{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T10:30:09Z","timestamp":1766485809740,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030227401"},{"type":"electronic","value":"9783030227418"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-22741-8_5","type":"book-chapter","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T15:02:45Z","timestamp":1559919765000},"page":"59-74","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["A Fast kNN-Based Approach for Time Sensitive Anomaly Detection over Data Streams"],"prefix":"10.1007","author":[{"given":"Guangjun","family":"Wu","sequence":"first","affiliation":[]},{"given":"Zhihui","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Ge","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Haiping","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Zhenyu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Junteng","family":"Hou","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Huang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"5_CR1","unstructured":"KDD-Cup99 HTTP. http:\/\/kdd.ics.uci.edu\/databases\/kddcup99\/kddcup99.html"},{"key":"5_CR2","unstructured":"Statlog Shuttle. https:\/\/archive.ics.uci.edu\/ml\/datasets\/Statlog+(Shuttle)"},{"key":"5_CR3","unstructured":"TAO. http:\/\/www.pmel.noaa.gov"},{"key":"5_CR4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-47534-9","volume-title":"Data Streams: Models and Algorithms","author":"CC Aggarwal","year":"2007","unstructured":"Aggarwal, C.C.: Data Streams: Models and Algorithms, vol. 31. Springer, London (2007). https:\/\/doi.org\/10.1007\/978-0-387-47534-9"},{"issue":"2","key":"5_CR5","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/376284.375668","volume":"30","author":"Charu C. Aggarwal","year":"2001","unstructured":"Aggarwal, C.C., Yu, P.S.: Outlier detection for high dimensional data. In: ACM Sigmod Record, vol. 30, pp. 37\u201346. ACM (2001)","journal-title":"ACM SIGMOD Record"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Angiulli, F., Fassetti, F.: Detecting distance-based outliers in streams of data. In: Proceedings of the Sixteenth ACM Conference on Conference on Information and Knowledge Management, pp. 811\u2013820. ACM (2007)","DOI":"10.1145\/1321440.1321552"},{"key":"5_CR7","doi-asserted-by":"crossref","unstructured":"Babcock, B., Babu, S., Datar, M., Motwani, R., Widom, J.: Models and issues in data stream systems. In: Proceedings of the Twenty-First ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, pp. 1\u201316. ACM (2002)","DOI":"10.1145\/543613.543615"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Cao, L., Yang, D., Wang, Q., Yu, Y., Wang, J., Rundensteiner, E.A.: Scalable distance-based outlier detection over high-volume data streams. In: IEEE 30th International Conference on Data Engineering (ICDE), pp. 76\u201387. IEEE (2014)","DOI":"10.1109\/ICDE.2014.6816641"},{"issue":"3","key":"5_CR9","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Charikar, M.S.: Similarity estimation techniques from rounding algorithms. In: Proceedings of the Thiry-Fourth Annual ACM Symposium on Theory of Computing, pp. 380\u2013388. ACM (2002)","DOI":"10.1145\/509907.509965"},{"issue":"2","key":"5_CR11","doi-asserted-by":"publisher","first-page":"16","DOI":"10.1109\/MM.2010.31","volume":"30","author":"P Conway","year":"2010","unstructured":"Conway, P., Kalyanasundharam, N., Donley, G., Lepak, K., Hughes, B.: Cache hierarchy and memory subsystem of the AMD Opteron processor. IEEE Micro 30(2), 16\u201329 (2010)","journal-title":"IEEE Micro"},{"key":"5_CR12","unstructured":"Dang, Q.V.: Outlier detection on network flow analysis. arXiv preprint arXiv:1808.02024 (2018)"},{"issue":"4","key":"5_CR13","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobait\u0117, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. (CSUR) 46(4), 44 (2014)","journal-title":"ACM Comput. Surv. (CSUR)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Gibbons, P.B., Tirthapura, S.: Distributed streams algorithms for sliding windows. In: Proceedings of the Fourteenth Annual ACM Symposium on Parallel Algorithms and Architectures, pp. 63\u201372. ACM (2002)","DOI":"10.1145\/564870.564880"},{"key":"5_CR15","doi-asserted-by":"crossref","unstructured":"Goemans, M.X., Williamson, D.P.: 879-approximation algorithms for MAX CUT and MAX 2SAT. In: Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing, pp. 422\u2013431. ACM (1994)","DOI":"10.1145\/195058.195216"},{"key":"5_CR16","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1613\/jair.3623","volume":"46","author":"N G\u00f6rnitz","year":"2013","unstructured":"G\u00f6rnitz, N., Kloft, M., Rieck, K., Brefeld, U.: Toward supervised anomaly detection. J. Artif. Intell. Res. 46, 235\u2013262 (2013)","journal-title":"J. Artif. Intell. Res."},{"key":"5_CR17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-45171-7","volume-title":"Applied Multivariate Statistical Analysis","author":"W H\u00e4rdle","year":"2007","unstructured":"H\u00e4rdle, W., Simar, L.: Applied Multivariate Statistical Analysis. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-662-45171-7"},{"key":"5_CR18","unstructured":"Knox, E.M., Ng, R.T.: Algorithms for mining distance based outliers in large datasets. In: Proceedings of the International Conference on Very Large Data Bases, pp. 392\u2013403. Citeseer (1998)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Kontaki, M., Gounaris, A., Papadopoulos, A.N., Tsichlas, K., Manolopoulos, Y.: Continuous monitoring of distance-based outliers over data streams. In: IEEE 27th International Conference on Data Engineering (ICDE), pp. 135\u2013146. IEEE (2011)","DOI":"10.1109\/ICDE.2011.5767923"},{"key":"5_CR20","unstructured":"Leung, K., Leckie, C.: Unsupervised anomaly detection in network intrusion detection using clusters. In: Proceedings of the Twenty-Eighth Australasian Conference on Computer Science, vol. 38, pp. 333\u2013342. Australian Computer Society, Inc. (2005)"},{"key":"5_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-642-15364-8_9","volume-title":"Database and Expert Systems Applications","author":"MS Sadik","year":"2010","unstructured":"Sadik, M.S., Gruenwald, L.: DBOD-DS: distance based outlier detection for data streams. In: Bringas, P.G., Hameurlain, A., Quirchmayr, G. (eds.) DEXA 2010. LNCS, vol. 6261, pp. 122\u2013136. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-15364-8_9"},{"issue":"1","key":"5_CR22","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1145\/3229329.3229332","volume":"20","author":"M Salehi","year":"2018","unstructured":"Salehi, M., Rashidi, L.: A survey on anomaly detection in evolving data: [with application to forest fire risk prediction]. ACM SIGKDD Explor. Newslett. 20(1), 13\u201323 (2018)","journal-title":"ACM SIGKDD Explor. Newslett."},{"issue":"17","key":"5_CR23","doi-asserted-by":"publisher","first-page":"e3352","DOI":"10.1002\/dac.3352","volume":"30","author":"B Saneja","year":"2017","unstructured":"Saneja, B., Rani, R.: An efficient approach for outlier detection in big sensor data of health care. Int. J. Commun. Syst. 30(17), e3352 (2017)","journal-title":"Int. J. Commun. Syst."},{"key":"5_CR24","doi-asserted-by":"crossref","unstructured":"Sezari, B., M\u00f6ller, D.P., Deutschmann, A.: Anomaly-based network intrusion detection model using deep learning in airports. In: 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications\/12th IEEE International Conference on Big Data Science and Engineering (TrustCom\/BigDataSE), pp. 1725\u20131729. IEEE (2018)","DOI":"10.1109\/TrustCom\/BigDataSE.2018.00261"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Tao, Y., Xiao, X., Zhou, S.: Mining distance-based outliers from large databases in any metric space. In: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 394\u2013403. ACM (2006)","DOI":"10.1145\/1150402.1150447"},{"key":"5_CR26","doi-asserted-by":"crossref","unstructured":"Viet, H.N., Van, Q.N., Trang, L.L.T., Nathan, S.: Using deep learning model for network scanning detection. In: Proceedings of the 4th International Conference on Frontiers of Educational Technologies, pp. 117\u2013121. ACM (2018)","DOI":"10.1145\/3233347.3233379"},{"key":"5_CR27","doi-asserted-by":"crossref","unstructured":"Yang, D., Rundensteiner, E.A., Ward, M.O.: Neighbor-based pattern detection for windows over streaming data. In: Proceedings of the 12th International Conference on Extending Database Technology: Advances in Database Technology, pp. 529\u2013540. ACM (2009)","DOI":"10.1145\/1516360.1516422"}],"container-title":["Lecture Notes in Computer Science","Computational Science \u2013 ICCS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-22741-8_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,7]],"date-time":"2023-06-07T03:26:26Z","timestamp":1686108386000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-22741-8_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030227401","9783030227418"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-22741-8_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccs-computsci2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.iccs-meeting.org\/iccs2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}