<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.4 20241031//EN"
        "https://jats.nlm.nih.gov/publishing/1.4/JATS-journalpublishing1-4.dtd">
<article  article-type="research-article"        dtd-version="1.4">
            <front>

                <journal-meta>
                                    <journal-id></journal-id>
            <journal-title-group>
                                                                                    <journal-title>Mugla Journal of Science and Technology</journal-title>
            </journal-title-group>
                            <issn pub-type="ppub">2149-3596</issn>
                                                                                                        <publisher>
                    <publisher-name>Muğla Sıtkı Koçman Üniversitesi</publisher-name>
                </publisher>
                    </journal-meta>
                <article-meta>
                                        <article-id pub-id-type="doi">10.22531/muglajsci.1252876</article-id>
                                                                <article-categories>
                                            <subj-group  xml:lang="en">
                                                            <subject>Engineering</subject>
                                                    </subj-group>
                                            <subj-group  xml:lang="tr">
                                                            <subject>Mühendislik</subject>
                                                    </subj-group>
                                    </article-categories>
                                                                                                                                                        <title-group>
                                                                                                                                                            <article-title>THE ADJUSTED HISTOGRAM-BASED OUTLIER SCORE - AHBOS</article-title>
                                                                                                    </title-group>
            
                                                    <contrib-group content-type="authors">
                                                                        <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0003-1387-6661</contrib-id>
                                                                <name>
                                    <surname>Binzat</surname>
                                    <given-names>Uğur</given-names>
                                </name>
                                                                    <aff>DOKUZ EYLÜL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                    <contrib contrib-type="author">
                                                                    <contrib-id contrib-id-type="orcid">
                                        https://orcid.org/0000-0002-7617-4934</contrib-id>
                                                                <name>
                                    <surname>Yıldıztepe</surname>
                                    <given-names>Engin</given-names>
                                </name>
                                                                    <aff>DOKUZ EYLÜL ÜNİVERSİTESİ</aff>
                                                            </contrib>
                                                                                </contrib-group>
                        
                                        <pub-date pub-type="pub" iso-8601-date="20230630">
                    <day>06</day>
                    <month>30</month>
                    <year>2023</year>
                </pub-date>
                                        <volume>9</volume>
                                        <issue>1</issue>
                                        <fpage>92</fpage>
                                        <lpage>100</lpage>
                        
                        <history>
                                    <date date-type="received" iso-8601-date="20230221">
                        <day>02</day>
                        <month>21</month>
                        <year>2023</year>
                    </date>
                                                    <date date-type="accepted" iso-8601-date="20230625">
                        <day>06</day>
                        <month>25</month>
                        <year>2023</year>
                    </date>
                            </history>
                                        <permissions>
                    <copyright-statement>Copyright © 2015, Mugla Journal of Science and Technology</copyright-statement>
                    <copyright-year>2015</copyright-year>
                    <copyright-holder>Mugla Journal of Science and Technology</copyright-holder>
                </permissions>
            
                                                                                                                        <abstract><p>Histogram is a commonly used tool for visualizing data distribution. It has also been used in semi-supervised and unsupervised anomaly detection tasks. The histogram-based outlier score is a fast unsupervised anomaly detection method that has become more popular because of the rapid increase in the amount of data collected in recent decades. Histogram-based outlier score can be computed using either static or dynamic bin-width histograms. When a histogram contains large gaps, the dynamic bin-width approach is preferred over the static bin-width approach. These gaps in a histogram usually occur as a result of various distributions in real data. When working with a static bin-width histogram, gaps can be utilized to acquire better distinction between outliers and inliers. In this study, we propose an adjusted version of the histogram-based outlier score named adjusted histogram-based outlier score, which considers neighboring bins prior to density estimation. Results from a simulation study and real data application indicate that the adjusted histogram-based outlier score yields a better performance not only in the simulated data but also for various types of real data.</p></abstract>
                                                            
            
                                                                                        <kwd-group>
                                                    <kwd>unsupervised anomaly detection</kwd>
                                                    <kwd>  outlier</kwd>
                                                    <kwd>  histogram</kwd>
                                                    <kwd>  density estimation</kwd>
                                            </kwd-group>
                            
                                                <kwd-group xml:lang="tr">
                                                    <kwd>unsupervised anomaly detection</kwd>
                                                    <kwd>  outlier</kwd>
                                                    <kwd>  histogram</kwd>
                                                    <kwd>  density estimation</kwd>
                                            </kwd-group>
                                                                                                                                        </article-meta>
    </front>
    <back>
                            <ref-list>
                                    <ref id="ref1">
                        <label>1</label>
                        <mixed-citation publication-type="journal">Chandola, V., Banerjee, A., and Kumar, V., “Anomaly Detection: a Survey”, ACM Computing Surveys (CSUR), 41(3), 1-58, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref2">
                        <label>2</label>
                        <mixed-citation publication-type="journal">Anscombe, F. J., “Rejection of Outliers”, Technometrics, 2(2), 123-146, 1960.</mixed-citation>
                    </ref>
                                    <ref id="ref3">
                        <label>3</label>
                        <mixed-citation publication-type="journal">Grubbs, F. E., “Procedures for Detecting Outlying Observations in Sample”, Technometrics, 11(1), 1-21, 1969.</mixed-citation>
                    </ref>
                                    <ref id="ref4">
                        <label>4</label>
                        <mixed-citation publication-type="journal">Hawkins, D. M., Identification of Outliers, London: Chapman and Hall, 1980.</mixed-citation>
                    </ref>
                                    <ref id="ref5">
                        <label>5</label>
                        <mixed-citation publication-type="journal">Breunig, M. M., Kriegel, H. P., Ng, R. T. and Sander, J., “LOF: Identifying Density Based Local Outlier”, In Proceedings of the 2000 ACM SIGMOD International Conference on Management of data, 2000, 93-104.</mixed-citation>
                    </ref>
                                    <ref id="ref6">
                        <label>6</label>
                        <mixed-citation publication-type="journal">Hodge, V. and Austin, J., “A survey of Outlier Detection methodologies”, Artificial Intelligence Review, 22, 85-126, 2004.</mixed-citation>
                    </ref>
                                    <ref id="ref7">
                        <label>7</label>
                        <mixed-citation publication-type="journal">Goldstein, M. and Uchida, S., “A Comparative Evaluation of Unsupervised Anomaly Detection Algorithms for Multivariate Data”, PloS One, 11(4), 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref8">
                        <label>8</label>
                        <mixed-citation publication-type="journal">Zoppi, T., Ceccarelli, A., Puccetti, T. and Bondavalli, A., “Which Algorithm Can Detect Unknown Attacks? Comparison of Supervised, Unsupervised and Meta-Learning Algorithms for Intrusion Detection”, Computers &amp; Security, 127, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref9">
                        <label>9</label>
                        <mixed-citation publication-type="journal">Kind, A., Stoecklin, M. P. and Dimitropoulos, X., “Histogram-Based Traffic Anomaly Detection”, IEEE Transactions on Network and Service Management, 6(2), 110-121, 2009.</mixed-citation>
                    </ref>
                                    <ref id="ref10">
                        <label>10</label>
                        <mixed-citation publication-type="journal">Sabau, A. S., “Survey of Clustering Based Financial Fraud Detection Research”, Informatica Economica, 16(1), 110, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref11">
                        <label>11</label>
                        <mixed-citation publication-type="journal">Xie, M., Hu, J. and Tian, B., “Histogram-Based Online Anomaly Detection in Hierarchical Wireless Sensor Network”, In 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing And Communications, 2012. 751-759.</mixed-citation>
                    </ref>
                                    <ref id="ref12">
                        <label>12</label>
                        <mixed-citation publication-type="journal">Sharma, A., Pujari, A. K. and Paliwal, K. K., “Intrusion Detection Using Text Processing Techniques with a Kernel Based Similarity Measure”, Computers &amp; Security, 26(7-8), 488-495, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref13">
                        <label>13</label>
                        <mixed-citation publication-type="journal">Carminati, M., Polino, M., Continella, A., Lanzi, A., Maggi, F. and Zanero, S., “Security Evaluation of a Banking Fraud Analysis System”, ACM Transactions on Privacy and Security (TOPS), 21(3), 1-31, 2018.</mixed-citation>
                    </ref>
                                    <ref id="ref14">
                        <label>14</label>
                        <mixed-citation publication-type="journal">Munir, M., Chattha, M. A., Dengel, A. and Ahmed, S., “A Comparative Analysis of Traditional and Deep Learning-Based Anomaly Detection Methods For Streaming Data”, In 2019 18th IEEE International Conference On Machine Learning and Applications (ICMLA), 2019, 561-566.</mixed-citation>
                    </ref>
                                    <ref id="ref15">
                        <label>15</label>
                        <mixed-citation publication-type="journal">Goldstein, M. and Dengel, A., “Histogram-Based Outlier Score (HBOS): A Fast Unsupervised Anomaly Detection Algorithm”, KI-2012: Poster and Demo Track, 59-63, 2012.</mixed-citation>
                    </ref>
                                    <ref id="ref16">
                        <label>16</label>
                        <mixed-citation publication-type="journal">Saba-Sadiya, S., Chantland, E., Alhanai, T., Liu, T. and Ghassemi, M. M., “Unsupervised EEG Artifact Detection and Correction”, Frontiers in Digital Health, 2, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref17">
                        <label>17</label>
                        <mixed-citation publication-type="journal">Han, S., Hu, X., Huang, H., Jiang, M. and Zhao, Y., “Adbench: Anomaly Detection Benchmark.”, Advances in Neural Information Processing Systems, 35, 32142-32159, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref18">
                        <label>18</label>
                        <mixed-citation publication-type="journal">Dobos, D., Nguyen, T. T., Dang, T., Wilson, A., Corbett, H., McCall, J. and Stockton, P., “A Comparative Study of Anomaly Detection Methods for Gross Error Detection Problems”, Computers &amp; Chemical Engineering, 175, 2023.</mixed-citation>
                    </ref>
                                    <ref id="ref19">
                        <label>19</label>
                        <mixed-citation publication-type="journal">Paulauskas, N. and Baskys, A., “Application of Histogram-Based Outlier Scores to Detect Computer Network Anomalies”, Electronics, 8(11), 1251, 2019.</mixed-citation>
                    </ref>
                                    <ref id="ref20">
                        <label>20</label>
                        <mixed-citation publication-type="journal">Wand, M. P., “Data-Based Choice of Histogram Bin Width”, The American Statistician, 51(1), 59-64, 1997.</mixed-citation>
                    </ref>
                                    <ref id="ref21">
                        <label>21</label>
                        <mixed-citation publication-type="journal">Sturges, H. A., “The Choice of a Class Interval”, Journal of the American Statistical Association, 21(153), 65-66, 1926.</mixed-citation>
                    </ref>
                                    <ref id="ref22">
                        <label>22</label>
                        <mixed-citation publication-type="journal">R Core Team, R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria. URL https://www.R-project.org/, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref23">
                        <label>23</label>
                        <mixed-citation publication-type="journal">Scott, D. W., “On Optimal and Data-Based Histograms”, Biometrika, 66(3), 605-610, 1979.</mixed-citation>
                    </ref>
                                    <ref id="ref24">
                        <label>24</label>
                        <mixed-citation publication-type="journal">Freedman, D. and Diaconis, P., “On the Histogram as a Density Estimator: L2 Theory”, Zeitschrift für Wahrscheinlichkeitstheorie und Verwandte Gebiete, 57(4), 453-476, 1981.</mixed-citation>
                    </ref>
                                    <ref id="ref25">
                        <label>25</label>
                        <mixed-citation publication-type="journal">Venables, W. N. and Ripley, B. D., In Modern Applied Statistics with S, Springer, New York, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref26">
                        <label>26</label>
                        <mixed-citation publication-type="journal">Shimazaki, H. and Shinomoto, S., “A Method for Selecting the Bin Size of a Time Histogram”, Neural Computation, 19(6), 1503-1527, 2007.</mixed-citation>
                    </ref>
                                    <ref id="ref27">
                        <label>27</label>
                        <mixed-citation publication-type="journal">Wilkinson, L., “Visualizing Big Data Outliers Through Distributed Aggregation”, IEEE Transactions on Visualization and Computer Graphics, 24(1), 256-266, 2017.</mixed-citation>
                    </ref>
                                    <ref id="ref28">
                        <label>28</label>
                        <mixed-citation publication-type="journal">Provost, F. J., Fawcett, T. and Kohavi, R., “The Case Against Accuracy Estimation for Comparing Induction Algorithms”, In ICML, 1998, 445-453.</mixed-citation>
                    </ref>
                                    <ref id="ref29">
                        <label>29</label>
                        <mixed-citation publication-type="journal">Davis, J. and Goadrich, M., “The Relationship Between Precision-Recall and ROC Curves”, In Proceedings of the 23rd International Conference on Machine Learning, 2006, 233-240.</mixed-citation>
                    </ref>
                                    <ref id="ref30">
                        <label>30</label>
                        <mixed-citation publication-type="journal">Friedman, M., “The Use of Ranks to Avoid the Assumption of Normality Implicit in the Analysis of Variance”, Journal of the American Statistical Association, 32(200), 675-701, 1937.</mixed-citation>
                    </ref>
                                    <ref id="ref31">
                        <label>31</label>
                        <mixed-citation publication-type="journal">Friedman, M., “A Comparison of Alternative Tests of Significance for the Problem of M Rankings”, The Annals of Mathematical Statistics, 11(1), 86-92, 1940.</mixed-citation>
                    </ref>
                                    <ref id="ref32">
                        <label>32</label>
                        <mixed-citation publication-type="journal">Nemenyi, P. B., Distribution-Free Multiple Comparisons, PhD Thesis, Princeton University, 1963.</mixed-citation>
                    </ref>
                                    <ref id="ref33">
                        <label>33</label>
                        <mixed-citation publication-type="journal">Demšar, J., “Statistical Comparisons of Classifiers Over Multiple Data Sets”, The Journal of Machine Learning Research, 7, 1-30, 2006.</mixed-citation>
                    </ref>
                                    <ref id="ref34">
                        <label>34</label>
                        <mixed-citation publication-type="journal">Thiele, C. and Hirschfeld, G.,&quot;Cutpointr: Improved Estimation and Validation of Optimal   Cutpoints In R.&quot;, Journal of Statistical Software, 98(11), 1-27, 2021.</mixed-citation>
                    </ref>
                                    <ref id="ref35">
                        <label>35</label>
                        <mixed-citation publication-type="journal">Yan, Y., MLmetrics: Machine Learning Evaluation Metrics. R package version 1.1.1, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref36">
                        <label>36</label>
                        <mixed-citation publication-type="journal">Ligges, U. and Mächler, M., Scatterplot3d an R Package for Visualizing Multivariate Data. Technical Report, 2002.</mixed-citation>
                    </ref>
                                    <ref id="ref37">
                        <label>37</label>
                        <mixed-citation publication-type="journal">Pohlert, T., PMCMRplus: Calculate Pairwise Multiple Comparisons of Mean Rank Sums Extended, 2022.</mixed-citation>
                    </ref>
                                    <ref id="ref38">
                        <label>38</label>
                        <mixed-citation publication-type="journal">Campos, G. O., Zimek, A., Sander, J., Campello, R. J., Micenková, B., Schubert, E., Assent, I. and Houle, M. E., “On the Evaluation of Unsupervised Outlier Detection: Measures, Datasets, and an Empirical Study”, Data Mining and Knowledge Discovery, 30(4), 891-927, 2016.</mixed-citation>
                    </ref>
                                    <ref id="ref39">
                        <label>39</label>
                        <mixed-citation publication-type="journal">Goldstein, M., Unsupervised Anomaly Detection Benchmark. Harvard Dataverse, 2015. doi: 10.7910/DVN/OPQMVF.</mixed-citation>
                    </ref>
                                    <ref id="ref40">
                        <label>40</label>
                        <mixed-citation publication-type="journal">Rayana, S., ODDS Library [http://odds.cs.stonybrook.edu]. Stony Brook, NY: Stony Brook University, Department of Computer Science, 2016.</mixed-citation>
                    </ref>
                            </ref-list>
                    </back>
    </article>
