%!TEX root = ../main.tex
\section{Applications of Deep Anomaly Detection}
\label{sec:applicationsOfDLAD}

In this section we discuss several applications of deep anomaly detection. For each application
domain we discuss the following four aspects:\\
\textemdash the notion of anomaly;\\
\textemdash nature of the data;\\
\textemdash challenges associated with detecting anomalies;\\
\textemdash existing deep anomaly detection techniques.\\

\input{sections/applications/intrusionDetection}
\label{sec:intrusionDetect}

\input{sections/applications/fraudDetection}
\label{sec:fraudDetection}

\input{sections/applications/malwareDetection}
\label{sec:malwareDetection}

\input{sections/applications/medicalAnomalyDetect}
\label{sec:medicalAnomalyDetect}


\input{sections/applications/socialNetworks}
\label{sec:socialNetworks}


\input{sections/applications/logAnomalyDetect}
\label{sec:logAnomaly}


\input{sections/applications/iotBigDataAnomaly}
\label{sec:iotBigDataAnomaly}

\input{sections/applications/industrialDamageDetect}
\label{sec:industrialDamageDetect}

\input{sections/applications/sensorNetworkAnomalyDetect}
\label{sec:sensorNetworkAnomaly}


\input{sections/applications/videoSurvelliance}
\label{sec:videoSurvelliance}











