{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T17:03:58Z","timestamp":1743095038290,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030503154"},{"type":"electronic","value":"9783030503161"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-50316-1_19","type":"book-chapter","created":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T09:02:48Z","timestamp":1592989368000},"page":"321-337","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automatic Classification Rules for\u00a0Anomaly Detection in Time-Series"],"prefix":"10.1007","author":[{"given":"Ines","family":"Ben Kraiem","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Faiza","family":"Ghozzi","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Andre","family":"Peninou","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Geoffrey","family":"Roman-Jimenez","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Olivier","family":"Teste","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,6,25]]},"reference":[{"key":"19_CR1","unstructured":"Puttagunta, V., Kalpakis, K: Adaptive methods for activity monitoring of streaming data. In: ICMLA, vol. 2, pp. 197\u2013203, June 2002"},{"key":"19_CR2","doi-asserted-by":"crossref","unstructured":"Ben Kraiem, I., Ghozzi, F., P\u00e9ninou, A., Teste, O: Pattern-based method for anomaly detection in sensor networks. In: International Conference on Enterprise Information Systems, vol. 1, pp. 104\u2013113, May 2019","DOI":"10.5220\/0007736701040113"},{"key":"19_CR3","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques","author":"IH Witten","year":"2016","unstructured":"Witten, I.H., Frank, E., Hall, M.A., Pal, C.J.: Data Mining: Practical Machine Learning Tools and Techniques, 4th edn. Morgan Kaufmann, Burlington (2016)","edition":"4"},{"key":"19_CR4","doi-asserted-by":"publisher","first-page":"708","DOI":"10.1016\/j.procs.2015.08.220","volume":"60","author":"S Agrawal","year":"2015","unstructured":"Agrawal, S., Agrawal, J.: Survey on anomaly detection using data mining techniques. Procedia Comput. Sci. 60, 708\u2013713 (2015)","journal-title":"Procedia Comput. Sci."},{"key":"19_CR5","doi-asserted-by":"crossref","unstructured":"Omar, S., Ngadi, A., Jebur, H.H: Machine learning techniques for anomaly detection: an overview. Int. J. Comput. Appl. 79(2) (2013)","DOI":"10.5120\/13715-1478"},{"key":"19_CR6","doi-asserted-by":"crossref","unstructured":"Parmar, J.D., Patel, J.T: Anomaly detection in data mining: a review. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 7(4) (2017)","DOI":"10.23956\/ijarcsse\/V7I4\/0142"},{"key":"19_CR7","unstructured":"D\u00e4ubener, S., Schmitt, S., Wang, H., Krause, P., B\u00e4ck, T.: Anomaly detection in univariate time series: an empirical comparison of machine learning algorithms. In: ICDM (2019)"},{"key":"19_CR8","unstructured":"Braei, M., Wagner, S.: Anomaly Detection in Univariate Time-series: A Survey on the State-of-the-Art. arXiv preprint \narXiv:2004.00433\n\n (2020)"},{"issue":"8","key":"19_CR9","first-page":"15","volume":"163","author":"B Gupta","year":"2017","unstructured":"Gupta, B., Rawat, A., Jain, A., Arora, A., Dhami, N.: Analysis of various decision tree algorithms for classification in data mining. Int. J. Comput. Appl. 163(8), 15\u201319 (2017)","journal-title":"Int. J. Comput. Appl."},{"key":"19_CR10","unstructured":"Sinwar, D., Kumar, M: Anomaly detection using decision tree based classifiers. Int. J. Mod. Trends Eng. Res. (IJMTER) 3 (2016)"},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"Reif, M., Goldstein, M., Stahl, A., Breuel, T.M: Anomaly detection by combining decision trees and parametric densities. In: 2008 19th International Conference on Pattern Recognition, pp. 1\u20134. IEEE, December 2008","DOI":"10.1109\/ICPR.2008.4761796"},{"key":"19_CR12","doi-asserted-by":"publisher","first-page":"174","DOI":"10.1016\/j.proeng.2012.01.849","volume":"30","author":"AP Muniyandi","year":"2012","unstructured":"Muniyandi, A.P., Rajeswari, R., Rajaram, R.: Network anomaly detection by cascading k-means clustering and C4. 5 decision tree algorithm. Procedia Eng. 30, 174\u2013182 (2012)","journal-title":"Procedia Eng."},{"key":"19_CR13","doi-asserted-by":"publisher","first-page":"66","DOI":"10.1016\/j.eswa.2018.04.004","volume":"106","author":"TY Kim","year":"2018","unstructured":"Kim, T.Y., Cho, S.B.: Web traffic anomaly detection using C-LSTM neural networks. Expert Syst. Appl. 106, 66\u201376 (2018)","journal-title":"Expert Syst. Appl."},{"key":"19_CR14","unstructured":"Arafailova, E., Beldiceanu, N., et al.: Global constraint catalog, volume ii, time-series constraints. arXiv preprint \narXiv:1609.08925\n\n (2016)"},{"issue":"27","key":"19_CR15","first-page":"97","volume":"27","author":"S Singh","year":"2014","unstructured":"Singh, S., Gupta, P.: Comparative study ID3, cart and C4. 5 decision tree algorithm: a survey. Int. J. Adv. Inf. Sci. Technol. (IJAIST) 27(27), 97\u2013103 (2014)","journal-title":"Int. J. Adv. Inf. Sci. Technol. (IJAIST)"},{"key":"19_CR16","unstructured":"Laptev, N., Amizadeh, S: A labeled anomaly detection dataset S5 Yahoo Research, v1. \nhttps:\/\/webscope.sandbox.yahoo.com\/catalog.php?datatype=s&did=70"},{"issue":"1\u201312","key":"19_CR17","first-page":"24","volume":"110","author":"C Chen","year":"2004","unstructured":"Chen, C., Liaw, A., Breiman, L.: Using random forest to learn imbalanced data. Univ. Calif. Berkeley 110(1\u201312), 24 (2004)","journal-title":"Univ. Calif. Berkeley"}],"container-title":["Lecture Notes in Business Information Processing","Research Challenges in Information Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-50316-1_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,6,24]],"date-time":"2020-06-24T09:09:23Z","timestamp":1592989763000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-50316-1_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030503154","9783030503161"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-50316-1_19","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"25 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"RCIS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Research Challenges in Information Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Limassol","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cyprus","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"rcis2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.rcis-conf.com\/rcis2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"106","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"26","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"25% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3.05","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"There are also 12 poster and demo papers, and 4 Doctoral Consortium papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}