18. منابع
[۱] Chandola V, Banerjee A and Kumar V "Anomaly Detection: A Survey", ACM Computer Survey, 41(3), Article
15, 1-58, 2009.
[۲] Hodge V and Austin J "A Survey of Outlier Detection Methodologies", Artificial Intelligence Review, 22(2),
85–126, 2004.
[۳] Hassanzadeh R Anomaly Detection in Online Social Networks: Using Data Mining Techniques and Fuzzy
Logic, School of Electrical Engineering and Computer Science, Queensland University of Technology, 2014.
[۴] Shearer C "The CRISP-DM model: The New Blueprint for Data Mining", Journal of Data Warehousing, 5,
13-22, 2000.
[۵] Tran D, Ma W and Sharma D "Network Anomaly Detection Using Fuzzy Gaussian Mixture Models",
International Journal of Future Generation Communication and Networking, 1(1), 37-42, 2006.
[۶] Kaur H and Gill N "Host Based Anomaly Detection Using Fuzzy Genetic Approach (FGA)", International
Journal of Computer Applications, 74(20), 2013.
]۷[در ناهنجاری تشخیص برای مصنوعی زنبورهای کلونی و منفی انتخاب هایالگوریتم بر مبتنی ترکیبی رویکردی م آبادی و ف بارانی"
متحرک اقتضایی هایشبکه"ایران رمز انجمن المللیبین کنفرانسشهریور ،مشهد فردوسی دانشگاه ،۱۳۹۰.
]۸[، فازی گیریرای روش با خوشه بر مبتنی اقتضایی هایشبکه در ناهنجاری تشخیص س جلیلی و م منش رحمانی" "برق مهندسی نشریه
ایران کامپیوتر مهندسی و) ،۲(۱۰زمستان ،۱۳۹۱.
[9] Izakian H and Pedrycz W "Anomaly Detection in Time Series Data using a Fuzzy C-Means Clustering" Fifth
International Symposium on Computational Intelligence and Design (ISCID), IEEE, 1513-1518, China, 2013.
[10] [10] Rabatel J, Bringay S and Poncelet P "Fuzzy Anomaly Detection in Monitoring Sensor Data" 18th
IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), IEEE, 1-8, Spain, 2011.
19. منابع
[۱۱] Gómez J, González F and Dasgupta D "An Immuno-Fuzzy Approach to Anomaly Detection" The 12th IEEE
International Conference on Fuzzy Systems, 2, 1219-1224, USA, 2003.
[۱۲] Parvath Devi K and Siva Prasad YA "Study of Anomaly Identification Techniques in Large scale systems",
International Journal of Computer Trends and Technology, 3(1), 11-17, 2012.
[۱۳] Doostari M A, Zeinali R, Lashkari H and Ajamzamani M "Anomaly Detection in Cliques of Online Social
Networks Using Fuzzy Node-Fuzzy Graph",Journal of Basic and Applied Scientific Research, 3(8), 614-626,
2013.
[۱۴] Shamshirband Sh, Anuar N B, Mat Kiah L and Misra S "Anomaly Detection using Fuzzy Q-learning
Algorithm", Acta Polytechnica Hungarica, 11(8), 5-28, 2014.
[۱۵] Jabez J and Muthukumar B "Intrusion Detection System (IDS): Anomaly Detection using Outlier Detection
Approach", Procedia Computer Science, sciencedirect, 48, 338-346, 2015.
[۱۶] Savage D, Zhang X, Yu X, Choua P b, Wang Q "Anomaly Detection in Online Social Networks", Social
Networks, sciencedirect, 39, 62-70, 2014.
[۱۷] www.systems-thinking.org/dikw/dikw.htm, Bellinger G, Castro D and Mills A, 2 January 2017, 23:00.
[۱۸] Mouthann N Effects of Big Data Analytic on Organization's Value Creation, Faculty of science and faculty of
economics and business, University of Amsterdam, 2012.
[۱۹] www.computable.nl/artikel/opinie/business-intelligence/4485335/1509029/big-data-wat-was-de-vraag.html,
Ras P, 2 January 2017, 23:30.
[۲۰] www.sync.nl/de-opvolger-van-de-cloud-big-data, Leeuwen R V, 2 January 2017, 23:30.
20. منابع
[۲۱] Han J and Kamber M and Cerra D Data Mining: Concepts and Techniques, Morgan Kaufmann,Waltham,
USA, 2012.
[۲۲] Kantardzic M Data Mining: Concepts, Models, Methods and Algorithms, Second Edition, John Wiley &
Sons, Hoboken, USA, 2011.
[۲۳] Tamilselvi R and Kalaiselvi S "An Overview of Data Mining Techniques and Applications", International
Journal of Science and Research (IJSR), 2(2), 506-509, 2013.
[۲۴] www.thearling.com/text/dmwhite/dmwhite.htm, Gartner Group High Performance Computing Research, 2
January 2017, 16:30.
[۲۵] Tan p, Steincach M and Kumar V Introduction to Data Mining, Addison Wesley, 2005.
[۲۶] Oracle BI Group Oracle Data Mining Concepts, Release 1, Oracle, 2008.
[۲۷] Gibert K, Sànchez-Marrè M and Codina V "Choosing the Right Data Mining Technique: Classification of
Methods and Intelligent Recommendation" International Congress on Environmental Modelling and Software
Modelling for Environment’s Sake, International Environmental Modelling and Software Society (iEMSs),
Canada, 2010.
[۲۸] Cheeseman P and Oldford R W Selecting models from data, Springer, 1994.
[۲۹] www.data-mining.philippefournierviger.com/whatarethestepstoimplementadataminingalgorithm, Fournier
Viger Ph, 2 January 2017, 20:30.
[۳۰] www.msdn.microsoft.com/en-us/library/ms175595.aspx, Anon, 2 January 2017, 21:00.
[۳۱] Witten I.H, Frank E and Hall M.A Data Mining: Practical Machine Learning Tools and Techniques, 3rd
Edtion, Morgan Kaufmann,Waltham, USA, 2011.
21. منابع
[۳۲] Chikohora T T "A Study of the Factors Considered when Choosing an Appropriate Data Mining Algorithm",
International Journal of Soft Computing and Engineering (IJSCE), 4(3), 42-45, July 2014.
[۳۳] www.ibm.com/developerworks/ru/library/ba-data-mining-techniques, Brown M, 2 January 2017, 21:30.
[۳۴] www.iaonline.theiia.org/data-mining-101-tools-and-techniques, Silltow J, 2 January 2017, 21:45.
[۳۵] Chung M.H and Gray P "Special Section Data mining", Journal of Management Information Systems, 16(1),
1999.
[۳۶] Chapman P, Clinton J, Kerber R, Khabaza T, Reinartz T, Shearer C and Wirth R CRISP-DM 1.0, SPSS, 2000.
[۳۷] Marsala Ch And Bounchon-Meunier B "Fuzzy Data Mining and Management of Interpretable and Subjective
Information", Elsevier Fuzzy Sets and Systems Journal, 281, 252–259, December 2015.
[۳۸] Casillas J, Cordón O, Herrera F and Magdalena L "Interpretability Improvements to Find the Balance
Interpretability Accuracy in Fuzzy Modeling: An Overview, Interpretability Issues in Fuzzy Modeling",
Springer, Berlin Heidelberg, 128, 3–22, 2003.
[۳۹] Elouedi Z, Mellouli K and Smets P "Belief decision trees: Theoretical Foundations", International Journal of
Approximate Reasoning, 28, 91–124, 2001.
[۴۰] Bujnowski P, Szmidt E and Kacprzyk J "Intuitionistic Fuzzy Decision Trees: A New Approach" 13th
International Conference on Artificial Intelligence and Soft Computing (ICAISC), Vol 8467 of Lecture Notes in
Computer Science, Springer, 181–192, 2014.
[۴۱] www.lrs.ed.uiuc.edu/TSE-portal/analysis/social-network-analysis, Gretzel U, 2 January 2017, 18:00.
[۴۲] Hogan B, Carrasco J A and Wellman B "Visualizing Personal Networks: Working with Participant-aided
Sociograms", Field Methods, Sage Publications, 19(2), 116-144, May 2007.
22. منابع
[۴۳] Freeman L The Development of Social Network Analysis, Empirical Press, Vancouver, 2006.
[۴۴] Otte E and Rousseau R "Social Network Analysis: a powerful strategy, also for the information sciences",
Journal of Information Science, 28(6), 441-453, 2002.
[۴۵] McPherson N, Smith-Lovin L and Cook J.M "Birds of a Feather: Homophily in Social Networks", Annual
Review of Sociology, 27, 415–444, 2001.
[۴۶] Podolny, J M and Baron J N "Resources and Relationships: Social Networks and Mobility in the
Workplace", American Sociological Review, 62(5), 673-693, 1997.
[۴۷] Flynn, F J, Reagans R E and Guillory L "Do You Two Know Each Other? Transitivity, Homophily and the
Need for (Network) Closure", Journal of Personality, 99(5), November 2010.
[۴۸] Maksim T and Alexander K Social Network Analysis for Startups: Finding Connections on the Social Web,
O'Reilly, 2011.
[۴۹] Guandong X, Xu Yu J and Lee W Web Mining and Social Networking: Techniques and Applications,
Springer, 2012.
[۵۰] www.intersci.ss.uci.edu/wiki/index.php/Cohesive_blocking, 2 January 2017, 23:30.
[۵۱] Hanneman R.A and Mark R "Concepts and Measures for Basic Network Analysis", The Sage Handbook of
Social Network Analysis, Sage, 346–347, 2005.
[۵۲] Pattillo J, Youssef N and Butenko S "On Clique Relaxation Models in Social Network Analysis", European
Journal of Operational Research, 226, 9-18, 20, 2013.
[۵۳] Kurka D.B, Godoy A and Von Zuben F.J "Online Social Network Analysis: A Survey of Research
Applications in Computer Science", The Computing Research Repository (CoRR), 2016.
23. منابع
[۵۴] Teng H, Chen K and Lu S " Adaptive Real-Time Anomaly Detection Using Inductively Generated
Sequential Patterns", IEEE Computer Society Symposium on Research in Security and Privacy, IEEE Computer
Society Press, 278–284, 1990.
[۵۵] Rousseeuw P J and Leroy A M Robust Regression and Outlier Detection, John Wiley & Sons, USA, 1987.
[۵۶] Markou M and Singh S "Novelty Detection: A Review-part 1: Statistical Approaches", Signal Processing,
Elsevier, 83(12), 2481–2497, 2003.
[۵۷] Markou M and Singh S "Novelty Detection: A Review-Part 2: Neural Network Based Approaches", Signal
Processing, Elsevier, 83(12), 2499–2521, 2003.
[۵۸] Saunders R and Gero J "The Importance of Being Emergent" Conference of Artificial Intelligence in
Design, 2000.
[۵۹] Song X, Wu M, Jermaine C and Ranka S "Conditional Anomaly Detection", IEEE Transactions on
Knowledge and Data Engineering, 19(5), 631–645, 2007.
[۶۰] Weigend, A S, Mangeas M and Srivastava A.N "Nonlinear Gated Experts for Time-Series, Discovering
Regimes and Avoiding Overfitting", International Journal of Neural Systems, 6(4), 373–399, 1995.
[۶۱] Salvador S and Chan P "Learning States and Rules for Time-Series Anomaly Detection", Tech Rep in
Department of Computer Science, Florida Institute of Technology, Melbourne, 2003.
[۶۳] Shekhar S, Lu C T and Zhang P "Detecting Graph-Based Spatial Outliers: Algorithms and Applications (A
Summary of Results)" 7th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining,
ACM Press, USA, 371–376, 2001.
24. منابع
[۶۴] Phoha V V "The Springer Internet Security Dictionary", Springer Verlag, 2002
[۶۵] Denning D E, An Intrusion Detection Model", IEEE Transactions of Software Engineering, 13(2), 222–232,
1987.
[۶۶] Fawcett T and Provost F "Activity Monitoring: Noticing Interesting Changes in Behavior" 5th ACM
SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 53–62, 1999.
[۶۷] Albrecht S, Busch J, Kloppenburg M, Metze F and Tavan P, Generalized Radial Basis Function Networks
for Classification and Novelty Detection: Self-Organization of Optional Bayesian Decision", Neural Networks,
13(10), 1075–1093, 2000.
[۶۸] Emamian V, Kaveh M and Tewfik A "Robust Clustering of Acoustic Emission Signals Using the Kohonen
Network" IEEE International Conference of Acoustics, Speech and Signal Processing IEEE Computer Society,
IEEE, 6, 3891-3894, Turkey, 2000.
[۶۹] Crook P and Hayes G "A Robot Implementation of a Biologically Inspired Method for Novelty Detection"
Towards Intelligent Mobile Robots Conference, Division of Informatics, UK, 2001.
[۷۰] Crook PA, Marsland S, Hayes G and Nehmzow "A Tale of Two Filters On-Line Novelty Detection"
International Conference on Robotics and Automation, 3894–3899, 2002.
[۷۱] Marsland S, Nehmzow U and Shapiro J "A Model of Habituation Applied to Mobile Robots" Towards
Intelligent Mobile Robots (TIMR), Bristol, 1999.
[۷۲] Marsland S, Nehmzow U and Shapiro J "Novelty Detection for Robot Neotaxis" 2nd International
Symposium on Neural Compuatation, 554 – 559, 2000.
[۷۳] Marsland S, Nehmzow U and Shapiro J "A Real-Time Novelty Detector for a Mobile Robot, EUREL
Conference on Advanced Robotics Systems, The Computing Research Repository (CoRR), 2000.
25. منابع
[۷۴] Sun J, Qu H, Chakrabarti D and Faloutsos "Neighborhood Formation and Anomaly Detection in Bipartite
Graphs", 5th IEEE International Conference on Data Mining, IEEE Computer Society, Washington, DC, USA,
418–425, 2005.
[۷۵] Ide T and Kashima H "Eigenspace-Based Anomaly Detection in Computer Systems" 10th ACM SIGKDD
International Conference on Knowledge Discovery and Data Mining, ACM Press, USA, 440–449, 2004.
[۷۶] MacDonald J W and Ghosh D "Copa–Cancer Outlier Profile Analysis", Bioinformatics, 22(23), 2950–2951,
2007.
[۷۷] Tibshirani R and Hastie T "Outlier Sums for Differential Gene Rxpression Analysis", Biostatistics, 8(1), 2–
8, 2007.
[۷۸] Lu C T, Chen D and Kou Y "Algorithms for Spatial Outlier Detection" 3rd International Conference on
Data Mining, 597–600, 2003.
[۷۹] Lin S and Brown D E "An Outlier-Based Data Association Method for Linking Criminal Incidents" 3rd
SIAM Data Mining Conference, 2003.
[۸۰] Dutta H, Giannella C, Borne K and Kargupta H "Distributed Top-K Outlier Detection in Astronomy
Catalogs Using the Demac System" 7th SIAM International Conference on Data Mining, 2007.
[۸۱] Kou Y, Lu C T and Chen, D "Spatial Weighted Outlier Detection", SIAM Conference on Data Mining, 2006.
[۸۲] Forrest S, Warrender C and Pearlmutter B "Detecting Intrusions Using System Calls: Alternate Data
Models", IEEE ISRSP, IEEE Computer Society, USA, 133–145, 1999.
[۸۳] Sun P, Chawla S and Arunasalam B "Mining for Outliers in Sequential Databases" SIAM International
Conference on Data Mining, 2006.
26. منابع
[۸۴] Noble C C and Cook D J "Graph-Based Anomaly Detection" 9th ACM SIGKDD International Conference
on Knowledge Discovery and Data Mining, ACM Press, 631–636, 2003.
[۸۵] Kumar V "Parallel and Distributed Computing for Cybersecurity", Online Distributed Systems, IEEE, 6(10),
2005.
[۸۶] Spence C, Parra L and Sajda P "Detection, Synthesis and Compression in Mammo Graphic Image Analysis
With a Hierarchical Image Probability Model" IEEE Workshop on Mathematical Methods in Biomedical Image
Analysis. IEEE Computer Society, USA, 3, 2001.
[۸۷] Fujimaki R, Yairi T and Machida K "An Approach to Spacecraft Anomaly Detection Problem Using Kernel
Feature Space" 11th ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, ACM
Press, USA, 401–410, 2005.
[۸۸] Edgeworth F Y "On Discordant Observations", Philosophical Magazine, 23(5), 364–375, 1887.
[۸۹] Abdulsahib A Kh "Anomaly Detection In Text Data That Represented As A Graph Using DBSCAN
Algorithm", Journal Of Theoretical And Applied Information Technology, 95(9), 2017.
[۹۰]Carvalho L, Teixeira C, Dias E, Meira W and Carvalho O "A Simple And Effective Method For Anomaly
Detection In Health Care" SDM DMMH Workshop, 2015.
[۹۱] Nian Ke, Zhang H, Tayal A, Coleman Th And Li Y "Auto Insurance Fraud Detection Using Unsupervised
Specrtal Ranking For Anomaly", The Journal Of Finance And Data Science, 58-75, 2016.
[۹۲]Kroll B, Schaffranek D, Schriegel S And Niggemann O "System Modelling Based On Machine Learning
For Anomaly Detection And Predective Maintenance In Industrial Plants", IEEE Emerging Technology And
Factory Automation (ETFA), 2014.
27. منابع
[۹۳] Gosh A, Qin Sh, Lee J And Wang G "PLAT: An Automated Fault And Behavioral Anomaly Detection Tool
For PLC Controlled Manufacturing Systems", Computational Intelligence And Neuroscience, Hidwai Publishing
Corporation, 2016.
[۹۴] Boyd D M and Ellison N B "Social Network Sites: Definition, History, and Scholarship", Journal of
Computer Mediated Communication, 13(1), 210-230, 2008.
[۹۵] Sundén J Material Virtualities: Approaching Online Textual Embodiment, Peter Lang Publishing, 2003.
[۹۶] Tang L "Online Friendship", Encyclopedia of Cyber Behavior, 412-421, 2012.
[۹۷] www.aic.gov.au/en/publications/current%20series/rpp/100-120/rpp103.aspx, Choo K R, 2 January 2017,
18:30.
[۹۸] www.socialmediatoday.com/pamdyer/564409/6-types-social-media-users, Rozen D, Askalani M And Senn
T, 2 January 2017, 19:30..
[۹۹] Kumar R, Novak J and Tomkins, A Structure and Evolution of Online Social Networks In Link Mining:
Models, Algorithms, and Applications, Springer,337-357 (1 Chapter of Book), 2010.
[۱۰۰] Thelwall M "Social Networks, Gender, and Friending: An Analysis of MySpace Member Profiles", Journal
of the American Society for Information Science and Technology, 59(8), 1321-1330, 2008.
[۱۰۱] Gupta A, Sycara K P, Gordon G J and Hefn, A "Exploring Friend's Influence in Cultures in Twitter",
Advances in Social Networks Analysis and Mining (ASONAM) IEEE ACM International Conference, 584-591,
USA, 2013.
[۱۰۲] Akoglu L, McGlohon M and Faloutsos C "OddBall: Spotting Anomalies in Weighted Graphs" 14th
Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining, Springer, 410-421, Berlin,
2010.
28. منابع
[۱۰۴] Gjoka M, Kurant M, Butts C T and Markopoulou A "Walking in Facebook: A Case Study of Unbiased
Sampling of OSNs", INFOCOM, IEEE, 1-9, 2010.
[۱۰۵] Gross R and Acquisti A "Information Revelation and Privacy in Online Social Networks" ACM Workshop on
Privacy in the Electronic Society, 71-80, USA, 2005.
[۱۰۶] Hodge M.J "The Fourth Amendment and Privacy Issues on the New Internet: Facebook.com and
Myspace.com", ULJ, 31(2006), 95-123, 2006.
[۱۰۷] Ugander J, Karrer B, Backstrom L and Marlow C "The Anatomy of the Facebook Social Graph", The
Computing Research Repository (CoRR), 2011.
[۱۰۸] ] Newman M E, Watts D J and Strogatz S.H "Random Graph Models of Social Networks", National
Academy of Sciences of the United States of America, 99(1), 2566-2572. 2002.
[۱۰۹] Chakrabarti D, Faloutsos C and McGlohon M Managing and Mining Graph Data, 69-123 (1 Chapter),
Springer, US, 2010.
[۱۱۰] Guzman jh and Poblete B "On-line Relevant Anomaly Detection in the Twitter Stream: An Efficient Bursty
Keyword Detection Model" ACM SIGKDD Workshop on Outlier Detection and Description, USA, 31-39, 2013.
[۱۱۱] Kaur R and Singh S "A Survey of Data Mining and Social Network Analysis Based Anomaly Detection
Techniques", Egyptian Informatics Journal, 17, 199–216, 2016.
[۱۱۲] Rawat A, Gugnani G, Shastri M and Kumar P "Anomaly Recognition in Online Social Networks",
International Journal of Security and Its Applications, 9(7), 109-118, 2015.
[۱۱۳] Viswanath B, Bashir A B, Crovella M and Guha S "Towards Detecting Anomalous User Behavior in Online
Social Networks" 23rd USENIX Security Symposium, USA, 2014.
29. منابع
[۱۱۴] Egele M, Stringhini G, Kruegel Ch and Vigna G "COMPA : Detecting Compromised Accounts on Social
Networks" 20th Annual Network & Distributed System Security Symposium, USA,2013.
[۱۱۵] Altshuler Y, Fire M, Shmueli E, Elovici E, Bruckstein A, Pentland A and Lazer D "Detecting Anomalous
Behaviors Using Structural Properties of Social Networks", 6th International Conference, 433-440, USA, 2013.
[۱۱۶] Charrad M, Ghazzali N, Boiteau V and Niknafs A "Package NbClust V3.0", The Comprehensive R Archive
Network, 2015.
[۱۱۷] Breunig, M, Kriegel H And Sander J "LOF: Identifying Density-based Local Outliers" ACM SIGMOD
International Conference on Management of Data, 93–104, 2000.
[۱۱۸] Martin E, Hans-Peter K, Jorg S and Xiaowei X "A Density-based Algorithm for Discovering Clusters in
Large Spatial Databases with Noise" Second International Conference on Knowledge Discovery and Data
Mining (KDD-96), 226-231, USA, 1996.
[۱۱۹] David M W "Evaluation: From Precision, Recall and F-Measure to ROC, Informedness, Markedness And
Correlation", Journal of Machine Learning Technologies, 2(1), 37–63, 2011.