ware that facilitates implementing and evaluating
methods, and that can be used to automatically find
appropriate methods (given labeled training data and
a set of candidate sub-methods).
Future Work. We foresee several venues for future
work.
First, there are plenty of interesting sub-methods,
transforms, ensemble methods, and non-sequence
types of data (e.g. graphs, spatial data) to which our
formalism could be extended. There is work to be
done both in terms of studying these and in terms of
creating flexible and efficient implementations.
There is also work to be done on efficiently solv-
ing the optimization problem outlined in Section 9;
we have demonstrated that it may solved for simple
tasks, but it remains to be seen if it can be effectively
solved for real-world tasks.
Finally, modifying or extending our formalism
could be valuable. For instance, associating addi-
tional information with sub-methods could enable al-
gorithms that can optimize or approximate the result-
ing methods.
REFERENCES
Abraham, B. and Box, G. E. (1979). Bayesian analysis
of some outlier problems in time series. Biometrika,
66(2):229–236.
Abraham, B. and Chuang, A. (1989). Outlier detection and
time series modeling. Technometrics, 31(2):241–248.
Agyemang, M., Barker, K., and Alhajj, R. (2006). A
comprehensive survey of numeric and symbolic out-
lier mining techniques. Intelligent Data Analysis,
10(6):521–538.
Basu, S. and Meckesheimer, M. (2007). Automatic outlier
detection for time series: an application to sensor data.
Knowledge and Information Systems, 11(2):137–154.
Berndt, D. J. and Clifford, J. (1994). Using dynamic time
warping to find patterns in time series. In KDD work-
shop, volume 10, pages 359–370.
Chandola, V. (2009). Anomaly detection for symbolic se-
quences and time series data. PhD thesis, University
of Minnesota.
Chandola, V., Banerjee, A., and Kumar, V. (2009).
Anomaly detection: A survey. ACM Computing Sur-
veys (CSUR), 41(3):15.
Chandola, V., Banerjee, A., and Kumar, V. (2012).
Anomaly detection for discrete sequences: A survey.
Knowledge and Data Engineering, IEEE Transactions
on, 24(5):823–839.
Chen, Y., Keogh, E., Hu, B., Begum, N., Bag-
nall, A., Mueen, A., and Batista, G. (2014).
The ucr time series classification archive.
www.cs.ucr.edu/˜eamonn/time
series data/. Accessed:
2014-09-13.
Ding, H., Trajcevski, G., Scheuermann, P., Wang, X., and
Keogh, E. (2008). Querying and mining of time series
data: experimental comparison of representations and
distance measures. Proceedings of the VLDB Endow-
ment, 1(2):1542–1552.
Etsy (2015). Etsy Skyline. github.com/etsy/skyline. Ac-
cessed: 2015-02-10.
Fox, A. J. (1972). Outliers in time series. Journal of the
Royal Statistical Society. Series B (Methodological),
pages 350–363.
Fu, A. W.-C., Leung, O. T.-W., Keogh, E., and Lin, J.
(2006). Finding time series discords based on Haar
transform. In Advanced Data Mining and Applica-
tions, pages 31–41. Springer.
Fu, T.-c. (2011). A review on time series data min-
ing. Engineering Applications of Artificial Intelli-
gence, 24(1):164–181.
Galeano, P., Pe˜na, D., and Tsay, R. S. (2006). Outlier de-
tection in multivariate time series by projection pur-
suit. Journal of the American Statistical Association,
101(474):654–669.
Hodge, V. J. and Austin, J. (2004). A survey of outlier de-
tection methodologies. Artificial Intelligence Review,
22(2):85–126.
Keogh, E., Lin, J., and Fu, A. (2005). Hot sax: Efficiently
finding the most unusual time series subsequence. In
Data mining, fifth IEEE international conference on.
Keogh, E., Lin, J., Lee, S.-H., and Van Herle, H. (2007).
Finding the most unusual time series subsequence: al-
gorithms and applications. Knowledge and Informa-
tion Systems, 11(1):1–27.
Lazarevic, A., Ert¨oz, L., Kumar, V., Ozgur, A., and Sri-
vastava, J. (2003). A comparative study of anomaly
detection schemes in network intrusion detection. In
SDM, pages 25–36.
Lin, J., Keogh, E., Wei, L., and Lonardi, S. (2007). Ex-
periencing sax: a novel symbolic representation of
time series. Data Mining and Knowledge Discovery,
15(2):107–144.
Ma, J. and Perkins, S. (2003). Online novelty detection on
temporal sequences. In Proceedings of the ninth ACM
SIGKDD international conference on Knowledge dis-
covery and data mining, pages 613–618.
Markou, M. and Singh, S. (2003a). Novelty detection: a re-
view, part 1: statistical approaches. Signal processing,
83(12):2481–2497.
Markou, M. and Singh, S. (2003b). Novelty detection: a re-
view—part 2:: neural network based approaches. Sig-
nal processing, 83(12):2499–2521.
Phua, C., Lee, V., Smith, K., and Gayler, R. (2010). A
comprehensive survey of data mining-based fraud de-
tection research. arXiv preprint arXiv:1009.6119.
Tsay, R. S., Pe˜na, D., and Pankratz, A. E. (2000). Outliers in
multivariate time series. Biometrika, 87(4):789–804.
Twitter (2015). AnomalyDetection R Package.
github.com/twitter/anomalydetection. Accessed:
2015-02-10.