Message importance measure (MIM) is applicable to characterize the importance of information in the scenario of big data, similar to entropy in information theory. In fact, MIM with a variable parameter can make an effect on the characterization of distribution. Further... View more
 W. Lee and S. J. Stolfo. “Data Mining Approaches for Intrusion Detection,” in Proc. Usenix security, San Antonio, USA, Jan. 1998, pp. 291-300.
 K. Julisch, and M. Dacier. “Mining intrusion detection alarms for actionable knowledge,” In Proc. Acm International Conference on Knowledge Discovery & Data Mining, New York, USA, 2002, pp. 366-375.
 S. Wang. “A comprehensive survey of data mining-based accountingfraud detection research,” In Proc. IEEE Intelligent Computation Technology and Automation (ICICTA), Madurai, India, May 2010, pp. 50-53.
 S. Ramaswamy, R. Rastogi, and K. Shim. “Efficient algorithms for mining outliers from large data sets,” ACM SIGMOD Record, Vol. 29, No. 2, pp. 427-438, May 2000.
 V. Chandola, A. Banerjee, and V. Kumar. “Anomaly detection: A survey,” ACM computing surveys (CSUR), Vol.41, No.3, pp. 15, July 2009.
 W. Lee, and D Xiang. “Information-theoretic measures for anomaly detection,” In Proc. IEEE Symposium on Security and Privacy 2001, Oakland, USA, May 2001, pp. 130-143.
 S. Ando, and E Suzuki. “An information theoretic approach to detection of minority subsets in database,” In Proc. IEEE Sixth International Conference on Data Mining, Hong Kong, China, Dec. 2006, pp. 11-20.
 T. M. Cover, and Joy A. Thomas. Elements of information theory 2nd edition, Wiley Series in Telecommunications and Signal Processing, Wiley InterScience, 2006.
 P. Y. Fan, et al. “Message Importance Measure and Its Application to Minority Subset Detection in Big Data,” In Proc. IEEE Global Communications Conference (GLOBECOM), Washington D.C., USA, Dec. 2016.