Anomaly detection principles and algorithms:
Gespeichert in:
Hauptverfasser: | , , |
---|---|
Format: | Buch |
Sprache: | English |
Veröffentlicht: |
Cham
Springer
2017
|
Schriftenreihe: | Terrorism, security, and computation
|
Schlagworte: | |
Beschreibung: | xxii, 217 Seiten Illustrationen, Diagramme, teilweise farbig 23.5 cm x 15.5 cm |
ISBN: | 9783319675244 3319675249 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045100847 | ||
003 | DE-604 | ||
005 | 20221017 | ||
007 | t | ||
008 | 180724s2017 sz a||| |||| 00||| eng d | ||
016 | 7 | |a 1137638699 |2 DE-101 | |
020 | |a 9783319675244 |c hbk |9 978-3-319-67524-4 | ||
020 | |a 3319675249 |c hbk |9 3-319-67524-9 | ||
035 | |a (OCoLC)1048233770 | ||
035 | |a (DE-599)DNB1137638699 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a sz |c XA-CH | ||
049 | |a DE-11 |a DE-858 |a DE-20 | ||
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Mehrotra, Kishan G. |e Verfasser |4 aut | |
245 | 1 | 0 | |a Anomaly detection principles and algorithms |c Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang |
264 | 1 | |a Cham |b Springer |c 2017 | |
264 | 4 | |c © 2017 | |
300 | |a xxii, 217 Seiten |b Illustrationen, Diagramme, teilweise farbig |c 23.5 cm x 15.5 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 0 | |a Terrorism, security, and computation | |
653 | |a UNF | ||
653 | |a UR | ||
653 | |a Anomaly Detection | ||
653 | |a Data Mining | ||
653 | |a Rank Based Approach | ||
653 | |a Security Applications | ||
653 | |a Time Series Anomaly Detection | ||
653 | |a Outlier Detection | ||
653 | |a Clustering | ||
653 | |a Classification | ||
653 | |a Algorithms | ||
653 | |a Machine Learning | ||
653 | |a Statistical Pattern Recognition | ||
653 | |a Time Series | ||
653 | |a Ensemble Methods | ||
653 | |a UNF | ||
700 | 1 | |a Mohan, Chilukuri K. |e Verfasser |4 aut | |
700 | 1 | |a Huang, Huaming |e Verfasser |4 aut | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe, eBook |z 978-3-319-67526-8 |
999 | |a oai:aleph.bib-bvb.de:BVB01-030491430 |
Datensatz im Suchindex
_version_ | 1804178733557350400 |
---|---|
any_adam_object | |
author | Mehrotra, Kishan G. Mohan, Chilukuri K. Huang, Huaming |
author_facet | Mehrotra, Kishan G. Mohan, Chilukuri K. Huang, Huaming |
author_role | aut aut aut |
author_sort | Mehrotra, Kishan G. |
author_variant | k g m kg kgm c k m ck ckm h h hh |
building | Verbundindex |
bvnumber | BV045100847 |
classification_rvk | ST 277 |
ctrlnum | (OCoLC)1048233770 (DE-599)DNB1137638699 |
discipline | Informatik |
format | Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01734nam a2200553 c 4500</leader><controlfield tag="001">BV045100847</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20221017 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">180724s2017 sz a||| |||| 00||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1137638699</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319675244</subfield><subfield code="c">hbk</subfield><subfield code="9">978-3-319-67524-4</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3319675249</subfield><subfield code="c">hbk</subfield><subfield code="9">3-319-67524-9</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1048233770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1137638699</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">sz</subfield><subfield code="c">XA-CH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-858</subfield><subfield code="a">DE-20</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Mehrotra, Kishan G.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Anomaly detection principles and algorithms</subfield><subfield code="c">Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer</subfield><subfield code="c">2017</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">© 2017</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">xxii, 217 Seiten</subfield><subfield code="b">Illustrationen, Diagramme, teilweise farbig</subfield><subfield code="c">23.5 cm x 15.5 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">Terrorism, security, and computation</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UNF</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UR</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Anomaly Detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Data Mining</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Rank Based Approach</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Security Applications</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Time Series Anomaly Detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Outlier Detection</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Clustering</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Classification</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Algorithms</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Machine Learning</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Statistical Pattern Recognition</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Time Series</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Ensemble Methods</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">UNF</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mohan, Chilukuri K.</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Huang, Huaming</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe, eBook</subfield><subfield code="z">978-3-319-67526-8</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030491430</subfield></datafield></record></collection> |
id | DE-604.BV045100847 |
illustrated | Illustrated |
indexdate | 2024-07-10T08:08:40Z |
institution | BVB |
isbn | 9783319675244 3319675249 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030491430 |
oclc_num | 1048233770 |
open_access_boolean | |
owner | DE-11 DE-858 DE-20 |
owner_facet | DE-11 DE-858 DE-20 |
physical | xxii, 217 Seiten Illustrationen, Diagramme, teilweise farbig 23.5 cm x 15.5 cm |
publishDate | 2017 |
publishDateSearch | 2017 |
publishDateSort | 2017 |
publisher | Springer |
record_format | marc |
series2 | Terrorism, security, and computation |
spelling | Mehrotra, Kishan G. Verfasser aut Anomaly detection principles and algorithms Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang Cham Springer 2017 © 2017 xxii, 217 Seiten Illustrationen, Diagramme, teilweise farbig 23.5 cm x 15.5 cm txt rdacontent n rdamedia nc rdacarrier Terrorism, security, and computation UNF UR Anomaly Detection Data Mining Rank Based Approach Security Applications Time Series Anomaly Detection Outlier Detection Clustering Classification Algorithms Machine Learning Statistical Pattern Recognition Time Series Ensemble Methods Mohan, Chilukuri K. Verfasser aut Huang, Huaming Verfasser aut Erscheint auch als Online-Ausgabe, eBook 978-3-319-67526-8 |
spellingShingle | Mehrotra, Kishan G. Mohan, Chilukuri K. Huang, Huaming Anomaly detection principles and algorithms |
title | Anomaly detection principles and algorithms |
title_auth | Anomaly detection principles and algorithms |
title_exact_search | Anomaly detection principles and algorithms |
title_full | Anomaly detection principles and algorithms Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang |
title_fullStr | Anomaly detection principles and algorithms Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang |
title_full_unstemmed | Anomaly detection principles and algorithms Kishan G. Mehrotra, Chilukuri K. Mohan, Huaming Huang |
title_short | Anomaly detection principles and algorithms |
title_sort | anomaly detection principles and algorithms |
work_keys_str_mv | AT mehrotrakishang anomalydetectionprinciplesandalgorithms AT mohanchilukurik anomalydetectionprinciplesandalgorithms AT huanghuaming anomalydetectionprinciplesandalgorithms |