{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T15:22:52Z","timestamp":1726068172288},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030407827"},{"type":"electronic","value":"9783030407834"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-40783-4_20","type":"book-chapter","created":{"date-parts":[[2020,2,19]],"date-time":"2020-02-19T13:05:07Z","timestamp":1582117507000},"page":"424-442","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["CoRP: A Pattern-Based Anomaly Detection in Time-Series"],"prefix":"10.1007","author":[{"given":"Ines","family":"Ben Kraiem","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faiza","family":"Ghozzi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andre","family":"Peninou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivier","family":"Teste","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,2,20]]},"reference":[{"issue":"3","key":"20_CR1","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 15 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"2","key":"20_CR2","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artif. Intell. Rev. 22(2), 85\u2013126 (2004)","journal-title":"Artif. Intell. Rev."},{"issue":"2","key":"20_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.5120\/13715-1478","volume":"79","author":"Salima Omar","year":"2013","unstructured":"Omar, S., Ngadi, A., Jebur, H.: Machine learning techniques for anomaly detection: an overview. Int. J. Comput. Appl. 79(2) (2013)","journal-title":"International Journal of Computer Applications"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60, 708\u2013713 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"20_CR5","unstructured":"Sreevidya, S.S.: A survey on outlier detection methods. IJCSIT Int. J. Comput. Sci. Inf. Technol. 5(6) (2014)"},{"issue":"3","key":"20_CR6","first-page":"23","volume":"6","author":"AB Sharma","year":"2010","unstructured":"Sharma, A.B., Golubchik, L., Govindan, R.: Sensor faults: detection methods and prevalence in real-world datasets. ACM Trans. Sens. Netw. (TOSN) 6(3), 23 (2010)","journal-title":"ACM Trans. Sens. Netw. (TOSN)"},{"issue":"11","key":"20_CR7","doi-asserted-by":"publisher","first-page":"1059","DOI":"10.1016\/j.peva.2010.08.018","volume":"67","author":"Y Yao","year":"2010","unstructured":"Yao, Y., Sharma, A., Golubchik, L., Govindan, R.: Online anomaly detection for sensor systems: a simple and efficient approach. Perform. Eval. 67(11), 1059\u20131075 (2010)","journal-title":"Perform. Eval."},{"issue":"2","key":"20_CR8","first-page":"299","volume":"3","author":"S Upadhyaya","year":"2012","unstructured":"Upadhyaya, S., Singh, K.: Nearest neighbour based outlier detection techniques. Int. J. Comput. Trends Technol. 3(2), 299\u2013303 (2012)","journal-title":"Int. J. Comput. Trends Technol."},{"issue":"2","key":"20_CR9","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"Markus M. Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.P., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM Sigmod Record, vol. 29, no. 2, pp. 93\u2013104, May 2000","journal-title":"ACM SIGMOD Record"},{"issue":"2","key":"20_CR10","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1080\/00401706.1983.10487848","volume":"25","author":"B Rosner","year":"1983","unstructured":"Rosner, B.: Percentage points for a generalized ESD many-outlier procedure. Technometrics 25(2), 165\u2013172 (1983)","journal-title":"Technometrics"},{"key":"20_CR11","volume-title":"Detection of Abrupt Changes: Theory and Application","author":"M Basseville","year":"1993","unstructured":"Basseville, M., Nikiforov, I.V.: Detection of Abrupt Changes: Theory and Application, vol. 104. Prentice Hall, Englewood Cliffs (1993)"},{"issue":"2","key":"20_CR12","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1007\/s10115-016-0987-z","volume":"51","author":"S Aminikhanghahi","year":"2017","unstructured":"Aminikhanghahi, S., Cook, D.J.: A survey of methods for time series change point detection. Knowl. Inf. Syst. 51(2), 339\u2013367 (2017)","journal-title":"Knowl. Inf. Syst."},{"key":"20_CR13","unstructured":"Ramanathan, N., et al.: Rapid deployment with confidence: calibration and fault detection in environmental sensor networks (2006)"},{"issue":"421","key":"20_CR14","doi-asserted-by":"crossref","first-page":"284","DOI":"10.1080\/01621459.1993.10594321","volume":"88","author":"C Chen","year":"1993","unstructured":"Chen, C., Liu, L.M.: Joint estimation of model parameters and outlier effects in time series. J. Am. Stat. Assoc. 88(421), 284\u2013297 (1993)","journal-title":"J. Am. Stat. Assoc."},{"key":"20_CR15","unstructured":"Hochenbaum, J., Vallis, O.S., Kejariwal, A.: Automatic anomaly detection in the cloud via statistical learning. arXiv preprint arXiv:1704.07706 (2017)"},{"issue":"1","key":"20_CR16","first-page":"3","volume":"6","author":"RB Cleveland","year":"1990","unstructured":"Cleveland, R.B., Cleveland, W.S., McRae, J.E., Terpenning, I.: STL: a seasonal-trend decomposition. J. Official Stat. 6(1), 3\u201373 (1990)","journal-title":"J. Official Stat."},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Ben Kraiem, I., Ghozzi, F., P\u00e9ninou, A., Teste, O.: Pattern-based method for anomaly detection in sensor networks. In: International Conference on Enterprise Information Systems, vol. 1, pp. 104\u2013113, May 2019","DOI":"10.5220\/0007736701040113"},{"key":"20_CR18","doi-asserted-by":"crossref","unstructured":"Lavin, A., Ahmad, S.: Evaluating real-time anomaly detection algorithms-the numenta anomaly benchmark. In: 2015 IEEE 14th International Conference on Machine Learning and Applications (ICMLA), December 2015, pp. 38\u201344. IEEE (2015)","DOI":"10.1109\/ICMLA.2015.141"},{"key":"20_CR19","unstructured":"L\u00f3pez-de-Lacalle, J.: tsoutliers R package for detection of outliers in time series. CRAN, R Package (2016)"}],"container-title":["Lecture Notes in Business Information Processing","Enterprise Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-40783-4_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,31]],"date-time":"2024-07-31T20:17:48Z","timestamp":1722457068000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-40783-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030407827","9783030407834"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-40783-4_20","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"20 February 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICEIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Enterprise Information Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Heraklion, Crete","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Greece","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceis2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iceis.org\/?y=2019","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"PRIMORIS","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"205","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"41","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"63","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"20% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}