{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:04:43Z","timestamp":1746417883253,"version":"3.40.4"},"publisher-location":"Cham","reference-count":12,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117393"},{"type":"electronic","value":"9783319117409"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11740-9_23","type":"book-chapter","created":{"date-parts":[[2014,9,25]],"date-time":"2014-09-25T09:05:14Z","timestamp":1411635914000},"page":"240-248","source":"Crossref","is-referenced-by-count":2,"title":["Communication Network Anomaly Detection Based on Log File Analysis"],"prefix":"10.1007","author":[{"given":"Xin","family":"Cheng","sequence":"first","affiliation":[]},{"given":"Ruizhi","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"23_CR1","unstructured":"Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. In: Proc. 20th Int. Con. Very Large Data Bases, VLDB, vol.\u00a01215, pp. 487\u2013499 (1994)"},{"key":"23_CR2","unstructured":"Dunia, R., Qin, S.J.: Multi-dimensional fault diagnosis using a subspace approach. In: American Control Conference. Citeseer (1997)"},{"issue":"1","key":"23_CR3","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10618-006-0059-1","volume":"15","author":"J. Han","year":"2007","unstructured":"Han, J., Cheng, H., Xin, D., Yan, X.: Frequent pattern mining: current status and future directions. Data Mining and Knowledge Discovery\u00a015(1), 55\u201386 (2007)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: ACM SIGMOD Record, vol.\u00a029, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/335191.335372"},{"issue":"3","key":"23_CR5","doi-asserted-by":"publisher","first-page":"341","DOI":"10.1080\/00401706.1979.10489779","volume":"21","author":"J.E. Jackson","year":"1979","unstructured":"Jackson, J.E., Mudholkar, G.S.: Control procedures for residuals associated with principal component analysis. Technometrics\u00a021(3), 341\u2013349 (1979)","journal-title":"Technometrics"},{"key":"23_CR6","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. In: ACM SIGCOMM Computer Communication Review, vol.\u00a034, pp. 219\u2013230. ACM (2004)","DOI":"10.1145\/1030194.1015492"},{"key":"23_CR7","doi-asserted-by":"crossref","unstructured":"Makanju, A.A., Zincir-Heywood, A.N., Milios, E.E.: Clustering event logs using iterative partitioning. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1255\u20131264. ACM (2009)","DOI":"10.1145\/1557019.1557154"},{"key":"23_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1007\/978-3-540-30179-0_27","volume-title":"Intelligence in Communication Systems","author":"R. Vaarandi","year":"2004","unstructured":"Vaarandi, R.: A breadth-first algorithm for mining frequent patterns from event logs. In: Aagesen, F.A., Anutariya, C., Wuwongse, V. (eds.) INTELLCOMM 2004. LNCS, vol.\u00a03283, pp. 293\u2013308. Springer, Heidelberg (2004)"},{"key":"23_CR9","doi-asserted-by":"crossref","unstructured":"Vaarandi, R., et al.: A data clustering algorithm for mining patterns from event logs. In: Proceedings of the 2003 IEEE Workshop on IP Operations and Management (IPOM), pp. 119\u2013126 (2003)","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"23_CR10","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles, pp. 117\u2013132. ACM (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.I.: Online system problem detection by mining patterns of console logs. In: Ninth IEEE International Conference on Data Mining, ICDM 2009, pp. 588\u2013597. IEEE (2009)","DOI":"10.1109\/ICDM.2009.19"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Yamanishi, K., Maruyama, Y.: Dynamic syslog mining for network failure monitoring. In: Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, pp. 499\u2013508. ACM (2005)","DOI":"10.1145\/1081870.1081927"}],"container-title":["Lecture Notes in Computer Science","Rough Sets and Knowledge Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11740-9_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T20:26:01Z","timestamp":1746390361000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-11740-9_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117393","9783319117409"],"references-count":12,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11740-9_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}