{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T21:18:14Z","timestamp":1726003094781},"publisher-location":"Cham","reference-count":16,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030053444"},{"type":"electronic","value":"9783030053451"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-05345-1_18","type":"book-chapter","created":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:07:56Z","timestamp":1544173676000},"page":"219-228","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Risk Identification-Based Association Rule Mining for Supply Chain Big Data"],"prefix":"10.1007","author":[{"given":"Abdullah","family":"Salamai","sequence":"first","affiliation":[]},{"given":"Morteza","family":"Saberi","sequence":"additional","affiliation":[]},{"given":"Omar","family":"Hussain","sequence":"additional","affiliation":[]},{"given":"Elizabeth","family":"Chang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,12,7]]},"reference":[{"issue":"16","key":"18_CR1","doi-asserted-by":"publisher","first-page":"5031","DOI":"10.1080\/00207543.2015.1030467","volume":"53","author":"W Ho","year":"2015","unstructured":"Ho, W., et al.: Supply chain risk management: a literature review. Int. J. Prod. Res. 53(16), 5031\u20135069 (2015)","journal-title":"Int. J. Prod. Res."},{"key":"18_CR2","doi-asserted-by":"publisher","first-page":"455","DOI":"10.1016\/j.ijpe.2015.06.032","volume":"171","author":"M Giannakis","year":"2016","unstructured":"Giannakis, M., Papadopoulos, T.: Supply chain sustainability: a risk management approach. Int. J. Prod. Econ. 171, 455\u2013470 (2016)","journal-title":"Int. J. Prod. Econ."},{"issue":"7","key":"18_CR3","doi-asserted-by":"publisher","first-page":"2186","DOI":"10.1080\/00207543.2012.727490","volume":"51","author":"J Chen","year":"2013","unstructured":"Chen, J., Sohal, A.S., Prajogo, D.I.: Supply chain operational risk mitigation: a collaborative approach. Int. J. Prod. Res. 51(7), 2186\u20132199 (2013)","journal-title":"Int. J. Prod. Res."},{"key":"18_CR4","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1016\/j.ijpe.2013.02.028","volume":"147","author":"C Blome","year":"2014","unstructured":"Blome, C., Schoenherr, T., Eckstein, D.: The impact of knowledge transfer and complexity on supply chain flexibility: a knowledge-based view. Int. J. Prod. Econ. 147, 307\u2013316 (2014)","journal-title":"Int. J. Prod. Econ."},{"key":"18_CR5","doi-asserted-by":"publisher","first-page":"663","DOI":"10.1016\/j.jclepro.2016.04.040","volume":"142","author":"K-J Wu","year":"2017","unstructured":"Wu, K.-J., et al.: Toward sustainability: using big data to explore the decisive attributes of supply chain risks and uncertainties. J. Clean. Prod. 142, 663\u2013676 (2017)","journal-title":"J. Clean. Prod."},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: ACM SIGMOD Record. ACM (1993)","DOI":"10.1145\/170035.170072"},{"key":"18_CR7","unstructured":"Moustafa, N., Slay, J.: A hybrid feature selection for network intrusion detection systems: central points. arXiv preprint \narXiv:1707.05505\n\n (2017)"},{"issue":"4","key":"18_CR8","doi-asserted-by":"publisher","first-page":"534","DOI":"10.1504\/IJLSM.2016.075212","volume":"23","author":"F Duhamel","year":"2016","unstructured":"Duhamel, F., Carbone, V., Moatti, V.: The impact of internal and external collaboration on the performance of supply chain risk management. Int. J. Logist. Syst. Manag. 23(4), 534\u2013557 (2016)","journal-title":"Int. J. Logist. Syst. Manag."},{"key":"18_CR9","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/978-3-319-59758-4_38","volume-title":"Artificial Intelligence in Medicine","author":"Michiel C. Meulendijk","year":"2017","unstructured":"Meulendijk, M.C., Spruit, M.R., Brinkkemper, S.: Risk Mediation in Association Rules: Application Examples. Utrecht University, UU-CS-2017-004 (2017)"},{"issue":"1","key":"18_CR10","first-page":"358","volume":"40","author":"A Haery","year":"2008","unstructured":"Haery, A., et al.: Application of association rule mining in supplier selection criteria. World Acad. Sci. Eng. Technol. 40(1), 358\u2013362 (2008)","journal-title":"World Acad. Sci. Eng. Technol."},{"key":"18_CR11","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1016\/j.omega.2014.10.004","volume":"52","author":"I Heckmann","year":"2015","unstructured":"Heckmann, I., Comes, T., Nickel, S.: A critical review on supply chain risk\u2014definition, measure and modeling. Omega 52, 119\u2013132 (2015)","journal-title":"Omega"},{"issue":"22","key":"18_CR12","doi-asserted-by":"publisher","first-page":"6868","DOI":"10.1080\/00207543.2014.910620","volume":"53","author":"DA Rangel","year":"2015","unstructured":"Rangel, D.A., de Oliveira, T.K., Leite, M.S.A.: Supply chain risk classification: discussion and proposal. Int. J. Prod. Res. 53(22), 6868\u20136887 (2015)","journal-title":"Int. J. Prod. Res."},{"issue":"1","key":"18_CR13","first-page":"16","volume":"69","author":"A McGregor","year":"2017","unstructured":"McGregor, A., Smit, J.: Risk management: human rights due diligence in corporate global supply chains. Gov. Dir. 69(1), 16 (2017)","journal-title":"Gov. Dir."},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Zhang, F., Wei, F.-J., Tian, S.: Analysis of delay risk factors for the delivery of suppliers based on association rules. In: 2014 11th International Computer Conference on the Wavelet Active Media Technology and Information Processing (ICCWAMTIP) (2014)","DOI":"10.1109\/ICCWAMTIP.2014.7073423"},{"issue":"3","key":"18_CR15","first-page":"15","volume":"4","author":"A Ganguly","year":"2017","unstructured":"Ganguly, A., Chatterjee, D., Rao, H.V.: Evaluating the risks associated with supply chain agility of an enterprise. Int. J. Bus. Anal. IJBAN 4(3), 15\u201334 (2017)","journal-title":"Int. J. Bus. Anal. IJBAN"},{"key":"18_CR16","series-title":"Data Analytics","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1007\/978-3-319-59439-2_5","volume-title":"Data Analytics and Decision Support for Cybersecurity","author":"N Moustafa","year":"2017","unstructured":"Moustafa, N., Creech, G., Slay, J.: Big data analytics for intrusion detection system: statistical decision-making using finite Dirichlet mixture models. In: Palomares Carrascosa, I., Kalutarage, H.K., Huang, Y. (eds.) Data Analytics and Decision Support for Cybersecurity. DA, pp. 127\u2013156. Springer, Cham (2017). \nhttps:\/\/doi.org\/10.1007\/978-3-319-59439-2_5"}],"container-title":["Lecture Notes in Computer Science","Security, Privacy, and Anonymity in Computation, Communication, and Storage"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-05345-1_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2018,12,7]],"date-time":"2018-12-07T09:16:58Z","timestamp":1544174218000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-05345-1_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030053444","9783030053451"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-05345-1_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"SpaCCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security, Privacy and Anonymity in Computation, Communication and Storage","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Melbourne, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"spaccs2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/space2018.cse.iitk.ac.in\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}