پهلوانی، ج.، شیخ محمدی، م.، و تیمورپور، ب. (1403). کشف الگوی ناهنجاری در بازرسیهای پیرو شکایات مردمی با راهکارهای دادهکاوی. نوزدهمین کنفرانس بینالمللی مهندسی صنایع.
تیمورپور، ب.، یادگاری، وحید و فاتحی پیکانی، م. (1399) دادهکاوی با پایتون؛ به همراه تحلیل شبکههای اجتماعی. Olomrayaneh.
حریفی، ر.، نعیمی صدیق، ع.، و مظفری، م. (2022). بخشبندی مشتریان سازمان بنادر و دریانوردی با به کارگیری شبکه عصبی خودسازمانده و الگوریتم K-Means. بررسیهای بازرگانی، 20(114)، 135-154.
https://doi.org/10.22034/bs.2022.254024
سمیعی اشکذری، م.، سلیمانی، غ. و شمس، ک. (2018). تبیین و تحلیل ارزیابی استراتژیهای ورود به بازارهای خارجی (مطالعه موردی: خوشه کاشی و سرامیک استان یزد). بررسیهای بازرگانی، 16(شماره 88-89)، 63-78.
https://barresybazargani.itsr.ir/article_34479.html
غضنفری، م.، علیزاده، س. و تیمورپور، ب. (1384) دادهکاوی و کشف دانش. دانشگاه علم و صنعت ایران.
گودرزی، آتوسا و جنتبابایی، سجاد (1395) «ارزیابی الگوریتمهای درخت تصمیم، بیز ساده و رگرسیون لجستیک در کشف تقلبات بیمه اتومبیل»، پژوهشهای بیمه ای، 2(1)، pp. 61-80.
Available at: https://www.noormags.ir/view/fa/articlepage/ 1428946.
مقیمی، ف. (1402). فعالیت ۳ میلیون واحد صنفی در کشور.
https://www.yjc.ir/00a6IX
منصورفر، غ.، غیور، ف. و لطفی، ب. (1394) «توانایی ماشین بردار پشتیبان در پیشبینی درماندگی مالی»، پژوهشهای تجربی حسابداری، 5(17)، pp. 177-195.
Available at: https://doi.org/https://doi.org/10.22051/jera.2015 .646.
Akpinar, M., Adak, M. F., & Guvenc, G. (2021). SVM-based anomaly detection in remote working: Intelligent software SmartRadar. Applied Soft Computing, 109, 107457. https://doi.org/https://doi.org/10.1016/j.asoc.2021.107457
Alla, S., & Kalyan Adari, S. (2019). Beginning Anomaly Detection Using Python-Based Deep Learning. Apre. https://doi.org/https://doi.org/10.1007/978-1-4842-5177-5
Amezaga Hechavarria, A., & Shafiq, M. O. (2022). A modified attention mechanism powered by Bayesian Network for user activity analysis and prediction. Data & Knowledge Engineering, 140, 102034. https://doi.org/https://doi.org/10.1016/j.datak.2022.102034
Chandola, V., Banerjee, A., & Kumar, V. (2009). Anomaly Detection: A Survey. ACM Comput. Surv., 41. https://doi.org/10.1145/1541880.1541882
Domashova, J., Kripak, E., & Pisarchik, E. (2022). Application of machine learning methods to identify suspicious actions of employees related to violation of the procedures of a credit institution. Procedia Computer Science, 213, 110-118. https://doi.org/https://doi.org/10.1016/j.procs.2022.11.045
Ghazanfari, M., Alizadeh, S., & Teimourpour, B. (2005). *Data mining and knowledge discovery*. Iran University of Science and Technology. [In Persian]
Ginevičius, R. (2011). A New Determining Method for the Criteria Weights in multicriteria Evaluation. International Journal of Information Technology & Decision Making (IJITDM), 10, 1067-1095. https://doi.org/10.1142/S0219622011004713
Goodarzi, A., & Janatbabaei, S. (2016). Evaluation of decision tree, naive Bayes, and logistic regression algorithms in detecting auto insurance fraud. Insurance Research, 2*(1), 61-80. https://www.noormags.ir/view/fa/articlepage/1428946 [In Persian]
Han, R., Kim, K., Choi, B., & Jeong, Y. (2023). A Study on Detection of Malicious Behavior Based on Host Process Data Using Machine Learning. In Applied Sciences (Vol. 13, Issue 7). https://doi.org/10.3390/app13074097
Harifi, R., Naimi-Sadigh, A., & Mozafari, M. (2022). Customer Segmentation of the Ports and Maritime Organization using Self Organization Map and K-Means algorithm. Commercial Reviews, 20*(114), 135-154. https://doi.org/10.22034/bs.2022.254024 [In Persian]
Ianni, M., & Masciari, E. (2023). SCOUT: Security by computing OUTliers on activity logs. Computers & Security, 132, 103355. https://doi.org/https://doi.org/10.1016/j.cose.2023.103355
Jain, M., Kaur, G., & Saxena, V. (2022). A K-Means clustering and SVM based hybrid concept drift detection technique for network anomaly detection. Expert Systems with Applications, 193, 116510. https://doi.org/https://doi.org/10.1016/j.eswa.2022.116510
Khan, S., Parkinson, S., & Murphy, C. (2023). Context-based irregular activity detection in event logs for forensic investigations: An itemset mining approach. Expert Systems with Applications, 233, 120991. https://doi.org/https://doi.org/10.1016/j.eswa.2023.120991
Landauer, M., Onder, S., Skopik, F., & Wurzenberger, M. (2023). Deep learning for anomaly detection in log data: A survey. Machine Learning with Applications, 12, 100470. https://doi.org/https://doi.org/10.1016/j.mlwa.2023.100470
Lee, Y., Kim, J., & Kang, P. (2023). LAnoBERT: System log anomaly detection based on BERT masked language model. Applied Soft Computing, 146, 110689. https://doi.org/https://doi.org/10.1016/j.asoc.2023.110689
Mansourfar, Gh., Ghayour, F., & Lotfi, B. (2015). The Ability of Support Vector Machine (SVM) in Financial Distress Prediction. *Empirical Research in Accounting, 5*(17), 177-195. https://doi.org/10.22051/jera.2015.646 [In Persian]
Moghimi, F. (2023). Activity of 3 million trade units in the country. https://www.yjc.ir/00a6IX [In Persian]
Pahlavani, J., Sheikhmohammadi, M., & Teimourpour, B. (2024). Anomaly detection in inspections on public complaints: a data mining approach. 19th International Conference on Industrial Engineering. [In Persian]
Racherache, B., Shirani, P., Soeanu, A., & Debbabi, M. (2023). CPID: Insider threat detection using profiling and cyber-persona identification. Computers & Security, 132, 103350. https://doi.org/https://doi.org/10.1016/j.cose.2023.103350
Ramírez, J. M., Díez, F., Rojo, P., Mancuso, V., & Fernández-Anta, A. (2023). Explainable machine learning for performance anomaly detection and classification in mobile networks. Computer Communications, 200, 113-131. https://doi.org/https://doi.org/10.1016/j.comcom.2023.01.003
Ranjan, R., & Kumar, S. S. (2022). User behaviour analysis using data analytics and machine learning to predict malicious user versus legitimate user. High-Confidence Computing, 2(1), 100034. https://doi.org/https://doi.org/10.1016/j.hcc.2021.100034
Samiei Ashkezari, M., Soleimani, Gh., & Shams, K. (2018). Assessing the Effectiveness of Foreign Market Entry Strategies (Case Study: Ceramic and Tile Cluster of Yazd). *Commercial Reviews, 16*(88-89), 63-78. https://barresybazargani.itsr.ir/article_34479.html [In Persian]
Soh, C., Yu, S., Narayanan, A., Duraisamy, S., & Chen, L. (2019). Employee profiling via aspect-based sentiment and network for insider threats detection. Expert Systems with Applications, 135, 351-361. https://doi.org/https://doi.org/10.1016/j.eswa.2019.05.043
Teimourpour, B., Yadegari, V., & Fatehi Pikani, M. (2020). Data mining with Python; Along with social network analysis. Olomrayaneh. [In Persian]
Zeufack, V., Kim, D., Seo, D., & Lee, A. (2021). An unsupervised anomaly detection framework for detecting anomalies in real time through network system’s log files analysis. High-Confidence Computing, 1(2), 100030. https://doi.org/https://doi.org/10.1016/j.hcc.2021.100030