{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,23]],"date-time":"2025-11-23T03:08:58Z","timestamp":1763867338655,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031314872"},{"type":"electronic","value":"9783031314889"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-31488-9_7","type":"book-chapter","created":{"date-parts":[[2023,5,12]],"date-time":"2023-05-12T23:02:15Z","timestamp":1683932535000},"page":"121-136","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Comparing Anomaly Detection and Classification Algorithms: A Case Study in Two Domains"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-9052-0864","authenticated-orcid":false,"given":"Miroslaw","family":"Staron","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5146-0205","authenticated-orcid":false,"given":"Helena Odenstedt","family":"Herg\u00e9s","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7736-0093","authenticated-orcid":false,"given":"Linda","family":"Block","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Sj\u00f6din","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,13]]},"reference":[{"key":"7_CR1","unstructured":"Ahmed, T., Oreshkin, B., Coates, M.: Machine learning approaches to network anomaly detection. In: Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques, pp. 1\u20136. USENIX Association (2007)"},{"issue":"1","key":"7_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.3390\/bdcc5010001","volume":"5","author":"O Alghushairy","year":"2020","unstructured":"Alghushairy, O., Alsini, R., Soule, T., Ma, X.: A review of local outlier factor algorithms for outlier detection in big data streams. Big Data Cogn. Comput. 5(1), 1 (2020)","journal-title":"Big Data Cogn. Comput."},{"issue":"9","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1335","DOI":"10.1111\/aas.13657","volume":"64","author":"L Block","year":"2020","unstructured":"Block, L., El-Merhi, A., Liljencrantz, J., Naredi, S., Staron, M., Odenstedt Herg\u00e8s, H.: Cerebral ischemia detection using artificial intelligence (CIDAI) - a study protocol. Acta Anaesthesiol. Scand. 64(9), 1335\u20131342 (2020)","journal-title":"Acta Anaesthesiol. Scand."},{"issue":"1","key":"7_CR4","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman, L.: Random forests. Mach. Learn. 45(1), 5\u201332 (2001)","journal-title":"Mach. Learn."},{"issue":"2","key":"7_CR5","doi-asserted-by":"publisher","DOI":"10.1002\/wat2.1337","volume":"6","author":"C Chwala","year":"2019","unstructured":"Chwala, C., Kunstmann, H.: Commercial microwave link networks for rainfall observation: assessment of the current status and future challenges. Wiley Interdiscip. Rev. Water 6(2), e1337 (2019)","journal-title":"Wiley Interdiscip. Rev. Water"},{"issue":"3","key":"7_CR6","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/s12028-015-0139-4","volume":"22","author":"G Citerio","year":"2015","unstructured":"Citerio, G., et al.: Data collection and interpretation. Neurocrit. Care 22(3), 360\u2013368 (2015)","journal-title":"Neurocrit. Care"},{"key":"7_CR7","doi-asserted-by":"crossref","unstructured":"Eltanbouly, S., Bashendy, M., AlNaimi, N., Chkirbene, Z., Erbad, A.: Machine learning techniques for network anomaly detection: a survey. In: 2020 IEEE International Conference on Informatics, IoT, and Enabling Technologies (ICIoT), pp. 156\u2013162. IEEE (2020)","DOI":"10.1109\/ICIoT48696.2020.9089465"},{"key":"7_CR8","unstructured":"Feurer, M., Eggensperger, K., Falkner, S., Lindauer, M., Hutter, F.: Auto-sklearn 2.0: hands-free AutoML via meta-learning. arXiv preprint arXiv:2007.04074 (2020)"},{"key":"7_CR9","doi-asserted-by":"crossref","unstructured":"Gao, Y., Ao, H., Wang, K., Zhou, W., Li, Y.: The diagnosis of wired network malfunctions based on big data and traffic prediction: an overview. In: 2015 4th International Conference on Computer Science and Network Technology (ICCSNT), vol. 1, pp. 1204\u20131208. IEEE (2015)","DOI":"10.1109\/ICCSNT.2015.7490949"},{"issue":"3","key":"7_CR10","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1097\/WNP.0000000000000279","volume":"33","author":"N Gaspard","year":"2016","unstructured":"Gaspard, N.: Current clinical evidence supporting the use of continuous EEG monitoring for delayed cerebral ischemia detection. J. Clin. Neurophysiol. 33(3), 211\u2013216 (2016)","journal-title":"J. Clin. Neurophysiol."},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1016\/j.ijinfomgt.2018.08.006","volume":"45","author":"RAA Habeeb","year":"2019","unstructured":"Habeeb, R.A.A., Nasaruddin, F., Gani, A., Hashem, I.A.T., Ahmed, E., Imran, M.: Real-time big data processing for anomaly detection: a survey. Int. J. Inf. Manage. 45, 289\u2013307 (2019)","journal-title":"Int. J. Inf. Manage."},{"key":"7_CR12","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1016\/j.eswa.2016.12.035","volume":"73","author":"G Haixiang","year":"2017","unstructured":"Haixiang, G., Yijing, L., Shang, J., Mingyun, G., Yuanyue, H., Bing, G.: Learning from class-imbalanced data: review of methods and applications. Expert Syst. Appl. 73, 220\u2013239 (2017)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"7_CR13","doi-asserted-by":"publisher","DOI":"10.1002\/wics.1421","volume":"10","author":"M Hubert","year":"2018","unstructured":"Hubert, M., Debruyne, M., Rousseeuw, P.J.: Minimum covariance determinant and extensions. Wiley Interdiscip. Rev. Comput. Stat. 10(3), e1421 (2018)","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"issue":"9","key":"7_CR14","doi-asserted-by":"publisher","first-page":"1298","DOI":"10.1007\/s00134-019-05662-6","volume":"45","author":"M Komorowski","year":"2019","unstructured":"Komorowski, M.: Artificial intelligence in intensive care: are we there yet? Intensive Care Med. 45(9), 1298\u20131300 (2019). https:\/\/doi.org\/10.1007\/s00134-019-05662-6","journal-title":"Intensive Care Med."},{"issue":"5","key":"7_CR15","doi-asserted-by":"publisher","first-page":"2313","DOI":"10.1053\/j.jvca.2018.03.032","volume":"32","author":"C Lewis","year":"2018","unstructured":"Lewis, C., Parulkar, S.D., Bebawy, J., Sherwani, S., Hogue, C.W.: Cerebral neuromonitoring during cardiac surgery: a critical appraisal with an emphasis on near-infrared spectroscopy. J. Cardiothorac. Vasc. Anesth. 32(5), 2313\u20132322 (2018)","journal-title":"J. Cardiothorac. Vasc. Anesth."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"11","key":"7_CR17","first-page":"2579","volume":"9","author":"LVD Maaten","year":"2008","unstructured":"Maaten, L.V.D., Hinton, G.: Visualizing data using t-SNE. J. Mach. Learn. Res. 9(11), 2579\u20132605 (2008)","journal-title":"J. Mach. Learn. Res."},{"issue":"6","key":"7_CR18","doi-asserted-by":"publisher","first-page":"930","DOI":"10.1007\/s00134-018-5125-9","volume":"44","author":"EF Maringer","year":"2018","unstructured":"Maringer, E.F., Shiland, J., Brodie, D.: There\u2019s more to medicine than machines. Intensive Care Med. 44(6), 930\u2013931 (2018)","journal-title":"Intensive Care Med."},{"issue":"2","key":"7_CR19","doi-asserted-by":"publisher","first-page":"1934","DOI":"10.1109\/TNSM.2020.3039938","volume":"18","author":"F Musumeci","year":"2020","unstructured":"Musumeci, F., et al.: Supervised and semi-supervised learning for failure identification in microwave networks. IEEE Trans. Netw. Serv. Manage. 18(2), 1934\u20131945 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"7_CR20","doi-asserted-by":"crossref","unstructured":"Omar, S., Ngadi, A., Jebur, H.H.: Machine learning techniques for anomaly detection: an overview. Int. J. Comput. Appl. 79(2) (2013)","DOI":"10.5120\/13715-1478"},{"key":"7_CR21","unstructured":"Pandazo, K., Shollo, A., Staron, M., Meding, W.: Presenting software metrics indicators: a case study. In: Proceedings of the 20th International Conference on Software Product and Process Measurement (MENSURA), vol. 20 (2010)"},{"issue":"7","key":"7_CR22","doi-asserted-by":"publisher","first-page":"3835","DOI":"10.5194\/amt-13-3835-2020","volume":"13","author":"J Polz","year":"2020","unstructured":"Polz, J., Chwala, C., Graf, M., Kunstmann, H.: Rain event detection in commercial microwave link attenuation data using convolutional neural networks. Atmos. Meas. Tech. 13(7), 3835\u20133853 (2020)","journal-title":"Atmos. Meas. Tech."},{"key":"7_CR23","unstructured":"Provost, F.: Machine learning from imbalanced data sets 101. In: Proceedings of the AAAI\u20192000 Workshop on Imbalanced Data Sets, vol. 68, pp. 1\u20133. AAAI Press (2000)"},{"key":"7_CR24","doi-asserted-by":"crossref","unstructured":"Pudashine, J., et al.: Deep learning for an improved prediction of rainfall retrievals from commercial microwave links. Water Resour. Res. 56(7) (2020)","DOI":"10.1029\/2019WR026255"},{"issue":"5","key":"7_CR25","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1136\/neurintsurg-2018-014258","volume":"11","author":"LA Ramos","year":"2019","unstructured":"Ramos, L.A., et al.: Machine learning improves prediction of delayed cerebral ischemia in patients with subarachnoid hemorrhage. J. Neurointerv. Surg. 11(5), 497\u2013502 (2019)","journal-title":"J. Neurointerv. Surg."},{"issue":"4","key":"7_CR26","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1109\/MS.2011.49","volume":"28","author":"A Sandberg","year":"2011","unstructured":"Sandberg, A., Pareto, L., Arts, T.: Agile collaborative research: action principles for industry-academia collaboration. IEEE Softw. 28(4), 74\u201383 (2011)","journal-title":"IEEE Softw."},{"issue":"3","key":"7_CR27","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1097\/WNP.0000000000000286","volume":"33","author":"JM Schmidt","year":"2016","unstructured":"Schmidt, J.M.: Heart rate variability for the early detection of delayed cerebral ischemia. J. Clin. Neurophysiol. 33(3), 268\u2013274 (2016)","journal-title":"J. Clin. Neurophysiol."},{"key":"7_CR28","doi-asserted-by":"crossref","unstructured":"Staron, M., et al.: Robust machine learning in critical care - software engineering and medical perspectives. In: 2021 IEEE\/ACM 1st Workshop on AI Engineering-Software Engineering for AI (WAIN), pp. 62\u201369. IEEE (2021)","DOI":"10.1109\/WAIN52551.2021.00016"},{"key":"7_CR29","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1007\/978-3-642-35702-2_14","volume-title":"Software Quality. Increasing Value in Software and Systems Development","author":"M Staron","year":"2013","unstructured":"Staron, M., Meding, W., Caiman, M.: Improving completeness of measurement systems for monitoring software development workflows. In: Winkler, D., Biffl, S., Bergsmann, J. (eds.) SWQD 2013. LNBIP, vol. 133, pp. 230\u2013243. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-35702-2_14"},{"key":"7_CR30","unstructured":"Swedish Meteorological Institute: SMHI \u00f6ppna data meteorologiska observationer (2017). https:\/\/www.smhi.se"},{"issue":"1","key":"7_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s40537-020-00320-x","volume":"7","author":"S Thudumu","year":"2020","unstructured":"Thudumu, S., Branch, P., Jin, J., Singh, J.J.: A comprehensive survey of anomaly detection techniques for high dimensional big data. J. Big Data 7(1), 1\u201330 (2020). https:\/\/doi.org\/10.1186\/s40537-020-00320-x","journal-title":"J. Big Data"}],"container-title":["Lecture Notes in Business Information Processing","Software Quality: Higher Software Quality through Zero Waste Development"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-31488-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,10,20]],"date-time":"2024-10-20T09:11:33Z","timestamp":1729415493000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-31488-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031314872","9783031314889"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-31488-9_7","relation":{},"ISSN":["1865-1348","1865-1356"],"issn-type":[{"type":"print","value":"1865-1348"},{"type":"electronic","value":"1865-1356"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"13 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SWQD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Quality","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Munich","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Germany","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 May 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 May 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"swqd2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.software-quality-days.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"10","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"40% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The proceedings also include one keynote paper","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}