Skip to main content

Table 2 Techniques for anomaly detection

From: Anomaly detection for electricity consumption in cloud computing: framework, methods, applications, and challenges

Field

Technology

References

Classification

Bayesian network

Gan and Zhou [32]

 

Support vector machine

Ou et al. [33], Babaei et al. [34]

 

Neural network

Wazid and Das [35]

Nearest neighbor

KNN

Ghezelbash et al. [36]

 

Relative density

Schmutz et al. [37], Krishnaveni et al. [38]

Clustering

Regular clustering

Xiang et al. [39]

 

Co-clustering

Zhai et al. [40]