{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T07:40:09Z","timestamp":1748590809558,"version":"3.41.0"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319234601"},{"type":"electronic","value":"9783319234618"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23461-8_4","type":"book-chapter","created":{"date-parts":[[2015,8,28]],"date-time":"2015-08-28T08:20:16Z","timestamp":1440750016000},"page":"53-67","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Early Detection of Fraud Storms in the Cloud"],"prefix":"10.1007","author":[{"given":"Hani","family":"Neuvirth","sequence":"first","affiliation":[]},{"given":"Yehuda","family":"Finkelstein","sequence":"additional","affiliation":[]},{"given":"Amit","family":"Hilbuch","sequence":"additional","affiliation":[]},{"given":"Shai","family":"Nahum","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Alon","sequence":"additional","affiliation":[]},{"given":"Elad","family":"Yom-Tov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,29]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Bhaduri, K., Das, K., Matthews, B.L.: Detecting abnormal machine characteristics in cloud infrastructures. In: 2011 IEEE 11th International Conference on Data Mining Workshops (ICDMW), pp. 137\u2013144. IEEE (2011)","DOI":"10.1109\/ICDMW.2011.62"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Tung, T., Xie, Q.: Automatic fault diagnosis in cloud infrastructure. In: 2013 IEEE 5th International Conference on Cloud Computing Technology and Science (CloudCom), pp. 467\u2013474. IEEE (2013)","DOI":"10.1109\/CloudCom.2013.68"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Hormozi, E., Hormozi, H., Akbari, M.K., Javan, M.S.: Using of machine learning into cloud environment (A Survey): managing and scheduling of resources in cloud systems. In: 2012 Seventh International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), pp. 363\u2013368 (2012)","DOI":"10.1109\/3PGCIC.2012.69"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Beloglazov, A., Buyya, R.: Energy efficient resource management in virtualized cloud data centers. In: Proceedings of the 2010 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing, pp. 826\u2013831. IEEE Computer Society (2010)","DOI":"10.1109\/CCGRID.2010.46"},{"key":"4_CR5","doi-asserted-by":"publisher","first-page":"755","DOI":"10.1016\/j.future.2011.04.017","volume":"28","author":"A Beloglazov","year":"2012","unstructured":"Beloglazov, A., Abawajy, J., Buyya, R.: Energy-aware resource allocation heuristics for efficient management of data centers for cloud computing. Future Gener. Comput. Syst. 28, 755\u2013768 (2012)","journal-title":"Future Gener. Comput. Syst."},{"key":"4_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/1869-0238-4-5","volume":"4","author":"K Hashizume","year":"2013","unstructured":"Hashizume, K., Rosado, D.G., Fern\u00e1ndez-Medina, E., Fernandez, E.B.: An analysis of security issues for cloud computing. J. Internet Serv. Appl. 4, 1\u201313 (2013)","journal-title":"J. Internet Serv. Appl."},{"key":"4_CR7","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10207-013-0208-7","volume":"13","author":"DA Fernandes","year":"2014","unstructured":"Fernandes, D.A., Soares, L.F., Gomes, J.V., Freire, M.M., In\u00e1cio, P.R.: Security issues in cloud environments: a survey. Int. J. Inf. Secur. 13, 113\u2013170 (2014)","journal-title":"Int. J. Inf. Secur."},{"key":"4_CR8","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"62","DOI":"10.1007\/978-3-642-36318-4_3","volume-title":"Business Intelligence","author":"G Bontempi","year":"2013","unstructured":"Bontempi, G., Ben Taieb, S., Le Borgne, Y.-A.: Machine learning strategies for time series forecasting. In: Aufaure, M.-A., Zim\u00e1nyi, E. (eds.) eBISS 2012. LNBIP, vol. 138, pp. 62\u201377. Springer, Heidelberg (2013)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Aggarwal, C.C.: Outlier analysis. Springer Science & Business Media (2013)","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"4_CR10","first-page":"15","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. CSUR. 41, 15 (2009)","journal-title":"ACM Comput. Surv. CSUR."},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Wang, C., Talwar, V., Schwan, K., Ranganathan, P.: Online detection of utility cloud anomalies using metric distributions. In: 2010 IEEE Network Operations and Management Symposium (NOMS), pp. 96\u2013103. IEEE (2010)","DOI":"10.1109\/NOMS.2010.5488443"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Wang, C., Viswanathan, K., Choudur, L., Talwar, V., Satterfield, W., Schwan, K.: Statistical techniques for online anomaly detection in data centers. In: 2011 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 385\u2013392 (2011)","DOI":"10.1109\/INM.2011.5990537"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Dean, D.J., Nguyen, H., Gu, X.: Ubl: unsupervised behavior learning for predicting performance anomalies in virtualized cloud systems. In: Proceedings of the 9th International Conference on Autonomic Computing, pp. 191\u2013200. ACM (2012)","DOI":"10.1145\/2371536.2371572"},{"key":"4_CR14","unstructured":"Vallis, O., Hochenbaum, J., Kejariwal, A.: A novel technique for long-term anomaly detection in the cloud. In: Proceedings of the 6th USENIX Conference on Hot Topics in Cloud Computing, USENIX Association, Berkeley, CA, USA, pp. 15\u201315 (2014)"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Li, L., McCann, J., Pollard, N.S., Faloutsos, C.: Dynammo: Mining and summarization of coevolving sequences with missing values. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 507\u2013516. ACM (2009)","DOI":"10.1145\/1557019.1557078"},{"key":"4_CR16","unstructured":"Wellenzohn, K., Mitterer, H., Gamper, J., B\u00f6hlen, M.H., Khayati, M.: Missing Value Imputation in Time Series using Top-k Case Matching"},{"key":"4_CR17","unstructured":"Xie, Y., Huang, J., Willett, R.: Changepoint detection for high-dimensional time series with missing data. ArXiv Prepr. ArXiv12085062 (2012)"},{"key":"4_CR18","doi-asserted-by":"publisher","first-page":"42","DOI":"10.1016\/j.jnca.2012.05.003","volume":"36","author":"C Modi","year":"2013","unstructured":"Modi, C., Patel, D., Borisaniya, B., Patel, H., Patel, A., Rajarajan, M.: A survey of intrusion detection techniques in Cloud. J. Netw. Comput. Appl. 36, 42\u201357 (2013)","journal-title":"J. Netw. Comput. Appl."},{"key":"4_CR19","unstructured":"Bay, S., Saito, K., Ueda, N., Langley, P.: A framework for discovering anomalous regimes in multivariate time-series data with local models. In: Symposium on Machine Learning for Anomaly Detection, Stanford, USA (2004)"},{"key":"4_CR20","doi-asserted-by":"publisher","first-page":"212","DOI":"10.1080\/00401706.1999.10485670","volume":"41","author":"PJ Rousseeuw","year":"1999","unstructured":"Rousseeuw, P.J., Driessen, K.V.: A fast algorithm for the minimum covariance determinant estimator. Technometrics 41, 212\u2013223 (1999)","journal-title":"Technometrics"},{"key":"4_CR21","unstructured":"Multivariate normal distribution (2015). http:\/\/en.wikipedia.org\/w\/index.php?title=Multivariate_normal_distribution&oldid=651587942"},{"key":"4_CR22","doi-asserted-by":"crossref","unstructured":"Genz, A., Bretz, F.: Computation of multivariate normal and t probabilities. Springer Science & Business Media (2009)","DOI":"10.1007\/978-3-642-01689-9"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23461-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T07:00:36Z","timestamp":1748588436000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23461-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319234601","9783319234618"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23461-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"29 August 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}