{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,20]],"date-time":"2026-01-20T03:30:47Z","timestamp":1768879847637,"version":"3.49.0"},"publisher-location":"Cham","reference-count":29,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319469218","type":"print"},{"value":"9783319469225","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46922-5_25","type":"book-chapter","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T06:40:50Z","timestamp":1474353650000},"page":"321-332","source":"Crossref","is-referenced-by-count":3,"title":["Exploring Data Mining Techniques in Medical Data Streams"],"prefix":"10.1007","author":[{"given":"Le","family":"Sun","sequence":"first","affiliation":[]},{"given":"Jiangang","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yanchun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,21]]},"reference":[{"key":"25_CR1","doi-asserted-by":"crossref","unstructured":"Brauckhoff, D., Salamatian, K., May, M.: A signal processing view on packet sampling and anomaly detection. In: 2010 Proceedings IEEE INFOCOM, pp. 1\u20139, March 2010","DOI":"10.1109\/INFCOM.2010.5462154"},{"issue":"1","key":"25_CR2","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1109\/TSMCC.2008.2007248","volume":"39","author":"S Budalakoti","year":"2009","unstructured":"Budalakoti, S., Budalakoti, S., Srivastava, A., Otey, M., Otey, M.: Anomaly detection and diagnosis algorithms for discrete symbol sequences with applications to airline safety. IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev. 39(1), 101\u2013113 (2009)","journal-title":"IEEE Trans. Syst. Man Cybern. Part C: Appl. Rev."},{"key":"25_CR3","doi-asserted-by":"crossref","first-page":"453","DOI":"10.1214\/aos\/1176347115","volume":"17","author":"A Buja","year":"1989","unstructured":"Buja, A., Hastie, T., Tibshirani, R.: Linear smoothers and additive models. Ann. Stat. 17, 453\u2013510 (1989)","journal-title":"Ann. Stat."},{"issue":"5","key":"25_CR4","doi-asserted-by":"crossref","first-page":"823","DOI":"10.1109\/TKDE.2010.235","volume":"24","author":"V Chandola","year":"2012","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection for discrete sequences: a survey. IEEE Trans. Knowl. Data Eng. 24(5), 823\u2013839 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Chandola, V., Mithal, V., Kumar, V.: Comparative evaluation of anomaly detection techniques for sequence data. In: IEEE International Conference on Data Mining, pp. 743\u2013748 (2008)","DOI":"10.1109\/ICDM.2008.151"},{"key":"25_CR6","unstructured":"Council, C.S.C.: Impact of cloud computing on healthcare. Technical report, Cloud Standards Customer Council, November 2012"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Das, S., Matthews, B.L., Srivastava, A.N., Oza, N.C.: Multiple kernel learning for heterogeneous anomaly detection: algorithm and aviation safety case study. In: Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 47\u201356. ACM (2010)","DOI":"10.1145\/1835804.1835813"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Majumdar, N.: Anomaly detection in multidimensional data using negative selection algorithm. In: Proceedings of the 2002 Congress on Evolutionary Computation, CEC 2002, vol. 2, pp. 1039\u20131044 (2002)","DOI":"10.1109\/CEC.2002.1004386"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Dasgupta, D., Nino, F.: A comparison of negative and positive selection algorithms in novel pattern detection. In: 2000 IEEE International Conference on Systems, Man, and Cybernetics, vol. 1, pp. 125\u2013130 (2000)","DOI":"10.1109\/ICSMC.2000.884976"},{"key":"25_CR10","unstructured":"Durairaj, M., Ranjani, V.: Data mining applications in healthcare sector a study. Int. J. Sci. Technol. Res. 2(10) (2013)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Forrest, S., Hofmeyr, S.A., Somayaji, A., Longstaff, T.A.: A sense of self for unix processes. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, SP 1996, p. 120 (1996). http:\/\/dl.acm.org\/citation.cfm?id=525080.884258","DOI":"10.1109\/SECPRI.1996.502675"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Gao, B., Ma, H.Y., Yang, Y.H.: Hmms (hidden markov models) based on anomaly intrusion detection method. In: Proceedings of the 2002 International Conference on Machine Learning and Cybernetics, vol. 1, pp. 381\u2013385 (2002)","DOI":"10.1109\/ICMLC.2002.1176779"},{"key":"25_CR13","unstructured":"Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the 1st Conference on Workshop on Intrusion Detection and Network Monitoring, ID\u201999, vol. 1, p. 6. USENIX Association, Berkeley (1999). http:\/\/dl.acm.org\/citation.cfm?id=1267880.1267886"},{"issue":"23","key":"25_CR14","doi-asserted-by":"crossref","first-page":"e215","DOI":"10.1161\/01.CIR.101.23.e215","volume":"101","author":"AL Goldberger","year":"2000","unstructured":"Goldberger, A.L., Amaral, L.A., Glass, L., Hausdorff, J.M., Ivanov, P.C., Mark, R.G., Mietus, J.E., Moody, G.B., Peng, C.K., Stanley, H.E.: Physiobank, physiotoolkit, and physionet components of a new research resource for complex physiologic signals. Circulation 101(23), e215\u2013e220 (2000)","journal-title":"Circulation"},{"key":"25_CR15","doi-asserted-by":"crossref","first-page":"857","DOI":"10.2307\/2528823","volume":"27","author":"JC Gower","year":"1971","unstructured":"Gower, J.C.: A general coefficient of similarity and some of its properties. Biometrics 27, 857\u2013871 (1971)","journal-title":"Biometrics"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Hofmeyr, S.A., Forrest, S., Somayaji, A.: Intrusion detection using sequences of system calls. J. Comput. Secur. 6(3), 151\u2013180. http:\/\/dl.acm.org\/citation.cfm?id=1298081.1298084","DOI":"10.3233\/JCS-980109"},{"issue":"4","key":"25_CR17","doi-asserted-by":"crossref","first-page":"577","DOI":"10.1016\/S0261-3794(99)00028-1","volume":"19","author":"WG Jacoby","year":"2000","unstructured":"Jacoby, W.G.: Loess: a nonparametric, graphical tool for depicting relationships between variables. Electoral. Stud. 19(4), 577\u2013613 (2000)","journal-title":"Electoral. Stud."},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Khalid, S.: Activity classification and anomaly detection using m-mediods based modelling of motion patterns. Pattern Recogn. 43(10), 3636\u20133647 (2010). http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0031320310002074","DOI":"10.1016\/j.patcog.2010.05.006"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Lin, J., Keogh, E., Wei, L., Lonardi, S.: Experiencing sax: a novel symbolic representation of time series. Data Min. Knowl. Discov. 15(2), 107\u2013144 (2007). http:\/\/dx.doi.org\/10.1007\/s10618-007-0064-z","DOI":"10.1007\/s10618-007-0064-z"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data 6(1), 3:1\u20133:39. http:\/\/doi.acm.org\/10.1145\/2133360.2133363","DOI":"10.1145\/2133360.2133363"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Liu, W., Hua, G., Smith, J.: Unsupervised one-class learning for automatic outlier removal. In: 2014 IEEE Conference on Computer Vision and Pattern Recognition (CVPR), pp. 3826\u20133833, June 2014","DOI":"10.1109\/CVPR.2014.483"},{"issue":"6","key":"25_CR22","doi-asserted-by":"crossref","first-page":"859","DOI":"10.1109\/TKDE.2010.61","volume":"23","author":"M Masud","year":"2011","unstructured":"Masud, M., Gao, J., Khan, L., Han, J., Thuraisingham, B.: Classification and novel class detection in concept-drifting data streams under time constraints. IEEE Trans. Knowl. Data Eng. 23(6), 859\u2013874 (2011)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Pavlov, D.: Sequence modeling with mixtures of conditional maximum entropy distributions. In: Third IEEE International Conference on Data Mining, ICDM 2003, pp. 251\u2013258, November 2003","DOI":"10.1109\/ICDM.2003.1250927"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Ramaswamy, S., Rastogi, R., Shim, K.: Efficient algorithms for mining outliers from large data sets. In: Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data, SIGMOD 2000, pp. 427\u2013438. ACM, New York (2000). http:\/\/doi.acm.org\/10.1145\/342009.335437","DOI":"10.1145\/342009.335437"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Silveira, F., Diot, C., Taft, N., Govindan, R.: Astute: Detecting a different class of traffic anomalies. In: Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM 2010, pp. 267\u2013278. ACM, New York (2010). http:\/\/doi.acm.org\/10.1145\/1851182.1851215","DOI":"10.1145\/1851182.1851215"},{"key":"25_CR26","unstructured":"Tan, S.C., Ting, K.M., Liu, T.F.: Fast anomaly detection for streaming data. In: Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence, IJCAI 2011, vol. 2, pp. 1511\u20131516. AAAI Press (2011). http:\/\/dx.doi.org\/10.5591\/978-1-57735-516-8\/IJCAI11-254"},{"key":"25_CR27","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In: Proceedings of the 1999 IEEE Symposium on Security and Privacy, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"25_CR28","unstructured":"Wei, W.W.S.: Time series analysis. Addison-Wesley publ. Reading (1994)"},{"key":"25_CR29","doi-asserted-by":"crossref","unstructured":"Yang, J., Wang, W.: Cluseq: efficient and effective sequence clustering. In: Proceedings. 19th International Conference on Data Engineering, 2003, pp. 101\u2013112, March 2003","DOI":"10.1109\/ICDE.2003.1260785"}],"container-title":["Lecture Notes in Computer Science","Databases Theory and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46922-5_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T15:58:16Z","timestamp":1568390296000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46922-5_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319469218","9783319469225"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46922-5_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}