{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T19:48:21Z","timestamp":1775504901073,"version":"3.50.1"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030109240","type":"print"},{"value":"9783030109257","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-10925-7_5","type":"book-chapter","created":{"date-parts":[[2019,1,17]],"date-time":"2019-01-17T15:47:28Z","timestamp":1547740048000},"page":"71-86","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["GridWatch: Sensor Placement and Anomaly Detection in the Electrical Grid"],"prefix":"10.1007","author":[{"given":"Bryan","family":"Hooi","sequence":"first","affiliation":[]},{"given":"Dhivya","family":"Eswaran","sequence":"additional","affiliation":[]},{"given":"Hyun Ah","family":"Song","sequence":"additional","affiliation":[]},{"given":"Amritanshu","family":"Pandey","sequence":"additional","affiliation":[]},{"given":"Marko","family":"Jereminov","sequence":"additional","affiliation":[]},{"given":"Larry","family":"Pileggi","sequence":"additional","affiliation":[]},{"given":"Christos","family":"Faloutsos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,1,18]]},"reference":[{"key":"5_CR1","unstructured":"IEEE power systems test case archive. http:\/\/www2.ee.washington.edu\/research\/pstca\/. Accessed 15 Mar 2017"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C., Zhao, Y., Philip, S.Y.: Outlier detection in graph streams. In: 2011 IEEE 27th International Conference on Data Engineering (ICDE), pp. 399\u2013409. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767885"},{"key":"5_CR3","unstructured":"Akoglu, L., Faloutsos, C.: Event detection in time series of mobile communication graphs. In: Army Science Conference, pp. 77\u201379 (2010)"},{"key":"5_CR4","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/978-3-642-13672-6_40","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"L Akoglu","year":"2010","unstructured":"Akoglu, L., McGlohon, M., Faloutsos, C.: Oddball: spotting anomalies in weighted graphs. In: Zaki, M.J., Yu, J.X., Ravindran, B., Pudi, V. (eds.) PAKDD 2010. LNCS (LNAI), vol. 6119, pp. 410\u2013421. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-13672-6_40"},{"issue":"1","key":"5_CR5","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MSPEC.2011.5676396","volume":"48","author":"SM Amin","year":"2011","unstructured":"Amin, S.M.: US grid gets less reliable [the data]. IEEE Spectr. 48(1), 80\u201380 (2011)","journal-title":"IEEE Spectr."},{"key":"5_CR6","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1007\/978-3-319-06605-9_23","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"M Araujo","year":"2014","unstructured":"Araujo, M., et al.: Com2: fast automatic discovery of temporal (\u2018comet\u2019) communities. In: Tseng, V.S., Ho, T.B., Zhou, Z.-H., Chen, A.L.P., Kao, H.-Y. (eds.) PAKDD 2014. LNCS (LNAI), vol. 8444, pp. 271\u2013283. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06605-9_23"},{"issue":"2","key":"5_CR7","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/59.260810","volume":"8","author":"T Baldwin","year":"1993","unstructured":"Baldwin, T., Mili, L., Boisen, M., Adapa, R.: Power system observability with minimal phasor measurement placement. IEEE Trans. Power Syst. 8(2), 707\u2013715 (1993)","journal-title":"IEEE Trans. Power Syst."},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM Sigmod Record, vol. 29, pp. 93\u2013104. ACM (2000)","DOI":"10.1145\/335191.335388"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"744","DOI":"10.1137\/S0895480103432556","volume":"19","author":"DJ Brueni","year":"2005","unstructured":"Brueni, D.J., Heath, L.S.: The PMU placement problem. SIAM J. Discret. Math. 19(3), 744\u2013761 (2005)","journal-title":"SIAM J. Discret. Math."},{"issue":"1","key":"5_CR10","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s10844-011-0183-2","volume":"39","author":"Z Chen","year":"2012","unstructured":"Chen, Z., Hendrix, W., Samatova, N.F.: Community-based anomaly detection in evolutionary networks. J. Intell. Inf. Syst. 39(1), 59\u201385 (2012)","journal-title":"J. Intell. Inf. Syst."},{"issue":"24","key":"5_CR11","doi-asserted-by":"publisher","first-page":"247901","DOI":"10.1103\/PhysRevLett.91.247901","volume":"91","author":"R Cohen","year":"2003","unstructured":"Cohen, R., Havlin, S., Ben-Avraham, D.: Efficient immunization strategies for computer networks and populations. Phys. Rev. Lett. 91(24), 247901 (2003)","journal-title":"Phys. Rev. Lett."},{"issue":"4","key":"5_CR12","doi-asserted-by":"publisher","first-page":"1812","DOI":"10.1109\/TPWRD.2008.919046","volume":"23","author":"D Dua","year":"2008","unstructured":"Dua, D., Dambhare, S., Gajbhiye, R.K., Soman, S.: Optimal multistage scheduling of PMU placement: an ILP approach. IEEE Trans. Power Deliv. 23(4), 1812\u20131820 (2008)","journal-title":"IEEE Trans. Power Deliv."},{"issue":"3","key":"5_CR13","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/0378-8733(78)90021-7","volume":"1","author":"LC Freeman","year":"1978","unstructured":"Freeman, L.C.: Centrality in social networks conceptual clarification. Soc. Netw. 1(3), 215\u2013239 (1978)","journal-title":"Soc. Netw."},{"key":"5_CR14","doi-asserted-by":"crossref","DOI":"10.1515\/9780691218632","volume-title":"Time Series Analysis","author":"JD Hamilton","year":"1994","unstructured":"Hamilton, J.D.: Time Series Analysis, vol. 2. Princeton University Press, Princeton (1994)"},{"key":"5_CR15","unstructured":"Jones, M., Nikovski, D., Imamura, M., Hirata, T.: Anomaly detection in real-valued multidimensional time series. In: International Conference on Bigdata\/Socialcom\/Cybersecurity. Stanford University, ASE. Citeseer (2014)"},{"issue":"3","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1521","DOI":"10.1109\/TPWRS.2012.2185959","volume":"27","author":"V Kekatos","year":"2012","unstructured":"Kekatos, V., Giannakis, G.B., Wollenberg, B.: Optimal placement of phasor measurement units via convex relaxation. IEEE Trans. Power Syst. 27(3), 1521\u20131530 (2012)","journal-title":"IEEE Trans. Power Syst."},{"issue":"1","key":"5_CR17","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-006-0034-6","volume":"11","author":"E Keogh","year":"2007","unstructured":"Keogh, E., Lin, J., Lee, S.H., Van Herle, H.: Finding the most unusual time series subsequence: algorithms and applications. Knowl. Inf. Syst. 11(1), 1\u201327 (2007)","journal-title":"Knowl. Inf. Syst."},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Leskovec, J., Krause, A., Guestrin, C., Faloutsos, C., VanBriesen, J., Glance, N.: Cost-effective outbreak detection in networks. In: KDD, pp. 420\u2013429. ACM (2007)","DOI":"10.1145\/1281192.1281239"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Li, Q., Negi, R., Ili\u0107, M.D.: Phasor measurement units placement for power system state estimation: a greedy approach. In: 2011 IEEE Power and Energy Society General Meeting, pp. 1\u20138. IEEE (2011)","DOI":"10.1109\/PES.2011.6039076"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: ICDM, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"key":"5_CR21","unstructured":"Magnago, F.H., Abur, A.: A unified approach to robust meter placement against loss of measurements and branch outages. In: Proceedings of the 21st 1999 IEEE International Conference Power on Industry Computer Applications, PICA 1999, pp. 3\u20138. IEEE (1999)"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Mongiovi, M., Bogdanov, P., Ranca, R., Papalexakis, E.E., Faloutsos, C., Singh, A.K.: Netspot: spotting significant anomalous regions on dynamic networks. In: SDM, pp. 28\u201336. SIAM (2013)","DOI":"10.1137\/1.9781611972832.4"},{"issue":"1","key":"5_CR23","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1007\/BF01588971","volume":"14","author":"GL Nemhauser","year":"1978","unstructured":"Nemhauser, G.L., Wolsey, L.A., Fisher, M.L.: An analysis of approximations for maximizing submodular set functions-I. Math. Program. 14(1), 265\u2013294 (1978)","journal-title":"Math. Program."},{"issue":"3","key":"5_CR24","doi-asserted-by":"publisher","first-page":"1065","DOI":"10.1214\/aoms\/1177704472","volume":"33","author":"E Parzen","year":"1962","unstructured":"Parzen, E.: On estimation of a probability density function and mode. Ann. Math. Stat. 33(3), 1065\u20131076 (1962)","journal-title":"Ann. Math. Stat."},{"issue":"3","key":"5_CR25","doi-asserted-by":"publisher","first-page":"036104","DOI":"10.1103\/PhysRevE.65.036104","volume":"65","author":"R Pastor-Satorras","year":"2002","unstructured":"Pastor-Satorras, R., Vespignani, A.: Immunization of complex networks. Phys. Rev. E 65(3), 036104 (2002)","journal-title":"Phys. Rev. E"},{"key":"5_CR26","first-page":"2825","volume":"12","author":"F Pedregosa","year":"2011","unstructured":"Pedregosa, F., et al.: Scikit-learn: machine learning in Python. J. Mach. Learn. Res. 12, 2825\u20132830 (2011)","journal-title":"J. Mach. Learn. Res."},{"issue":"1","key":"5_CR27","doi-asserted-by":"publisher","first-page":"101","DOI":"10.1109\/TPWRD.2006.881425","volume":"22","author":"C Rakpenthai","year":"2007","unstructured":"Rakpenthai, C., Premrudeepreechacharn, S., Uatrongjit, S., Watson, N.R.: An optimal PMU placement method against measurement loss and branch outage. IEEE Trans. Power Deliv. 22(1), 101\u2013107 (2007)","journal-title":"IEEE Trans. Power Deliv."},{"key":"5_CR28","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: ACM Sigmod Record, vol. 29, pp. 427\u2013438. ACM (2000)","DOI":"10.1145\/335191.335437"},{"key":"5_CR29","doi-asserted-by":"crossref","unstructured":"Ranshous, S., Harenberg, S., Sharma, K., Samatova, N.F.: A scalable approach for outlier detection in edge streams using sketch-based approximations. In: SDM, pp. 189\u2013197. SIAM (2016)","DOI":"10.1137\/1.9781611974348.22"},{"key":"5_CR30","doi-asserted-by":"crossref","unstructured":"Shah, N., Koutra, D., Zou, T., Gallagher, B., Faloutsos, C.: TimeCrunch: interpretable dynamic graph summarization. In: KDD, pp. 1055\u20131064. ACM (2015)","DOI":"10.1145\/2783258.2783321"},{"key":"5_CR31","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"606","DOI":"10.1007\/978-3-319-71246-8_37","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"HA Song","year":"2017","unstructured":"Song, H.A., Hooi, B., Jereminov, M., Pandey, A., Pileggi, L., Faloutsos, C.: PowerCast: mining and forecasting power grid sequences. In: Ceci, M., Hollm\u00e9n, J., Todorovski, L., Vens, C., D\u017eeroski, S. (eds.) ECML PKDD 2017. LNCS (LNAI), vol. 10535, pp. 606\u2013621. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-71246-8_37"},{"issue":"1","key":"5_CR32","doi-asserted-by":"publisher","first-page":"41","DOI":"10.1016\/S0167-6377(03)00062-2","volume":"32","author":"M Sviridenko","year":"2004","unstructured":"Sviridenko, M.: A note on maximizing a submodular set function subject to a knapsack constraint. Oper. Res. Lett. 32(1), 41\u201343 (2004)","journal-title":"Oper. Res. Lett."},{"issue":"1","key":"5_CR33","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3147.3165","volume":"11","author":"JS Vitter","year":"1985","unstructured":"Vitter, J.S.: Random sampling with a reservoir. ACM Trans. Math. Softw. (TOMS) 11(1), 37\u201357 (1985)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"key":"5_CR34","unstructured":"Yi, S., Ju, J., Yoon, M.K., Choi, J.: Grouped convolutional neural networks for multivariate time series. arXiv preprint arXiv:1703.09938 (2017)"},{"key":"5_CR35","volume-title":"An Introduction to the Theory of Statistics","author":"GU Yule","year":"1919","unstructured":"Yule, G.U.: An Introduction to the Theory of Statistics. C. Griffin, limited, London (1919)"},{"key":"5_CR36","unstructured":"Zhao, Y., Goldsmith, A., Poor, H.V.: On PMU location selection for line outage detection in wide-area transmission networks. In: 2012 IEEE Power and Energy Society General Meeting, pp. 1\u20138. IEEE (2012)"},{"issue":"1","key":"5_CR37","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/TPWRS.2010.2051168","volume":"26","author":"RD Zimmerman","year":"2011","unstructured":"Zimmerman, R.D., Murillo-S\u00e1nchez, C.E., Thomas, R.J.: Matpower: steady-state operations, planning, and analysis tools for power systems research and education. IEEE Trans. Power Syst. 26(1), 12\u201319 (2011)","journal-title":"IEEE Trans. Power Syst."}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-10925-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,17]],"date-time":"2024-01-17T01:28:15Z","timestamp":1705454895000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-10925-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030109240","9783030109257"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-10925-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 January 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ECML PKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Joint European Conference on Machine Learning and Knowledge Discovery in Databases","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 September 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 September 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ecml2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ecmlpkdd2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"CMT","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"535","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"131","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}