Skip to main content

Table 2 Techniques for anomaly detection

From: Anomaly detection for electricity consumption in cloud computing: framework, methods, applications, and challenges

Field Technology References
Classification Bayesian network Gan and Zhou [32]
  Support vector machine Ou et al. [33], Babaei et al. [34]
  Neural network Wazid and Das [35]
Nearest neighbor KNN Ghezelbash et al. [36]
  Relative density Schmutz et al. [37], Krishnaveni et al. [38]
Clustering Regular clustering Xiang et al. [39]
  Co-clustering Zhai et al. [40]