%!TEX root = ../../main.tex
\section{APPLICATIONS OF ANOMALY DETECTION}
\label{sec:applicationsOfDLAD}



In this section we discuss several applications of anomaly detection. For each application
domain we discuss the following four aspects:\\
\textemdash the notion of anomaly;\\
\textemdash nature of the data;\\
\textemdash challenges associated with detecting anomalies;\\
\textemdash existing anomaly detection techniques.\\

% \input{sections/applications/intrusionDetection}
% \label{sec:intrusionDetect}

\input{sections/applications/malwareDetection}
\label{sec:malwareDetection}

\input{sections/applications/industrialDamageDetect}
\label{sec:industrialDamageDetect}


\input{sections/applications/videoSurvelliance}
\label{sec:videoSurvelliance}


\input{sections/applications/socialNetworks}
\label{sec:socialNetworks}

% \input{sections/applications/fraudDetection}
% \label{sec:fraudDetection}

\input{sections/applications/logAnomalyDetect}
\label{sec:logAnomaly}


\input{sections/applications/medicalAnomalyDetect}
\label{sec:medicalAnomalyDetect}


\input{sections/applications/iotBigDataAnomaly}
\label{sec:iotBigDataAnomaly}


\input{sections/applications/sensorNetworkAnomalyDetect}
\label{sec:sensorNetworkAnomaly}






