Anomaly Detection: Techniques and Applications


Saira Banu (Editor) – Professor, Department of Computer Science and Engineering,  Vel Tech Rangarajan Dr.Sagunthala R&D Institute of Science and Technology, India
Shriram Raghunathan (Editor) – Program Chair, Gaming, VIT, Bhopal, India
Dinesh Mavaluru (Editor) – Assistant Professor, Department of Information Technology,  Saudi Electronic University, Saudi Arabia
A. Syed Mustafa (Editor) – Professor and HOD, HKBK College of Engineering, India

Series: Computer Science, Technology and Applications

BISAC: COM014000

When information in the data warehouse is processed, it follows a definite pattern. An unexpected deviation in the data pattern from the usual behavior is called an anomaly. The anomaly in the data is also referred to as noise, outlier, spammer, deviations, novelties and exceptions. Identification of the rare items, events, observations, patterns which raise suspicion by differing significantly from the majority of data is called anomaly detection.

With progress in technology and the widespread use of data for the purpose of business, spam faced by individuals and companies is increasing day by day. This noisy data has boomed as a major problem in various areas such as Internet of Things, web service, machine learning, artificial intelligence, deep learning, image processing, cloud computing, audio processing, video processing, VoIP, data science, wireless sensor, etc. Identifying the anomaly data and filtering them before processing is a major challenge for the data analyst. This anomaly is unavoidable in all areas of research. This book covers the techniques and algorithms for detecting the deviated data. This book will mainly target researchers and higher graduate learners in computer science and data science.




Chapter 1. Secured and Automated Key Establishment and Data Forwarding Scheme for the Internet of Things
(N. V. Kousik, R. Arshath Raja, N. Yuvaraj and S. Anbu Chelian – Associate Professor, School of Computing and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India, et al.)

Chapter 2. A Study of Enhanced Anomaly Detection Techniques Using Evolutionary-Based Optimization for Improved Detection Accuracy
(Vidhya Sathish, PhD, and Sheik Abdul Khader, PhD – Assistant Professor, Shri Krishnaswamy College for Women, Chennai, et al.)

Chapter 3. Anomaly Detection and Applications
(Huichen Shu, PhD – Clausthal University of Technology, Germany)

Chapter 4. An Evolutionary Study on SIoT (Social Internet of Things)
(Dinesh Mavaluru and Jayabrabu Ramakrishnan – Department of Information Technology, College of Computing and Informatics, Saudi Electronic University, Saudi Arabia)

Chapter 5. A Critical Study on Advanced Machine Learning Classification of Human Emotional State Recognition Using Facial Expressions
(Jayabrabu Ramakrishnan, PhD and Dinesh Mavaluru, PhD – Department of Information Technology and Security, College of Computer Science and Information Technology, Jazan University, Saudi Arabia)

Chapter 6. Anomaly Detection for Data Aggregation in Wireless Sensor Networks
(Beski Prabaharan (Associate Professor, Chitkara University Institute of Engineering and Technology, Chitkara University, Punjab) and Saira Banu (Professor, Department of Computer Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India))

Chapter 7. Algorithm for Real Time Anomalous User Detection from Call Detail Record
(Saira Banu, PhD, and Beski Prabaharan, PhD – Associate Professor, Department of Information Science and Engineering, Vel Tech Rangarajan Dr. Sagunthala R&D Institute of Science and Technology, India, et al.)

Chapter 8. Secured Transactions from the Anomaly User Using 2 Way SSL
(Dr. Syed Mustafa and Mr. Madhivanan – Professor and Head, Department of Information Science and Engineering, HKBK College of Engineering, Bangalore, Affiliated to Visvesvaraya Technological University, India, et al.)


Additional information