{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:02:58Z","timestamp":1742943778802,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319180311"},{"type":"electronic","value":"9783319180328"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18032-8_15","type":"book-chapter","created":{"date-parts":[[2015,5,8]],"date-time":"2015-05-08T05:41:54Z","timestamp":1431063714000},"page":"189-200","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Fast One-Class Support Vector Machine for Novelty Detection"],"prefix":"10.1007","author":[{"given":"Trung","family":"Le","sequence":"first","affiliation":[]},{"given":"Dinh","family":"Phung","sequence":"additional","affiliation":[]},{"given":"Khanh","family":"Nguyen","sequence":"additional","affiliation":[]},{"given":"Svetha","family":"Venkatesh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,5,9]]},"reference":[{"key":"15_CR1","unstructured":"Abbey, A.S., Temitope, O., Lionel, S.: Active platform security through intrusion detection using naive bayesian network for anomaly detection. In: Proceedings of London Communications Symposium (2002)"},{"key":"15_CR2","doi-asserted-by":"publisher","first-page":"2891","DOI":"10.1080\/01431160110055804","volume":"23","author":"MF Augusteijn","year":"2002","unstructured":"Augusteijn, M.F., Folkert, B.A.: Neural network classification and novelty detection. International Journal of Remote Sensing 23, 2891\u20132902 (2002)","journal-title":"International Journal of Remote Sensing"},{"key":"15_CR3","unstructured":"Badoiu, M., Clarkson, K.L.: Optimal core-sets for balls. In: Proc. of DIMACS Workshop on Computational Geometry (2002)"},{"issue":"3","key":"15_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv."},{"issue":"3","key":"15_CR5","doi-asserted-by":"publisher","first-page":"27:1","DOI":"10.1145\/1961189.1961199","volume":"2","author":"C-C Chang","year":"2011","unstructured":"Chang, C.-C., Lin, C.-J.: Libsvm: A library for support vector machines. ACM Trans. Intell. Syst. Technol. 2(3), 27:1\u201327:27 (2011)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"15_CR6","unstructured":"Fan, W., Miller, M., Stolfo, S.J., Lee, W.: Using artificial anomalies to detect unknown and known network intrusions. In: Proceedings of the first IEEE International Conference on Data Mining, pp. 123\u2013130. IEEE Computer Society (2001)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Fawcett, T., Provost, F.: Activity monitoring: noticing interesting changes in behavior. In: Proceedings of the Fifth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 53\u201362 (1999)","DOI":"10.1145\/312129.312195"},{"issue":"4","key":"15_CR8","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1007\/s10115-004-0174-5","volume":"7","author":"R Gwadera","year":"2005","unstructured":"Gwadera, R., Atallah, M.J., Szpankowski, W.: Reliable detection of episodes in event sequences. Knowl. Inf. Syst. 7(4), 415\u2013437 (2005)","journal-title":"Knowl. Inf. Syst."},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1007\/s10994-009-5108-8","volume":"77","author":"T Joachims","year":"2009","unstructured":"Joachims, T., Finley, T., Yu, C.-N.J.: Cutting-plane training of structural svms. Machine Learning 77(1), 27\u201359 (2009)","journal-title":"Machine Learning"},{"issue":"2\u20133","key":"15_CR10","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s10994-009-5126-6","volume":"76","author":"T Joachims","year":"2009","unstructured":"Joachims, T., Yu, C.-N.J.: Sparse kernel svms via cutting-plane training. Machine Learning 76(2\u20133), 179\u2013193 (2009)","journal-title":"Machine Learning"},{"key":"15_CR11","first-page":"703","volume":"8","author":"JE Kelley","year":"1960","unstructured":"Kelley, J.E.: The cutting plane method for solving convex programs. Journal of the SIAM 8, 703\u2013712 (1960)","journal-title":"Journal of the SIAM"},{"issue":"7","key":"15_CR12","doi-asserted-by":"publisher","first-page":"1443","DOI":"10.1162\/089976601750264965","volume":"13","author":"B Sch\u00f6lkopf","year":"2001","unstructured":"Sch\u00f6lkopf, B., Platt, J.C., Shawe-Taylor, J.C., Smola, A.J., Williamson, R.C.: Estimating the support of a high-dimensional distribution. Neural Comput. 13(7), 1443\u20131471 (2001)","journal-title":"Neural Comput."},{"issue":"1","key":"15_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/s10107-010-0420-4","volume":"127","author":"S Shalev-Shwartz","year":"2011","unstructured":"Shalev-Shwartz, S., Singer, Y., Srebro, N., Cotter, A.: Pegasos: Primal estimated sub-gradient solver for svm. Mathematical Programming 127(1), 3\u201330 (2011)","journal-title":"Mathematical Programming"},{"issue":"1","key":"15_CR14","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1023\/B:MACH.0000008084.60811.49","volume":"54","author":"DMJ Tax","year":"2004","unstructured":"Tax, D.M.J., Duin, R.P.W.: Support vector data description. Journal of Machine Learning Research 54(1), 45\u201366 (2004)","journal-title":"Journal of Machine Learning Research"},{"key":"15_CR15","doi-asserted-by":"crossref","unstructured":"Teo, C.H., Smola, A., Vishwanathan, SVN, Le, Q.V.: A scalable modular convex solver for regularized risk minimization. In: Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 727\u2013736. ACM (2007)","DOI":"10.1145\/1281192.1281270"},{"key":"15_CR16","first-page":"311","volume":"11","author":"CH Teo","year":"2010","unstructured":"Teo, C.H., Vishwanthan, S.V.N., Smola, A.J., Le, Q.V.: Bundle methods for regularized risk minimization. The Journal of Machine Learning Research 11, 311\u2013365 (2010)","journal-title":"The Journal of Machine Learning Research"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Tsang, I.W., Kocsor, A., Kwok, J.T.: Simpler core vector machines with enclosing balls. In: Proceedings of the 24th International Conference on Machine Learning, ICML 2007, pp. 911\u2013918 (2007)","DOI":"10.1145\/1273496.1273611"},{"key":"15_CR18","first-page":"363","volume":"6","author":"IW Tsang","year":"2005","unstructured":"Tsang, I.W., Kwok, J.T., Cheung, P., Cristianini, N.: Core vector machines: Fast svm training on very large data sets. Journal of Machine Learning Research 6, 363\u2013392 (2005)","journal-title":"Journal of Machine Learning Research"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18032-8_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,15]],"date-time":"2023-02-15T07:36:25Z","timestamp":1676446585000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-18032-8_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319180311","9783319180328"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18032-8_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"9 May 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}