[1]R. Kumaraswamy, A. Wazalwar, T. Khot, J. Shavlik, and S. Natarajan, “Anomaly Detection in Text : The Value of Domain Knowledge,” in Proceedings of the Twenty-Eighth International Florida Artificial Intelligence Research Society Conference Anomaly, 2015, pp. 225–228.
[2]B. S. Kumar and V. Ravi, “A survey of the applications of text mining in financial domain,” Knowledge-Based Syst., vol. 114, pp. 128–147, 2016.
[3]Y. Zhao, Z. Nasrullah, and Z. Li, “PyOD : A Python Toolbox for Scalable Outlier Detection,” J. Mach. Learn. Res., vol. 20, pp. 1–7, 2019.
[4]Y. Yan, L. Cao, C. Kuhlman, and E. Rundensteiner, “Distributed Local Outlier Detection in Big Data,” in KDD ’17 Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017, pp. 1225–1234.
[5]S. Vijayarani et al., “Preprocessing Techniques for Text Mining - An Overview,” Int. J. Comput. Sci. Commun. Networks, vol. 5, no. 1, pp. 7–16, 2015.
[6]J. Allan, V. Lavrenko, D. Malin, and R. Swan, “Detections, Bounds, and Timelines: UMass and TDT–3,” Inf. Retr. Boston., pp. 167–174, 2000.
[7]M. Platakis, D. Kotsakos, and D. Gunopulos, “Searching for events in the blogosphere,” ACM 978–1–60558–487–4/09/04., p. 1225, 2009.
[8]J. Guzman and B. Poblete, “On-line Relevant Anomaly Detection in the Twitter Stream: An Efficient Bursty Keyword Detection Model,” in Proceedings of the ACM SIGKDD Workshop on Outlier Detection and Description - ODD ’13, 2013, pp. 31–39.
[9]E. Schubert, M. Weiler, and H.-P. Kriegel, “SigniTrend: Scalable Detection of Emerging Topics in Textual Streams by Hashed Significance Thresholds,” in Proceedings of the 20th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD ’14, 2014, pp. 871–880.
[10]V. J. Hodge and J. Austin, “A Survey of Outlier Detection Methodologies.,” Artif. Intell. Rev., vol. 22, pp. 85–126, 2004.
[11]Y. Liu et al., “Generative Adversarial Active Learning for Unsupervised Outlier Detection,” IEEE Trans. Knowl. Data Eng., pp. 1–13, 2019.
[12]I. Ben-gal, “Outlier Detection,” in Data Mining and Knowledge Discovery Handbook, 2005, pp. 131–146.
[13]C. Barreyre, L. Boussouf, and B. Cabon, “Statistical Methods for Outlier detection in Space Telemetries,” Sp. Oper. Inspiring Humankind’s Futur., 2019.
[14]X. Qin, L. Cao, E. A. Rundensteiner, and S. Madden, “Scalable Kernel Density Estimation-based Local Outlier Detection over Large Data Streams,” in Proceedings of the 22nd International Conference on Extending Database Technology, 2019.
[15]M. Ester, H. Kriegel, J. Sander, and X. Xu, “A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise,” in KDD–96 Proceedings.
[16]M. M. Breunig et al., “LOF: identifying density-based local outliers,” in Proceedings of the 2000 ACM SIGMOD international conference on Management of data - SIGMOD ’00, 2000, vol. 29, no. 2, pp. 93–104.
[17]A. Rodriguez and A. Laio, “Clustering by fast search and find of density peaks Alex Rodriguez and Alessandro Laio,” Science (80-.)., vol. 1492, 2014.
[18]D. Greene, “Practical Solutions to the Problem of Diagonal Dominance in Kernel Document Clustering,” in ICML ’06 Proceedings of the 23rd international conference on Machine learning, 2006, pp. 377–384.
[19]T. Joachims, “A Probabilistic Analysis of the Rocchio Algorithm with TFIDF for Text Categorization.pdf,” Def. Tech. Inf. Cent., 1996.
[20]M. Oghbaie and M. M. Zanjireh, “Pairwise document similarity measure based on present term set,” J. Big Data, no. February, 2019.
[21]N. S. Altman, “An Introduction to Kernel and Nearest-Neighbour Nonparametric Regression,” Am. Stat., vol. 46, no. 3, pp. 175–185, 1992.
[22]B. Kami and M. Jakubczyk, “A framework for sensitivity analysis of decision trees,” pp. 135–159, 2018.
[23]T. K. Ho, “Random Decision Forests Tin Kam Ho Perceptron training,” Proc. 3rd Int. Conf. Doc. Anal. Recognit., pp. 278–282, 1995.
[24]I. Rish, “An empirical study of the naive Bayes classifier,” Empir. methods Artif. Intell. Work. IJCAI, vol. 22230, no. JANUARY 2001, pp. 41–46, 2001.
[25]J. Han, M. Kamber, and J. Pei, Data Mining concept and techniques, Third Edit. Elsevier, 2012.