., Atallah, M.J., Szpankowski, W.: Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4), 415–437 (2005)CrossRef
276.
go back to reference Antwarg, L., Shapira, B., Rokach, L.: Explaining anomalies detected by autoencoders using SHAP. arXiv: 1903.02407v1 (2019) Antwarg, L., Shapira, B., Rokach, L.: Explaining anomalies detected by autoencoders using SHAP. arXiv: 1903.02407v1 (2019)
277.
go back to reference Atluri, G., Karpatne, A., Kumar, V.: Spatio-temporal data mining: a survey of problems and methods. ACM Comput. Surv., Vol. 51, No. 4, Article 83 (2018) Atluri, G., Karpatne, A., Kumar, V.: Spatio-temporal data mining: a survey of problems and methods. ACM Comput. Surv., Vol. 51, No. 4, Article 83 (2018)
278.
go back to reference Yang, W., Gao, Y., Cao, L.: TRASMIL: a local anomaly detection framework based on trajectory segmentation and multi-instance learning. Comput. Vis. Image Underst. 117(10), 1273–1286 (2013)CrossRef Yang, W., Gao, Y., Cao, L.: TRASMIL: a local anomaly detection framework based on trajectory segmentation and multi-instance learning. Comput. Vis. Image Underst. 117(10), 1273–1286 (2013)CrossRef
279.
go back to reference Wu, M., Jermaine, C., Ranka, S., Song, X., Gums, J.: A model-agnostic framework for fast spatial anomaly detection. ACM Trans. Knowl. Dis. Data, Vol. 4, No. 4, Article 20 (2010) Wu, M., Jermaine, C., Ranka, S., Song, X., Gums, J.: A model-agnostic framework for fast spatial anomaly detection. ACM Trans. Knowl. Dis. Data, Vol. 4, No. 4, Article 20 (2010)
280.
go back to reference Chen, X.C., Steinhaeuser, K., Boriah, S., Chatterjee, S., Kumar, V.: contextual time series change detection. In: Proceedings of the 2013 SIAM International Conference on Data Mining (2013) Chen, X.C., Steinhaeuser, K., Boriah, S., Chatterjee, S., Kumar, V.: contextual time series change detection. In: Proceedings of the 2013 SIAM International Conference on Data Mining (2013)
281.
go back to reference Zhou, X., Shekhar, S., Ali, R.Y.: spatio-temporal change footprint pattern discovery: an inter-disciplinary survey. WIREs Data Min. Knowl. Discovery 4(1), 1–23 (2014)CrossRef Zhou, X., Shekhar, S., Ali, R.Y.: spatio-temporal change footprint pattern discovery: an inter-disciplinary survey. WIREs Data Min. Knowl. Discovery 4(1), 1–23 (2014)CrossRef
282.
go back to reference Toth, E., Chawla, S.: Group deviation detection methods: a survey. ACM Comput. Surv., Vol. 51, No. 4, Article 77 (2018) Toth, E., Chawla, S.: Group deviation detection methods: a survey. ACM Comput. Surv., Vol. 51, No. 4, Article 77 (2018)
283.
go back to reference Shekhar, S., Jian, Z., Ali, R.Y., Eftelioglu, E., Tang, X., Gunturi, V.M.V., Zhou, X.: spatio-temporal data mining: a computational perspective. ISPRS Int. J. Geo Inf. 4(4), 2306–2338 (2015)CrossRef Shekhar, S., Jian, Z., Ali, R.Y., Eftelioglu, E., Tang, X., Gunturi, V.M.V., Zhou, X.: spatio-temporal data mining: a computational perspective. ISPRS Int. J. Geo Inf. 4(4), 2306–2338 (2015)CrossRef
284.
go back to reference Kang, J.M., Shekhar, S., Wennen, C., Novak, P.: Discovering flow anomalies: a SWEET approach. In: Proceedings of the Eighth IEEE International Conference on Data Mining, Pisa, Italy (2008) Kang, J.M., Shekhar, S., Wennen, C., Novak, P.: Discovering flow anomalies: a SWEET approach. In: Proceedings of the Eighth IEEE International Conference on Data Mining, Pisa, Italy (2008)
285.
go back to reference Torgo, L.: Data Mining with R: Learning with Case Studies, 2nd edn. CRC Press, Boca Raton (2017) Torgo, L.: Data Mining with R: Learning with Case Studies, 2nd edn. CRC Press, Boca Raton (2017)
286.
go back to reference Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85–126 (2004)MATHCrossRef Hodge, V.J., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22, 85–126 (2004)MATHCrossRef
287.
go back to reference Yu, R., He, X., Liu, Y.: GLAD: Group anomaly detection in social media analysis. In: ACM Trans. Knowl. Dis. Data, Vol. 10, No. 2, Article 18 (2015) Yu, R., He, X., Liu, Y.: GLAD: Group anomaly detection in social media analysis. In: ACM Trans. Knowl. Dis. Data, Vol. 10, No. 2, Article 18 (2015)
288.
go back to reference Xiong, L., Póczos, B., Schneider, J.: Group anomaly detection using flexible genre models. In: Proceedings of NIPS 2011, Advances in Neural Information Processing Systems 24 (2011) Xiong, L., Póczos, B., Schneider, J.: Group anomaly detection using flexible genre models. In: Proceedings of NIPS 2011, Advances in Neural Information Processing Systems 24 (2011)
289.
go back to reference Vatanen, T., Kuusela, M., Malmi, E., Raiko, T., Aaltonen, T., Nagai, Y.: Semi-supervised detection of collective anomalies with an application in high energy particle physics. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), Brisbane, Australia (2012) Vatanen, T., Kuusela, M., Malmi, E., Raiko, T., Aaltonen, T., Nagai, Y.: Semi-supervised detection of collective anomalies with an application in high energy particle physics. In: Proceedings of the International Joint Conference on Neural Networks (IJCNN), Brisbane, Australia (2012)
290.
go back to reference Muandet, K., Schölkopf, B.: One-class support measure machines for group anomaly detection. In: Proceedings of the 29th Conference on Uncertainty in Artificial Intelligence (UAI'13), pp. 449–458 (2013) Muandet, K., Schölkopf, B.: One-class support measure machines for group anomaly detection. In: Proceedings of the 29th Conference on Uncertainty in Artificial Intelligence (UAI'13), pp. 449–458 (2013)
291.
go back to reference Guevara, J., Canu, S., Hirata, R.: Support measure data description for group anomaly detection. In: Proceedings of the ODDx3 Workshop on Outlier Definition, Detection, and Description at the 21st ACM International Conference on Knowledge Discovery and Data Mining (SIG KDD), Sydney, Australia (2015) Guevara, J., Canu, S., Hirata, R.: Support measure data description for group anomaly detection. In: Proceedings of the ODDx3 Workshop on Outlier Definition, Detection, and Description at the 21st ACM International Conference on Knowledge Discovery and Data Mining (SIG KDD), Sydney, Australia (2015)
292.
go back to reference Chandola, V., Vatsavai, R.R.: A scalable gaussian process analysis algorithm for biomass monitoring. Stati. Anal. Data Min. 4(4), 430–445 (2011)MathSciNetMATHCrossRef Chandola, V., Vatsavai, R.R.: A scalable gaussian process analysis algorithm for biomass monitoring. Stati. Anal. Data Min. 4(4), 430–445 (2011)MathSciNetMATHCrossRef
293.
go back to reference Ramachandra, B., Dutton, B., Vatsavai, R.R.: Anomalous cluster detection in spatio-temporal meteorological fields. Stat. Anal. Data Min. 12(2), 88–100 (2018)MATHCrossRef Ramachandra, B., Dutton, B., Vatsavai, R.R.: Anomalous cluster detection in spatio-temporal meteorological fields. Stat. Anal. Data Min. 12(2), 88–100 (2018)MATHCrossRef
294.
go back to reference van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Electron. Notes Theor. Comput. Sci. 121, 3–21 (2005)MATHCrossRef van der Aalst, W.M.P., de Medeiros, A.K.A.: Process mining and security: detecting anomalous process executions and checking process conformance. Electron. Notes Theor. Comput. Sci. 121, 3–21 (2005)MATHCrossRef
295.
go back to reference Li, Y., Huang, X., Li, J., Du, M., Zou, N.: SpecAE: Spectral autoencoder for anomaly detection in attributed networks. In: Proceedings of CIKM, the 28th ACM International Conference on Information and Knowledge Management, Beijing, China (2019) Li, Y., Huang, X., Li, J., Du, M., Zou, N.: SpecAE: Spectral autoencoder for anomaly detection in attributed networks. In: Proceedings of CIKM, the 28th ACM International Conference on Information and Knowledge Management, Beijing, China (2019)
296.
go back to reference Cao, J., Yu, J., Chen, A., Bu, T., Zhang, Z.: Identifying high cardinality internet hosts. In: Proceedings of the 28th IEEE INFOCOM Conference on Computer Communications, Rio de Janeiro, Brazil (2009) Cao, J., Yu, J., Chen, A., Bu, T., Zhang, Z.: Identifying high cardinality internet hosts. In: Proceedings of the 28th IEEE INFOCOM Conference on Computer Communications, Rio de Janeiro, Brazil (2009)
297.
go back to reference Foorthuis R.M.: Algorithmic frameworks for the detection of high-density anomalies. In: Proceedings of IEEE SSCI CIDM (Symposium on Computational Intelligence in Data Mining), Canberra Australia (2020) Foorthuis R.M.: Algorithmic frameworks for the detection of high-density anomalies. In: Proceedings of IEEE SSCI CIDM (Symposium on Computational Intelligence in Data Mining), Canberra Australia (2020)
298.
go back to reference Pijnenburg, M., Kowalczyk, W.: Singular outliers: finding common observations with an uncommon feature. In: Proceedings of the International IPMU Conference, Cádiz, Spain, Springer CCIS 854 (2018) Pijnenburg, M., Kowalczyk, W.: Singular outliers: finding common observations with an uncommon feature. In: Proceedings of the International IPMU Conference, Cádiz, Spain, Springer CCIS 854 (2018)
299.
go back to reference Chalapathy, R., Chawla, S.: deep learning for anomaly detection: a survey. arXiv: 1903.02407v1 (2019) Chalapathy, R., Chawla, S.: deep learning for anomaly detection: a survey. arXiv: 1903.02407v1 (2019)
300.
go back to reference Pang, G., Shen, C., Cao, L., Hengel, A. van den: Deep learning for anomaly detection: A Review. arXiv: 2007.02500 (2020) Pang, G., Shen, C., Cao, L., Hengel, A. van den: Deep learning for anomaly detection: A Review. arXiv: 2007.02500 (2020)
301.
go back to reference Himeur, Y., Ghanem, K., Alsalemi, A., Bensaali, F., Amira, A.: Artificial intelligence based anomaly detection of energy consumption in buildings: A Review, Current Trends and new Perspectives. Applied Energy, Vol. 287 (2021) Himeur, Y., Ghanem, K., Alsalemi, A., Bensaali, F., Amira, A.: Artificial intelligence based anomaly detection of energy consumption in buildings: A Review, Current Trends and new Perspectives. Applied Energy, Vol. 287 (2021)
302.
go back to reference Hu, W., Gao, J., Li, B., Wu, O., Du, J., Maybank, S.: Anomaly detection using local kernel density estimation and context-based regression. IEEE Trans. Knowl. Data Eng., 32(2) (2020) Hu, W., Gao, J., Li, B., Wu, O., Du, J., Maybank, S.: Anomaly detection using local kernel density estimation and context-based regression. IEEE Trans. Knowl. Data Eng., 32(2) (2020)
303.
go back to reference Henrion, M., Hand, D.J., Gandy, A., Mortlock, D.J.: CASOS: A subspace method for anomaly detection in high dimensional astronomical databases. Stat. Anal. Data Min. 6(1), 53–72 (2013)MathSciNetMATHCrossRef Henrion, M., Hand, D.J., Gandy, A., Mortlock, D.J.: CASOS: A subspace method for anomaly detection in high dimensional astronomical databases. Stat. Anal. Data Min. 6(1), 53–72 (2013)MathSciNetMATHCrossRef
304.
go back to reference Cheng, H., Tan, P., Potter, C., Klooster, S.: Detection and characterization of anomalies in multivariate time series. In: Proceedings of the 2009 SIAM International Conference on Data Mining, Sparks, USA (2009) Cheng, H., Tan, P., Potter, C., Klooster, S.: Detection and characterization of anomalies in multivariate time series. In: Proceedings of the 2009 SIAM International Conference on Data Mining, Sparks, USA (2009)
305.
go back to reference Bandaragoda, T.B., Ting, K.M., Albrecht, D., Liu, F.T., Wells, J.R.: Efficient anomaly detection by isolation using nearest neighbour ensemble. In: Proceedings of the IEEE International Conference on Data Mining Workshops (2014) Bandaragoda, T.B., Ting, K.M., Albrecht, D., Liu, F.T., Wells, J.R.: Efficient anomaly detection by isolation using nearest neighbour ensemble. In: Proceedings of the IEEE International Conference on Data Mining Workshops (2014)
306.
go back to reference Kauffmann, J., Ruff, L., Montavon, G., Müller, K.: The clever hans effect in anomaly detection. arXiv: 2006.10609 (2020) Kauffmann, J., Ruff, L., Montavon, G., Müller, K.: The clever hans effect in anomaly detection. arXiv: 2006.10609 (2020)
307.
go back to reference Talagala, P.D., Hyndman, R.J., Smith-Miles, K.: Anomaly detection in high dimensional data. J. Comput. Graph. Stat. online accepted author version of 13 Aug 2020 (2020) Talagala, P.D., Hyndman, R.J., Smith-Miles, K.: Anomaly detection in high dimensional data. J. Comput. Graph. Stat. online accepted author version of 13 Aug 2020 (2020)
308.
go back to reference Wilkinson, L., Anand, A., Grossman, R.: Graph-theoretic scagnostics. In: Proceedings of the IEEE Symposium on Information Visualization (2005) Wilkinson, L., Anand, A., Grossman, R.: Graph-theoretic scagnostics. In: Proceedings of the IEEE Symposium on Information Visualization (2005)
309.
go back to reference Koufakou, A., Ortiz, E., Georgiopoulos, M., Anagnostopoulos, G., Reynolds, K.: A scalable and efficient outlier detection strategy for categorical data. In: Proceedings of ICTAI (2007) Koufakou, A., Ortiz, E., Georgiopoulos, M., Anagnostopoulos, G., Reynolds, K.: A scalable and efficient outlier detection strategy for categorical data. In: Proceedings of ICTAI (2007)
310.
go back to reference Locatello, F., Bauer, S., Lucic, M., Rätsch, G., Gelly, S., Schölkopf, B., Bachem, O.: Challenging common assumptions in the unsupervised learning of disentangled representations. In: Proceedings of the 36th International Conference on Machine Learning, California, PMLR 97 (2019) Locatello, F., Bauer, S., Lucic, M., Rätsch, G., Gelly, S., Schölkopf, B., Bachem, O.: Challenging common assumptions in the unsupervised learning of disentangled representations. In: Proceedings of the 36th International Conference on Machine Learning, California, PMLR 97 (2019)
311.
go back to reference Steinwart, I., Hush, D., Scovel, C.: A classification framework for anomaly detection. J. Mach. Learn. Res. 6(8), 211–232 (2005)MathSciNetMATH Steinwart, I., Hush, D., Scovel, C.: A classification framework for anomaly detection. J. Mach. Learn. Res. 6(8), 211–232 (2005)MathSciNetMATH
312.
go back to reference Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD—A comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9592–9600 (2019) Bergmann, P., Fauser, M., Sattlegger, D., Steger, C.: MVTec AD—A comprehensive real-world dataset for unsupervised anomaly detection. In: Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pp. 9592–9600 (2019)
313.
go back to reference Page, E.S.: On problems in which a change in a parameter occurs at an unknown point. Biometrika 44(1–2), 248–252 (1957)MATHCrossRef Page, E.S.: On problems in which a change in a parameter occurs at an unknown point. Biometrika 44(1–2), 248–252 (1957)MATHCrossRef
314.
go back to reference Ni, K., Ramanathan, N., Chehade, M.N.H., Balzano, L., Nair, S., Zahedi, S., Kohler, E., Pottie, G., Hansen, M., Srivastava, M.: Sensor network data fault types. ACM Trans. Sensor Netw., 5(3) (2009) Ni, K., Ramanathan, N., Chehade, M.N.H., Balzano, L., Nair, S., Zahedi, S., Kohler, E., Pottie, G., Hansen, M., Srivastava, M.: Sensor network data fault types. ACM Trans. Sensor Netw., 5(3) (2009)
316.
go back to reference Smolyak, D., Gray, K., Badirli, S., Mohler, G.: Coupled IGMM-GANs with Applications to anomaly detection in human mobility data. ACM Trans. Spat. Algo. Syst., 6(4) (2020) Smolyak, D., Gray, K., Badirli, S., Mohler, G.: Coupled IGMM-GANs with Applications to anomaly detection in human mobility data. ACM Trans. Spat. Algo. Syst., 6(4) (2020)
317.
go back to reference Zhang, X., Dou, W., He, Q., Zhou, R., Leckie, C., Kotagiri, R., Salcic, Z.: LSHiForest: A generic framework for fast tree isolation based ensemble anomaly analysis. In: IEEE 33rd International Conference on Data Engineering, San Diego, USA (2017) Zhang, X., Dou, W., He, Q., Zhou, R., Leckie, C., Kotagiri, R., Salcic, Z.: LSHiForest: A generic framework for fast tree isolation based ensemble anomaly analysis. In: IEEE 33rd International Conference on Data Engineering, San Diego, USA (2017)
318.
go back to reference Brax, C.: Anomaly Detection in the Surveillance Domain. Örebro University. Örebro, Sweden (2011) Brax, C.: Anomaly Detection in the Surveillance Domain. Örebro University. Örebro, Sweden (2011)
319.
go back to reference Braei, M., Wagner, S.: Anomaly detection in univariate time series: a survey on the state-of-the-art. arXiv: 2004.00433v1 (2020) Braei, M., Wagner, S.: Anomaly detection in univariate time series: a survey on the state-of-the-art. arXiv: 2004.00433v1 (2020)
320.
go back to reference Baddar, S., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wireless Mob. Netw. Ubiquitous Comput. Depend. Appl. 5(4), 29–64 (2014) Baddar, S., Merlo, A., Migliardi, M.: Anomaly detection in computer networks: a state-of-the-art review. J. Wireless Mob. Netw. Ubiquitous Comput. Depend. Appl. 5(4), 29–64 (2014)
321.
go back to reference Wu, R., Keogh, E.J.: Current time series anomaly detection benchmarks are flawed and are creating the illusion of progress. arXiv: 2009.13807 (2020) Wu, R., Keogh, E.J.: Current time series anomaly detection benchmarks are flawed and are creating the illusion of progress. arXiv: 2009.13807 (2020)
322.
go back to reference Ahmed, F., Courville, A.: Detecting semantic anomalies. In: Proceedings of the 34th AAAI Conference on Artificial Intelligence, pp. 3154–3162 (2020) Ahmed, F., Courville, A.: Detecting semantic anomalies. In: Proceedings of the 34th AAAI Conference on Artificial Intelligence, pp. 3154–3162 (2020)
323.
go back to reference Shmueli, G., Bruce, P.C., Yahav, I., Patel, N.R., Lichtendahl, K.C.: Data Mining for Business Analytics: Concepts, Techniques and Applications in R. Wiley, Hoboken (2018) Shmueli, G., Bruce, P.C., Yahav, I., Patel, N.R., Lichtendahl, K.C.: Data Mining for Business Analytics: Concepts, Techniques and Applications in R. Wiley, Hoboken (2018)
324.
go back to reference Agyemang, M., Barker, K., Alhajj, R.: Web outlier mining: discovering outliers from web datasets. Intell. Data Anal. 9(5), 473–486 (2005)CrossRef Agyemang, M., Barker, K., Alhajj, R.: Web outlier mining: discovering outliers from web datasets. Intell. Data Anal. 9(5), 473–486 (2005)CrossRef
325.
go back to reference Suzuki, N., Hirasawa, K., Tanaka, K., Kobayashi, Y., Sato, Y., Fujino, Y.: Learning motion patterns and anomaly detection by human trajectory analysis. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montreal, Canada (2007) Suzuki, N., Hirasawa, K., Tanaka, K., Kobayashi, Y., Sato, Y., Fujino, Y.: Learning motion patterns and anomaly detection by human trajectory analysis. In: Proceedings of the IEEE International Conference on Systems, Man and Cybernetics, Montreal, Canada (2007)
326.
go back to reference Aradau, C., Blanke, T.: Governing others: anomaly and the algorithmic subject of security. Eur. J. Int. Secur. 3(1), 1–21 (2017)CrossRef Aradau, C., Blanke, T.: Governing others: anomaly and the algorithmic subject of security. Eur. J. Int. Secur. 3(1), 1–21 (2017)CrossRef
327.
go back to reference Stone, E.J.: On the rejection of discordant observations. Mon. Not. R. Astron. Soc. 28, 165–168 (1873)MATH Stone, E.J.: On the rejection of discordant observations. Mon. Not. R. Astron. Soc. 28, 165–168 (1873)MATH
328.
go back to reference Gould, B.A.: On peirce’s criterion for the rejection of doubtful observations, with tables for facilitating its application. Astron. J. 6(11), 81–86 (1855)CrossRef Gould, B.A.: On peirce’s criterion for the rejection of doubtful observations, with tables for facilitating its application. Astron. J. 6(11), 81–86 (1855)CrossRef
329.
go back to reference Sharma, A.B., Golubchik, L., Govindan, R.: Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans. Sensor Netw., 6(3) (2010) Sharma, A.B., Golubchik, L., Govindan, R.: Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans. Sensor Netw., 6(3) (2010)
330.
go back to reference Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef Ahmed, M., Mahmood, A.N., Hu, J.: A survey of network anomaly detection techniques. J. Netw. Comput. Appl. 60, 19–31 (2016)CrossRef
Metadata
Title
On the nature and types of anomalies: a review of deviations in data
Author
Ralph Foorthuis
Publication date
04-08-2021
Publisher
Springer International Publishing
Published in
International Journal of Data Science and Analytics / Issue 4/2021
Print ISSN: 2364-415X
Electronic ISSN: 2364-4168
DOI
https://doi.org/10.1007/s41060-021-00265-1

Other articles of this Issue 4/2021

International Journal of Data Science and Analytics 4/2021 Go to the issue

Premium Partner