{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T06:38:02Z","timestamp":1774507082194,"version":"3.50.1"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030234980","type":"print"},{"value":"9783030234997","type":"electronic"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-23499-7_5","type":"book-chapter","created":{"date-parts":[[2019,6,17]],"date-time":"2019-06-17T23:09:30Z","timestamp":1560812970000},"page":"63-79","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":12,"title":["AnomalyDetect: An Online Distance-Based Anomaly Detection Algorithm"],"prefix":"10.1007","author":[{"given":"Wunjun","family":"Huo","sequence":"first","affiliation":[]},{"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Wen","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,14]]},"reference":[{"key":"5_CR1","unstructured":"Vallis, O., Hochenbaum, J., Kejariwal, A.: A novel technique for long-term anomaly detection in the cloud. In: HotCloud (2014)"},{"key":"5_CR2","unstructured":"Yahoo: S5 - A Labeled Anomaly Detection Dataset, version 1.0 (2015). http:\/\/webscope.sandbox.yahoo.com\/catalog.php?datatype=s&did=70"},{"key":"5_CR3","doi-asserted-by":"crossref","unstructured":"Laptev, N., Amizadeh, S., Flint, I.: Generic and scalable framework for automated time-series anomaly detection. In: KDD, pp. 1939\u20131947 (2015)","DOI":"10.1145\/2783258.2788611"},{"key":"5_CR4","unstructured":"Huang, C., Min, G., Wu, Y., Ying, Y., Pei, K., Xiang, Z.: Time series anomaly detection for trustworthy services in cloud computing systems"},{"key":"5_CR5","doi-asserted-by":"crossref","unstructured":"Sagoolmuang, A., Sinapiromsaran, K.: Median-difference window subseries score for contextual anomaly on time series. In: IC-ICTE (2017)","DOI":"10.1109\/ICTEmSys.2017.7958772"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Thill, M., Konen, W., B\u00e4ck, T.: Online anomaly detection on the webscope S5 dataset: a comparative study. In: EAIS (2017)","DOI":"10.1109\/EAIS.2017.7954844"},{"key":"5_CR7","unstructured":"Chen, Y., Hu, B., Keogh, E., Batista, G.E.: DTW-D: time series semi-supervised learning from a single example"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Suh, S., Chae, D.H., Kang, H.-G., Choi, S.: Echo-state conditional variational autoencoder for anomaly detection. In: International Joint Conference on Neural Networks (IJCNN) (2016)","DOI":"10.1109\/IJCNN.2016.7727309"},{"issue":"1","key":"5_CR9","doi-asserted-by":"publisher","first-page":"9653230","DOI":"10.1155\/2016\/9653230","volume":"12","author":"Q Yu","year":"2016","unstructured":"Yu, Q., Jibin, L., Jiang, L.: An improved ARIMA-based traffic anomaly detection algorithm for wireless sensor networks. Int. J. Distrib. Sens. Netw. 12(1), 9653230 (2016)","journal-title":"Int. J. Distrib. Sens. Netw."},{"key":"5_CR10","unstructured":"Hyndman, R.J., Wang, E., Laptev, N.: Large-scale unusual time series detection"},{"key":"5_CR11","unstructured":"Wei, L., Kumar, N., Lolla, V., Keogh, E., Lonardi, S., Ann Ratanamahatana, C.: Assumption-free anomaly detection in time series. In: 17th International Conference on Scientific and Statistical (2005)"},{"key":"5_CR12","unstructured":"Berndt, D.J., Clifford, J.: Using dynamic time warping to find patterns in time series. AAAI Technical Report WS-94-03"},{"key":"5_CR13","unstructured":"Chandola, V., Cheboli, D., Kumar, V.: Detecting anomalies in a time series database. Department, University of Minnesota, Technical report 12 (2009)"},{"issue":"3","key":"5_CR14","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1080\/00401706.1962.10490022","volume":"4","author":"BP Welford","year":"1962","unstructured":"Welford, B.P.: Note on a method for calculating corrected sums of squares and products. Technometrics 4(3), 419\u2013420 (1962)","journal-title":"Technometrics"},{"key":"5_CR15","unstructured":"Watson, S.M., Tight, M., Clark, S., Redfern, E.: Detection of outliers in time series. Institute of Transport Studies, University of Leeds"},{"issue":"1","key":"5_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10115-006-0034-6","volume":"11","author":"Eamonn Keogh","year":"2007","unstructured":"Keogh, Eamonn, Lin, Jessica, Lee, Sang-Hee, Van Herle, Helga: Finding the most unusual time series subsequence: algorithms and applications. Knowl. Inf. Syst. 11(1), 1\u201327 (2007)","journal-title":"Knowl. Inf. Syst."},{"key":"5_CR17","doi-asserted-by":"crossref","unstructured":"Siffer, A., Fouque, P.A., Termier, A., Largou\u00ebt, C.: Anomaly detection in streams with extreme value theory. In: Proceedings of the 23rd ACM SIGKDD International Conference (2017)","DOI":"10.1145\/3097983.3098144"},{"key":"5_CR18","doi-asserted-by":"crossref","unstructured":"Lin, J., Keogh, E., Lonardi, S. Chiu, B.: A symbolic representation of time series, with implications for streaming algorithms. In: Proceedings of the 8th ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery (2003)","DOI":"10.1145\/882082.882086"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y., Mahajan, R., Sridharan, B., Zhang, Z.-L.: A provider-side view of web search response time. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM, vol. 43 (2013)","DOI":"10.1145\/2486001.2486035"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Yan, H.,: Argus: end-to-end service anomaly detection and localization from an ISP\u2019s point of view. In: IEEE INFOCOM (2012)","DOI":"10.1109\/INFCOM.2012.6195694"},{"key":"5_CR21","unstructured":"Netflix: Surus. https:\/\/github.com\/Netflix\/Surus"},{"key":"5_CR22","unstructured":"Linkedin: luminol. https:\/\/github.com\/linkedin\/luminol"},{"key":"5_CR23","doi-asserted-by":"crossref","unstructured":"Cand\u00e8s, E.J., Li, X., Ma, Y., Wright, J.: Robust principal component analysis (2011)","DOI":"10.1145\/1970392.1970395"},{"key":"5_CR24","unstructured":"Twitter: Anomaly Detection. https:\/\/github.com\/twitter\/AnomalyDetection"},{"key":"5_CR25","unstructured":"Laptev, N., Amizadeh, S.: Yahoo anomaly detection dataset S5 (2015). http:\/\/webscope.sandbox.yahoo.com\/catalog.php?datatype=s&did=70"},{"key":"5_CR26","unstructured":"Twitter: Breakout Detection. https:\/\/github.com\/twitter\/BreakoutDetection"},{"key":"5_CR27","unstructured":"Zhang, S., et al.: Rapid and robust impact assessment of software changes in large internet-based services. In: CoNEXT 2015, 01\u201304 December 2015, Heidelberg, Germany (2015)"}],"container-title":["Lecture Notes in Computer Science","Web Services \u2013 ICWS 2019"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-23499-7_5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,18]],"date-time":"2023-06-18T00:03:43Z","timestamp":1687046623000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-23499-7_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030234980","9783030234997"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-23499-7_5","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"14 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICWS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Web Services","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"San Diego, CA","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"USA","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 June 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 June 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icws2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.icws.org\/2019\/index.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}