{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:22:10Z","timestamp":1742930530296,"version":"3.40.3"},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030551797"},{"type":"electronic","value":"9783030551803"}],"license":[{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,8,25]],"date-time":"2020-08-25T00:00:00Z","timestamp":1598313600000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-55180-3_2","type":"book-chapter","created":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:28:02Z","timestamp":1598311682000},"page":"19-33","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Detection of Anomalous Patterns in Water Consumption: An Overview of Approaches"],"prefix":"10.1007","author":[{"given":"Jos\u00e9 Carlos","family":"Carrasco-Jim\u00e9nez","sequence":"first","affiliation":[]},{"given":"Filippo","family":"Baldaro","sequence":"additional","affiliation":[]},{"given":"Fernando","family":"Cucchietti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,8,25]]},"reference":[{"key":"2_CR1","unstructured":"Lambert, A., Hirner, W.: Losses from water supply systems: standard terminology and recommended performance measures, Report P-13, International Water Association (2000)"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41, 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Vercruyssen, V., Meert, W., Verbruggen, G., Maes, K., Baumer, R., Davis, J.: Semi-supervised anomaly detection with an application to water analytics. In: IEEE International Conference on Data Mining (ICDM), pp. 527\u2013536, November 2018","DOI":"10.1109\/ICDM.2018.00068"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Sun, J., Lou, Y., Ye, F.: Research on anomaly pattern detection in hydrological time series. In: 14th Web Information Systems and Applications Conference (WISA), pp.\u00a038\u201343, November 2017","DOI":"10.1109\/WISA.2017.73"},{"issue":"3","key":"2_CR5","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1080\/1573062X.2019.1637002","volume":"16","author":"EM Dogo","year":"2019","unstructured":"Dogo, E.M., Nwulu, N.I., Twala, B., Aigbavboa, C.: A survey of machine learning methods applied to anomaly detection on drinking-water quality data. Urban Water J. 16(3), 235\u2013248 (2019)","journal-title":"Urban Water J."},{"issue":"3","key":"2_CR6","first-page":"294","volume":"3","author":"F Muharemi","year":"2019","unstructured":"Muharemi, F., Logof\u0103tu, D., Leon, F.: Machine learning approaches for anomaly detection of water quality on a real-world data set. J. Inf. Telecommun. 3(3), 294\u2013307 (2019)","journal-title":"J. Inf. Telecommun."},{"key":"2_CR7","doi-asserted-by":"crossref","unstructured":"Quinn, S., Murphy, N., Smeaton, A.F.: Tracking human behavioural consistency by analysing periodicity of household water consumption. In: Proceedings of the 2019 2nd International Conference on Sensors, Signal and Image Processing, SSIP 2019, New York, NY, USA, pp.\u00a01\u20135. Association for Computing Machinery (2019)","DOI":"10.1145\/3365245.3365246"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez-Vidal, A., Cuenca-Jara, J., Skarmeta, A.F.: IoT for water management: towards intelligent anomaly detection. In: IEEE 5th World Forum on Internet of Things (WF-IoT), pp. 858\u2013863, April 2019","DOI":"10.1109\/WF-IoT.2019.8767190"},{"key":"2_CR9","doi-asserted-by":"publisher","first-page":"979","DOI":"10.1007\/s11269-016-1558-5","volume":"31","author":"SE Christodoulou","year":"2017","unstructured":"Christodoulou, S.E., Kourti, E., Agathokleous, A.: Waterloss detection in water distribution networks using wavelet change-point detection. Water Resources Manage. 31, 979\u2013994 (2017)","journal-title":"Water Resources Manage."},{"issue":"4","key":"2_CR10","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1061\/(ASCE)WR.1943-5452.0000339","volume":"140","author":"M Romano","year":"2014","unstructured":"Romano, M., Kapelan, Z., Savi\u0107, D.A.: Automated detection of pipe bursts and other events in water distribution systems. J. Water Resour. Plann. Manage. 140(4), 457\u2013467 (2014)","journal-title":"J. Water Resour. Plann. Manage."},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Kermany, E., Mazzawi, H., Baras, D., Naveh, Y., Michaelis, H.: Analysis of advanced meter infrastructure data of water consumption in apartment buildings. In: Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2013, New York, NY, USA, pp. 1159\u20131167. Association for Computing Machinery (2013)","DOI":"10.1145\/2487575.2488193"},{"key":"2_CR12","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.epsr.2016.05.036","volume":"140","author":"LAP J\u00fanior","year":"2016","unstructured":"J\u00fanior, L.A.P., Ramos, C.C.O., Rodrigues, D., Pereira, D.R., de Souza, A.N., da Costa, K.A.P., Papa, J.P.: Unsupervised non-technical losses identification through optimum-path forest. Electr. Power Syst. Res. 140, 413\u2013423 (2016)","journal-title":"Electr. Power Syst. Res."},{"key":"2_CR13","doi-asserted-by":"crossref","unstructured":"Detroz, J.P., da\u00a0Silva, A.T.: Fraud detection in water meters using pattern recognition techniques. In: Proceedings of the Symposium on Applied Computing, SAC 2017, New York, NY, USA, pp. 77\u201382. Association for Computing Machinery (2017)","DOI":"10.1145\/3019612.3019634"},{"key":"2_CR14","first-page":"3","volume":"6","author":"RB Cleveland","year":"1990","unstructured":"Cleveland, R.B., Cleveland, W.S., McRae, J.E., Terpenning, I.: STL: a seasonal-trend decomposition procedure based on loess. J. Off. Stat. 6, 3\u201337 (1990)","journal-title":"J. Off. Stat."},{"key":"2_CR15","unstructured":"Vallis, O., Hochenbaum, J., Kejariwal, A.: A novel technique for long-term anomaly detection in the cloud. In: Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, HotCloud 2014, USA, p.\u00a015. USENIX Association (2014)"},{"key":"2_CR16","doi-asserted-by":"publisher","first-page":"107299","DOI":"10.1016\/j.sigpro.2019.107299","volume":"167","author":"C Truong","year":"2020","unstructured":"Truong, C., Oudre, L., Vayatis, N.: Selective review of offline change point detection methods. Sig. Process. 167, 107299 (2020)","journal-title":"Sig. Process."},{"issue":"6","key":"2_CR17","doi-asserted-by":"publisher","first-page":"581","DOI":"10.11648\/j.ajtas.20150406.30","volume":"4","author":"GD Wambui","year":"2015","unstructured":"Wambui, G.D., Waititu, G.A., Wanjoya, A.K.: The power of the pruned exact linear time(pelt) test in multiple changepoint detection. Am. J. Theor. Appl. Stat. 4(6), 581\u2013586 (2015)","journal-title":"Am. J. Theor. Appl. Stat."}],"container-title":["Advances in Intelligent Systems and Computing","Intelligent Systems and Applications"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-55180-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,24]],"date-time":"2020-08-24T23:51:23Z","timestamp":1598313083000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-55180-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,25]]},"ISBN":["9783030551797","9783030551803"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-55180-3_2","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"type":"print","value":"2194-5357"},{"type":"electronic","value":"2194-5365"}],"subject":[],"published":{"date-parts":[[2020,8,25]]},"assertion":[{"value":"25 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"IntelliSys","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Proceedings of SAI Intelligent Systems Conference","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"London","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"intellisys2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/saiconference.com\/IntelliSys","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}