$ grep -rni anomaly v2_papers/
v2_papers/2015/zhang_robust.json:212: "anomaly_detection": true,
v2_papers/2015/zhang_robust.json:242: "type": "anomaly_detection",
v2_papers/2006/wright_oninferring.json:128: "anomaly_detection": false,
v2_papers/2006/williams_apreliminary.json:599: "anomaly_detection": false,
v2_papers/2013/fiore_network.json:4: "title": "Network anomaly detection with the restricted Boltzmann machine",
v2_papers/2013/fiore_network.json:86: "main_goal": "anomaly_detection",
v2_papers/2013/fiore_network.json:143: "anomaly_detection": true,
v2_papers/2013/fiore_network.json:151: "type": "anomaly_detection",
v2_papers/2013/fiore_network.json:189: "main_goal": "anomaly_detection",
v2_papers/2013/fiore_network.json:191: "anomaly_detection"
v2_papers/2013/zhang_aneffectivenetwork.json:290: "anomaly_detection": false,
v2_papers/2013/huang_network.json:81: "anomaly_detection": true,
v2_papers/2013/huang_network.json:134: "main_goal": "anomaly_detection",
v2_papers/2013/zhang_network.json:291: "anomaly_detection": false,
v2_papers/2013/jadidi_flow.json:4: "title": "Flow-Based Anomaly Detection Using Neural Network Optimized with GSA Algorithm",
v2_papers/2013/jadidi_flow.json:74: "main_goal": "anomaly_detection",
v2_papers/2013/jadidi_flow.json:99: "anomaly_detection": false,
v2_papers/2013/jadidi_flow.json:107: "type": "anomaly_detection",
v2_papers/2013/jadidi_flow.json:145: "main_goal": "anomaly_detection",
v2_papers/2013/jadidi_flow.json:147: "anomaly_detection"
v2_papers/2014/ma_ddos.json:64: "main_goal": "anomaly_detection",
v2_papers/2014/ma_ddos.json:88: "anomaly_detection": true,
v2_papers/2014/ma_ddos.json:96: "type": "anomaly_detection",
v2_papers/2014/ma_ddos.json:133: "main_goal": "anomaly_detection",
v2_papers/2014/ma_ddos.json:135: "anomaly_detection"
v2_papers/2016/iglesias_time-activity.json:192: "anomaly_detection": true,
v2_papers/2016/iglesias_time-activity.json:228: "type": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:126: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:160: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:200: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:240: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:272: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:305: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:343: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:386: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:423: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:453: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:474: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:504: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:526: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:553: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:587: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:625: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:659: "anomaly_detection": false,
v2_papers/2016/ambusaidi_building.json:725: "main_goal": "anomaly_detection",
v2_papers/2016/ambusaidi_building.json:727: "anomaly_detection",
v2_papers/2016/javaid_adeep.json:123: "anomaly_detection": false,
v2_papers/2016/javaid_adeep.json:195: "main_goal": "anomaly_detection",
v2_papers/2016/javaid_adeep.json:197: "anomaly_detection",
v2_papers/2016/mishra_nvcloudids.json:83: "main_goal": "anomaly_detection",
v2_papers/2016/mishra_nvcloudids.json:181: "anomaly_detection": false,
v2_papers/2016/mishra_nvcloudids.json:254: "main_goal": "anomaly_detection",
v2_papers/2016/mishra_nvcloudids.json:256: "anomaly_detection"
v2_papers/2016/gharaee_anew.json:93: "anomaly_detection": false,
v2_papers/2016/gharaee_anew.json:168: "main_goal": "anomaly_detection",
v2_papers/2016/gharaee_anew.json:171: "anomaly_detection"
v2_papers/2002/barford_signal.json:254: "anomaly_detection": true,
v2_papers/2002/barford_signal.json:299: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:61: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:241: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:418: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:456: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:499: "anomaly_detection": true,
v2_papers/2018/mirsky_kitsune.json:515: "type": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:546: "type": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:553: "type": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:561: "type": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:630: "main_goal": "anomaly_detection",
v2_papers/2018/mirsky_kitsune.json:632: "anomaly_detection"
v2_papers/2012/zhang_feature.json:260: "anomaly_detection": false,
v2_papers/2012/bujlow_amethod.json:556: "anomaly_detection": false,
v2_papers/2012/yin_network.json:113: "anomaly_detection": false,
v2_papers/2012/zhang_unsupervised.json:247: "anomaly_detection": false,
v2_papers/2012/nguyen_timely.json:193: "anomaly_detection": false,
v2_papers/2012/agarwal_hybrid.json:4: "title": "Hybrid Approach for Detection of Anomaly Network Traffic using Data Mining Techniques",
v2_papers/2012/agarwal_hybrid.json:66: "main_goal": "anomaly_detection",
v2_papers/2012/agarwal_hybrid.json:184: "main_goal": "anomaly_detection",
v2_papers/2012/agarwal_hybrid.json:233: "anomaly_detection": true,
v2_papers/2012/agarwal_hybrid.json:250: "type": "anomaly_detection",
v2_papers/2012/agarwal_hybrid.json:280: "main_goal": "anomaly_detection",
v2_papers/2012/agarwal_hybrid.json:282: "anomaly_detection"
v2_papers/2012/catania_anautonomous.json:4: "title": "An autonomous labeling approach to support vector machines algorithms for network traffic anomaly detection",
v2_papers/2012/catania_anautonomous.json:150: "anomaly_detection": false,
v2_papers/2012/catania_anautonomous.json:228: "main_goal": "anomaly_detection",
v2_papers/2012/catania_anautonomous.json:230: "anomaly_detection",
v2_papers/2012/jin_modular.json:273: "anomaly_detection": false,
v2_papers/2017/taylor_robust.json:557: "anomaly_detection": false,
v2_papers/2017/ashfaq_fuzziness.json:63: "anomaly_detection": false,
v2_papers/2017/ashfaq_fuzziness.json:109: "main_goal": "anomaly_detection",
v2_papers/2017/ashfaq_fuzziness.json:111: "anomaly_detection"
v2_papers/2017/iglesias_pattern-discovery.json:308: "anomaly_detection": true,
v2_papers/2017/iglesias_pattern-discovery.json:377: "type": "anomaly_detection",
v2_papers/2010/zeidanloo_botnet.json:86: "anomaly_detection": true,
v2_papers/2010/dewaele_unsupervised.json:243: "anomaly_detection": false,
v2_papers/2010/shrivastav_network.json:123: "anomaly_detection": false,
v2_papers/2008/gu_botminer.json:1286: "anomaly_detection": false,
v2_papers/2008/dainotti_classification.json:129: "anomaly_detection": false,
v2_papers/2008/zhao_realtime.json:229: "anomaly_detection": false,
v2_papers/2008/nychis_anempirical.json:4: "title": "An empirical evaluation of entropy-based traffic anomaly detection",
v2_papers/2008/nychis_anempirical.json:123: "main_goal": "anomaly_detection",
v2_papers/2008/nychis_anempirical.json:151: "anomaly_detection": true,
v2_papers/2008/nychis_anempirical.json:159: "type": "anomaly_detection",
v2_papers/2008/nychis_anempirical.json:166: "name": "Entropy-based Traffic Anomaly Detection",
v2_papers/2008/nychis_anempirical.json:169: "type": "anomaly_detection",
v2_papers/2008/nychis_anempirical.json:195: "main_goal": "anomaly_detection",
v2_papers/2008/yang_ap2pnetwork.json:275: "anomaly_detection": false,
v2_papers/2007/ermann_identifying.json:112: "anomaly_detection": false,
v2_papers/2007/ringberg_sensitivity.json:4: "title": "Sensitivity of PCA for traffic anomaly detection",
v2_papers/2007/ringberg_sensitivity.json:280: "anomaly_detection": false,
v2_papers/2007/ringberg_sensitivity.json:287: "type": "anomaly_detection",
v2_papers/2007/ringberg_sensitivity.json:315: "main_goal": "anomaly_detection",
v2_papers/2007/ermann_offline.json:244: "anomaly_detection": false,
v2_papers/2007/auld_bayesian.json:376: "anomaly_detection": false,
v2_papers/2007/liu_network.json:260: "anomaly_detection": false,
v2_papers/2007/crotti_traffic.json:88: "anomaly_detection": false,
v2_papers/2009/este_support.json:176: "anomaly_detection": false,
v2_papers/2009/alshammari_machine.json:322: "anomaly_detection": false,
v2_papers/2009/zhani_analysis.json:357: "anomaly_detection": false,
v2_papers/2005/thottan_anomaly.json:4: "title": "Anomaly Detection in IP Networks",
v2_papers/2005/thottan_anomaly.json:69: "main_goal": "anomaly_detection",
v2_papers/2005/thottan_anomaly.json:84: "anomaly_detection": true,
v2_papers/2005/thottan_anomaly.json:92: "type": "anomaly_detection",
v2_papers/2005/thottan_anomaly.json:138: "main_goal": "anomaly_detection",
v2_papers/2005/moore_internet.json:321: "anomaly_detection": false,
v2_papers/2005/lakhina_mining.json:110: "main_goal": "anomaly_detection",
v2_papers/2005/lakhina_mining.json:218: "anomaly_detection": true,
v2_papers/2005/lakhina_mining.json:226: "type": "anomaly_detection",
v2_papers/2005/lakhina_mining.json:294: "main_goal": "anomaly_detection",
v2_papers/2005/lakhina_mining.json:296: "anomaly_detection",
v2_papers/2005/gu_detecting.json:64: "main_goal": "anomaly_detection",
v2_papers/2005/gu_detecting.json:90: "anomaly_detection": true,
v2_papers/2005/gu_detecting.json:98: "type": "anomaly_detection",
v2_papers/2005/gu_detecting.json:119: "main_goal": "anomaly_detection",
v2_papers/2005/karagiannis_blinc.json:135: "anomaly_detection": false,