[1] 王晓华,邹杰,李立,等.基于TBM双层融合架构的航路属性异常检测[J].电子学报,2017,45(3):577-583.(WANG X H,ZOU J,LI L,et al. The anomaly detection based on TBM two-level fusion architecture[J]. Acta Electronica Sinica,2017,45(3):577-583.) [2] 刘炜,刘宏昭.基于结构相似度的管道泄漏检测定位法[J].中南大学学报(自然科学版),2017,48(1):134-140.(LIU W,LIU H Z. Pipeline leak detection and location method based on structural similarity criteria[J].Journal of Central South University (Science and Technology),2017, 48(1):134-140.) [3] 孙梅玉.基于距离和密度的时间序列异常检测方法研究[J].计算机工程与应用,2012,48(20):11-17.(SUN M Y. Research on discords detect on time series based on distance and density[J]. Computer Engineering and Applications, 2012, 48(20):11-17.) [4] 刘千,朱跃龙,张鹏程.基于扩展符号聚集近似的水文时间序列异常挖掘[J].计算机应用研究,2012,29(12):4479-4481.(LIU Q,ZHU Y L,ZHANG P C. Extended symbolic aggregate approximation based anomaly mining of hydrological time series[J]. Application Research of Computers,2012,29(12):4479-4481.) [5] 曾惟如,吴佳,闫飞.基于层级实时记忆算法的时间序列异常检测算法[J].电子学报,2018,46(2):325-332.(ZENG W R,WU J,YAN F. Time series anomaly detection model based on hierarchical temporal memory[J]. Acta Electronica Sinica,2018,46(2):325-332.) [6] 余宇峰,朱跃龙,万定生,等.基于滑动窗口预测的水文时间序列异常检测[J].计算机应用,2014,34(8):2217-2220.(YU Y F,ZHU Y L,WAN D S,et al.Time series outlier detection based on sliding window prediction[J]. Journal of Computer Applications,2014, 34(8):2217-2220.) [7] 李海林,梁叶.基于数值符号和形态特征的时间序列相似性度量方法[J].控制与决策,2017,32(3):451-458.(LI H L,LIANG Y. Similarity measure based on numerical symbolic and shape feature for time series[J].Control and Decision,2017,32(3):451-458.) [8] LIN J, KEOGH E, WEI L, et al. Experiencing SAX:a novel symbolic representation of time series[J]. Data Mining and Knowledge Discovery, 2007, 15(2):107-144. [9] 陈卓,杨炳儒,宋威,等.序列模式挖掘综述[J].计算机应用研究,2008,25(7):1960-1963.(CHEN Z,YANG B R, SONG W, et al. Survey of sequential pattern mining[J]. Application Research of Computers,2008,25(7):1960-1963.) [10] 龚卫华,郭伟鹏, 杨良怀.信任网络中多维信任序列模式挖掘方法研究[J].电子与信息学报,2014,36(8):1810-1816.(GONG W H,GUO W P,YANG L H. Multi-dimensional trust sequential patterns mining algorithm in trust networks[J]. Journal of Electronics & Information Technology,2014,36(8):1810-1816.) [11] HAWKINS D. Identification of Outliers[M]. London:Chapman and Hall, 1980:35-37. [12] 李爱国,覃征. 滑动窗口二次自回归模型预测非线性时间序列[J]. 计算机学报,2004,27(7):1004-1008. (LI A G,TAN Z. Prediction of nonlinear time series by sliding window two autoregressive model[J].Chinese Journal of Computers, 2004,27(7):1004-1008.) [13] MOODY G B. MIT-BIH arrhythmia database directory[EB/OL].[2017-04-10].https://physionet.org/physiobank/database/mitdb/. [14] WILSON H B, RAND D A. Detecting chaos in a noisy time series[J]. Proceedings Biological Sciences, 1993, 253(1338):239-244. [15] KEOGH E, LONARDI S, CHIU W. Finding surprising patterns in a time series database in linear time and space[C]//Proceedings of the 8th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York:ACM, 2003:550-556. [16] 李志华,张海涛,孙雅,等. 非数值属性异常检测算法[M].南昌:江西人民出版社,2015:7-8,195-197.(LI Z H,ZHANG H T,SUN Y,et al.Anomaly Detection Algorithms in Non-Numerrical Data[M].Nanchang:Jiangxi People's Publishing House,2015:7-8,195-197.) [17] 王丽娜,董晓梅,郭晓淳,等.基于数据挖掘的网络数据库入侵检测系统[J].东北大学学报(自然科学版),2003,24(3):225-228.(WANG L N,DONG X M,GUO X C,et al. Research on intrusion detection system for network database based on data mining[J]. Journal of Northeastern University (Natural Science), 2003,24(3):225-228.) |