Berkhin, P. et al. (2006). A survey of clustering data mining
techniques. Grouping multidimensional data, 25:71.
Dean, D. J., Nguyen, H., and Gu, X. (2012). Ubl: Unsu-
pervised behavior learning for predicting performance
anomalies in virtualized cloud systems. In Proceed-
ings of the 9th international conference on Autonomic
computing, pages 191–200. ACM.
Doersch, C. (2016). Tutorial on variational autoencoders.
arXiv preprint arXiv:1606.05908.
Erfani, S. M., Rajasegarar, S., Karunasekera, S., and Leckie,
C. (2016). High-dimensional and large-scale anomaly
detection using a linear one-class svm with deep learn-
ing. Pattern Recognition, 58:121–134.
Eskin, E., Arnold, A., Prerau, M., Portnoy, L., and Stolfo,
S. (2002). A geometric framework for unsupervised
anomaly detection: Detecting intrusions in unlabeled
data. Applications of data mining in computer secu-
rity, 6:77–102.
Guo, Z., Jiang, G., Chen, H., and Yoshihira, K. (2006).
Tracking probabilistic correlation of monitoring data
for fault detection in complex systems. In Depend-
able Systems and Networks, 2006. DSN 2006, pages
259–268. IEEE.
Heller, K. A., Svore, K. M., Keromytis, A. D., and Stolfo,
S. J. (2003). One class support vector machines for de-
tecting anomalous windows registry accesses. In Pro-
ceedings of the workshop on Data Mining for Com-
puter Security, volume 9.
Hu, W., Liao, Y., and Vemuri, V. R. (2003). Robust support
vector machines for anomaly detection in computer
security. In ICMLA, pages 168–174.
Id´e, T. and Kashima, H. (2004). Eigenspace-based anomaly
detection in computer systems. In Proceedings of
the 10th ACM SIGKDD international conference on
Knowledge discovery and data mining, pages 440–
449. ACM.
Kingma, D. P. and Welling, M. (2014). Auto-encoding vari-
ational bayes. Proceedings of the International Con-
ference on Learning Representations (ICLR).
Kotsiantis, S. and Pintelas, P. (2004). Recent advances in
clustering: A brief survey. WSEAS Transactions on
Information Science and Applications, 1(1):73–81.
Loh, W.-K. and Park, Y.-H. (2014). A survey on density-
based clustering algorithms. In Ubiquitous Informa-
tion Technologies and Applications, pages 775–780.
Springer.
Ranaweera, L., Vithanage, R., Dissanayake, A., Prabodha,
C., and Ranathunga, S. (2017). Anomaly detection
in complex trading systems. In Engineering Research
Conference (MERCon), 2017 Moratuwa, pages 437–
442. IEEE.
Sakurada, M. and Yairi, T. (2014). Anomaly detection
using autoencoders with nonlinear dimensionality re-
duction. In Proceedings of the 2nd Workshop on Ma-
chine Learning for Sensory Data Analysis (MLSDA),
page 4. ACM.
Schneider, C., Barker, A., and Dobson, S. (2015). Au-
tonomous fault detection in self-healing systems using
restricted boltzmann machines.
Shekhawat, M. and Sharma, I. (2017). Density based met-
rics for clustering–a comprehensive survey. Interna-
tional Journal for Women Researchers in Engineering,
Science and Management, 1:6–9.
Tan, Y., Nguyen, H., Shen, Z., Gu, X., Venkatramani, C.,
and Rajan, D. (2012). Prepare: Predictive perfor-
mance anomaly prevention for virtualized cloud sys-
tems. In IEEE 32nd International Conference on
Distributed Computing Systems (ICDCS), pages 285–
294. IEEE.
Walker, J., Doersch, C., Gupta, A., and Hebert, M. (2016).
An uncertain future: Forecasting from static images
using variational autoencoders. In European Confer-
ence on Computer Vision, pages 835–851. Springer.
Wang, Y., Wong, J., and Miner, A. (2004). Anomaly intru-
sion detection using one class svm. In Fifth Annual
IEEE Information Assurance Workshop, pages 358–
364. IEEE.
Willsky, A. S. (1976). A survey of design methods for
failure detection in dynamic systems. Automatica,
12(6):601–611.
Xu, D., Yan, Y., Ricci, E., and Sebe, N. (2017). Detecting
anomalous events in videos by learning deep represen-
tations of appearance and motion. Computer Vision
and Image Understanding, 156:117–127.
Yang, Y., Lian, B., Li, L., Chen, C., and Li, P. (2014).
Dbscan clustering algorithm applied to identify sus-
picious financial transactions. In International Con-
ference on Cyber-Enabled Distributed Computing and
Knowledge Discovery (CyberC), pages 60–65. IEEE.