{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T06:08:39Z","timestamp":1764828519959,"version":"3.41.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319238678"},{"type":"electronic","value":"9783319238685"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-23868-5_11","type":"book-chapter","created":{"date-parts":[[2015,8,29]],"date-time":"2015-08-29T10:50:50Z","timestamp":1440845450000},"page":"151-167","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Fuzzy Historical Graph Pattern Matching\u00a0 A NoSQL Graph Database Approach for Fraud Ring Resolution"],"prefix":"10.1007","author":[{"given":"Arnaud","family":"Castelltort","sequence":"first","affiliation":[]},{"given":"Anne","family":"Laurent","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,15]]},"reference":[{"issue":"5","key":"11_CR1","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1145\/876638.876639","volume":"50","author":"P.J. Andrei Krokhin","year":"2003","unstructured":"Andrei Krokhin, P.J., Jonsson, P.: Reasoning about temporal relations: The tractable subalgebras of allen\u2019s interval algebra. Journal of ACM\u00a050(5), 591\u2013640 (2003)","journal-title":"Journal of ACM"},{"key":"11_CR2","unstructured":"Angles, R., Barcel, P., Ros, G.: A practical query language for graph dbs. In: 7th Alberto Mendelzon International Workshop on Foundations of Data Management (AMW) (2013)"},{"key":"11_CR3","doi-asserted-by":"crossref","unstructured":"Angles, R., Guti\u00e9rrez, C.: Survey of graph database models. ACM Comput. Surv.\u00a040(1) (2008)","DOI":"10.1145\/1322432.1322433"},{"key":"11_CR4","unstructured":"Auer, S., Herre, H.: A versioning and evolution framework for RDF knowledge bases. In: Virbitskaite, I., Voronkov, A. (eds.) PSI 2006. LNCS, vol.\u00a04378, pp. 55\u201369. Springer, Heidelberg (2007). http:\/\/dl.acm.org\/citation.cfm?id=1760700.1760710"},{"key":"11_CR5","unstructured":"Bastani, K.: In: Bank Fraud Detection (2014). https:\/\/github.com\/neo4j-contrib\/gists\/blob\/master\/other\/BankFraudDetection.adoc"},{"key":"11_CR6","unstructured":"Board, T.T.A.: Technology radar, May 2013. http:\/\/thoughtworks.fileburst.com\/assets\/technology-radar-may-2013.pdf"},{"key":"11_CR7","doi-asserted-by":"crossref","unstructured":"Bondy, J.A.: Graph Theory With Applications. Elsevier Science Ltd (1976)","DOI":"10.1007\/978-1-349-03521-2"},{"key":"11_CR8","doi-asserted-by":"crossref","unstructured":"Castelltort, A., Laurent, A.: Representing history in graph-oriented nosql databases: A versioning system. In: Proc. of the Int. Conf. on Digital Information Management (2013)","DOI":"10.1109\/ICDIM.2013.6694022"},{"key":"11_CR9","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009). http:\/\/doi.acm.org\/10.1145\/1541880.1541882"},{"key":"11_CR10","unstructured":"Chawathe, S.S., Abiteboul, S., Widom, J.: Representing and querying changes in semistructured data. In: Proc. of the ICDE Conf. (1998)"},{"key":"11_CR11","doi-asserted-by":"crossref","unstructured":"Conte, D., Foggia, P., Sansone, C., Vento, M.: Thirty Years Of Graph Matchin In Pattern Recognition. International Journal of Pattern Recognition and Artificial Intelligence (2004)","DOI":"10.1142\/S0218001404003228"},{"key":"11_CR12","unstructured":"He, H., Singh, A.K.: Graphs-at-a-time: Query language and access methods for graph databases. In: Proceedings of the 2008 ACM SIGMOD International Conference on Management of Data, SIGMOD 2008, pp. 405\u2013418. ACM, New York (2008). http:\/\/doi.acm.org\/10.1145\/1376616.1376660"},{"key":"11_CR13","unstructured":"Horvth, T., Grtner, T., Wrobel, S.: Cyclic pattern kernels for predictive graph mining. In: Kim, W., Kohavi, R., Gehrke, J., DuMouchel, W. (eds.) Proceedings of the 10t ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2004), Seattle, WA, USA, August 22-25, pp. 158\u2013167. ACM Press, New York (2004). http:\/\/doi.acm.org\/10.1145\/1014052.1014072"},{"key":"11_CR14","unstructured":"Jedrzejek, C., Bak, J., Falkowski, M.: Graph mining for detection of a large class of financial crimes. In: 17th International Conference on Conceptural structure (ICCS 2009) (2009)"},{"key":"11_CR15","doi-asserted-by":"crossref","unstructured":"Khurana, U., Deshpande, A.: Efficient snapshot retrieval over historical graph data. In: Jensen, C.S., Jermaine, C.M., Zhou, X. (eds.) ICDE, pp. 997\u20131008. IEEE Computer Society (2013)","DOI":"10.1109\/ICDE.2013.6544892"},{"key":"11_CR16","unstructured":"Kuramochi, M., Karypis, G.: Frequent subgraph discovery. In: Proceedings of the 2001 IEEE International Conference on Data Mining, ICDM 2001, pp. 313\u2013320. IEEE Computer Society Press, Washington, DC (2001). http:\/\/dl.acm.org\/citation.cfm?id=645496.658027"},{"key":"11_CR17","doi-asserted-by":"crossref","unstructured":"Lee, K.Y., Chung, Y.D., Kim, M.H.: An efficient method for maintaining data cubes incrementally. Inf. Sci.\u00a0180(6), 928\u2013948 (2010). http:\/\/dx.doi.org\/10.1016\/j.ins.2009.11.037","DOI":"10.1016\/j.ins.2009.11.037"},{"key":"11_CR18","unstructured":"Leontjeva, A., Tretyakov, K., Vilo, J., Tamkivi, T.: Fraud detection: Methods of analysis for hypergraph data. In: ASONAM, pp. 1060\u20131064. IEEE Computer Society (2012). http:\/\/dblp.uni-trier.de\/db\/conf\/asunam\/asonam2012.html#LeontjevaTVT12"},{"key":"11_CR19","doi-asserted-by":"crossref","unstructured":"Noble, C.C., Cook, D.J.: Graph-based anomaly detection. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2003, pp. 631\u2013636. ACM (2003)","DOI":"10.1145\/956804.956831"},{"key":"11_CR20","doi-asserted-by":"crossref","unstructured":"Papavasileiou, V., Flouris, G., Fundulaki, I., Kotzinos, D., Christophides, V.: High-level change detection in rdf(s) kbs. ACM Trans. Database Syst. 38(1), 1:1\u20131:42 (2013). http:\/\/doi.acm.org\/http:\/\/dx.doi.org\/10.1145\/2445583.2445584","DOI":"10.1145\/2445583.2445584"},{"key":"11_CR21","unstructured":"Robinson, I., Webber, J., Eifrem, E.: Graph Databases. O\u2019Reilly (2013)"},{"key":"11_CR22","unstructured":"Sadowski, G., Rathle, P.: Fraud detection: Discovering connections with graph databases. In: White Paper - Neo Technology - Graphs are Everywhere (2014)"},{"key":"11_CR23","unstructured":"Schockaert, S., Cock, M.D., Kerre, E.E.: Fuzzifying allen\u2019s temporal interval relations. IEEE T. Fuzzy Systems\u00a016(2), 517\u2013533 (2008). http:\/\/dblp.uni-trier.de\/db\/journals\/tfs\/tfs16.html#SchockaertCK08"},{"key":"11_CR24","unstructured":"W3C: Allegrograph rdfstore web 3.0\u2019s database (2009)"},{"key":"11_CR25","doi-asserted-by":"crossref","unstructured":"Wang, J., Zhang, K., Chirn, G.: The approximate graph matching problem. In: Pattern Recognition, Proceedings of the 12th International Conference on IAPR, vol.\u00a094, pp. 284\u2013288 (1994)","DOI":"10.1109\/ICPR.1994.576921"},{"key":"11_CR26","doi-asserted-by":"crossref","unstructured":"Wood, P.T.: Query languages for graph databases. SIGMOD Rec.\u00a041(1), 50\u201360 (2012). http:\/\/doi.acm.org\/10.1145\/2206869.2206879 , doi:10.1145\/2206869.2206879","DOI":"10.1145\/2206869.2206879"},{"key":"11_CR27","unstructured":"Yan, X., Han, J.: gspan: Graph-based substructure pattern mining. In: Proceedings of the 2002 IEEE International Conference on Data Mining, ICDM 2002, pp. 721\u2013724. IEEE Computer Society, Washington, DC (2002). http:\/\/dl.acm.org\/citation.cfm?id=844380.844811"}],"container-title":["IFIP Advances in Information and Communication Technology","Artificial Intelligence Applications and Innovations"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-23868-5_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,30]],"date-time":"2025-05-30T08:46:47Z","timestamp":1748594807000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-23868-5_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319238678","9783319238685"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-23868-5_11","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"15 November 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}