{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T10:09:48Z","timestamp":1725530988254},"publisher-location":"Berlin, Heidelberg","reference-count":15,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642013065"},{"type":"electronic","value":"9783642013072"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-01307-2_94","type":"book-chapter","created":{"date-parts":[[2009,4,18]],"date-time":"2009-04-18T13:47:58Z","timestamp":1240062478000},"page":"899-906","source":"Crossref","is-referenced-by-count":1,"title":["A Multi-resolution Approach for Atypical Behaviour Mining"],"prefix":"10.1007","author":[{"given":"Alice","family":"Marascu","sequence":"first","affiliation":[]},{"given":"Florent","family":"Masseglia","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"94_CR1","doi-asserted-by":"crossref","unstructured":"Aleskerov, E., Freisleben, B., Rao, B.: Cardwatch: A neural network based database mining system for credit card fraud detection. In: IEEE Computational Intelligence for Financial Engineering (1997)","DOI":"10.1109\/CIFER.1997.618940"},{"issue":"2","key":"94_CR2","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/335191.335388","volume":"29","author":"M.M. Breunig","year":"2000","unstructured":"Breunig, M.M., Kriegel, H.-P., Ng, R.T., Sander, J.: Lof: identifying density-based local outliers. SIGMOD Records\u00a029(2), 93\u2013104 (2000)","journal-title":"SIGMOD Records"},{"key":"94_CR3","doi-asserted-by":"crossref","unstructured":"Daubechies, I.: Ten lectures on wavelets. Society for Industrial and Applied Mathematics, Philadelphia, PA, USA (1992)","DOI":"10.1137\/1.9781611970104"},{"key":"94_CR4","unstructured":"Ertoz, L., Eilertson, E., Lazarevic, A., Tan, P.-N., Kumar, V., Srivastava, J., Dokas, P.: Minds - minnesota intrusion detection system. Data Mining - Next Generation Challenges and Future Directions (2004)"},{"key":"94_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1007\/11731139_66","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"H. Fan","year":"2006","unstructured":"Fan, H., Zaiane, O.R., Foss, A., Wu, J.: A nonparametric outlier detection for effectively discovering top-n outliers from engineering data. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS, vol.\u00a03918, pp. 557\u2013566. Springer, Heidelberg (2006)"},{"key":"94_CR6","doi-asserted-by":"crossref","unstructured":"Fujimaki, R., Yairi, T., Machida, K.: An approach to spacecraft anomaly detection problem using kernel feature space. In: 11th ACM SIGKDD (2005)","DOI":"10.1145\/1081870.1081917"},{"issue":"6-7","key":"94_CR7","doi-asserted-by":"publisher","first-page":"691","DOI":"10.1016\/S0167-8655(00)00131-8","volume":"22","author":"M.F. Jaing","year":"2001","unstructured":"Jaing, M.F., Tseng, S.S., Su, C.M.: Two-phase clustering process for outliers detection. Pattern Recogn. Lett.\u00a022(6-7), 691\u2013700 (2001)","journal-title":"Pattern Recogn. Lett."},{"key":"94_CR8","doi-asserted-by":"crossref","unstructured":"Jin, W., Tung, A.K.H., Han, J.: Mining top-n local outliers in large databases. In: 7th ACM SIGKDD, pp. 293\u2013298 (2001)","DOI":"10.1145\/502512.502554"},{"key":"94_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"255","DOI":"10.1007\/978-3-540-24775-3_33","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"J.J. Oldmeadow","year":"2004","unstructured":"Oldmeadow, J.J., Ravinutala, S., Leckie, C.: Adaptive clustering for network intrusion detection. In: Dai, H., Srikant, R., Zhang, C. (eds.) PAKDD 2004. LNCS, vol.\u00a03056, pp. 255\u2013259. Springer, Heidelberg (2004)"},{"key":"94_CR10","unstructured":"Knorr, E.M., Ng, R.T.: Algorithms for mining distance-based outliers in large datasets. In: 24th VLDB, pp. 392\u2013403 (1998)"},{"key":"94_CR11","doi-asserted-by":"crossref","unstructured":"Papadimitriou, S., Kitagawa, H., Gibbons, P.B., Faloutsos, C.: LOCI: fast outlier detection using the local correlation integral. In: 19th International Conference on Data Engineering (2003)","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"94_CR12","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion detection with unlabeled data using clustering. In: ACM CSS Workshop on Data Mining Applied to Security (2001)"},{"key":"94_CR13","first-page":"386","volume-title":"KDD 2002","author":"K. Sequeira","year":"2002","unstructured":"Sequeira, K., Zaki, M.: Admit: anomaly-based data mining for intrusions. In: KDD 2002, pp. 386\u2013395. ACM, New York (2002)"},{"key":"94_CR14","volume-title":"Wavelet Theory and Its Applications","author":"R.K. Young","year":"1995","unstructured":"Young, R.K.: Wavelet Theory and Its Applications. Kluwer Academic Publishers Group, Dordrecht (1995)"},{"key":"94_CR15","doi-asserted-by":"crossref","unstructured":"Zhong, S., Khoshgoftaar, T.M., Seliya, N.: Clustering-based network intrusion detection. International Journal of Reliability, Quality and Safety Engineering 14 (2007)","DOI":"10.1142\/S0218539307002568"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-01307-2_94","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T18:47:05Z","timestamp":1551984425000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-01307-2_94"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642013065","9783642013072"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-01307-2_94","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}