{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T11:41:58Z","timestamp":1725536518899},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642033476"},{"type":"electronic","value":"9783642033483"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-03348-3_65","type":"book-chapter","created":{"date-parts":[[2009,8,8]],"date-time":"2009-08-08T05:01:20Z","timestamp":1249707680000},"page":"627-635","source":"Crossref","is-referenced-by-count":0,"title":["An Outlier Detection Algorithm Based on Arbitrary Shape Clustering"],"prefix":"10.1007","author":[{"given":"Xiaoke","family":"Su","sequence":"first","affiliation":[]},{"given":"Yang","family":"Lan","sequence":"additional","affiliation":[]},{"given":"Renxia","family":"Wan","sequence":"additional","affiliation":[]},{"given":"Yuming","family":"Qin","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"65_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-94-015-3994-4","volume-title":"Identification of Outliers","author":"D. Hawkins","year":"1980","unstructured":"Hawkins, D.: Identification of Outliers. Chapman and Hall, London (1980)"},{"key":"65_CR2","doi-asserted-by":"crossref","unstructured":"Patcha, A., Park, J.M.: An Overview of Anomaly Detection Techniques: Existing Solutions and Latest Technological Trends. Computer Networks, 3448\u20133470 (2007)","DOI":"10.1016\/j.comnet.2007.02.001"},{"key":"65_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"400","DOI":"10.1007\/11538059_42","volume-title":"Advances in Intelligent Computing","author":"Z. He","year":"2005","unstructured":"He, Z., Deng, S., Xu, X.: An Optimization Model for Outlier Detection in Categorical Data. In: Huang, D.-S., Zhang, X.-P., Huang, G.-B. (eds.) ICIC 2005, Part I. LNCS, vol.\u00a03644, pp. 400\u2013409. Springer, Heidelberg (2005)"},{"key":"65_CR4","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"567","DOI":"10.1007\/11731139_67","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"Z. He","year":"2006","unstructured":"He, Z., Deng, S., Xu, X., Huang, Z.: A Fast Greedy Algorithm for Outlier Mining. In: Ng, W.-K., Kitsuregawa, M., Li, J., Chang, K. (eds.) PAKDD 2006. LNCS (LNAI), vol.\u00a03918, pp. 567\u2013576. Springer, Heidelberg (2006)"},{"key":"65_CR5","series-title":"LNAI","doi-asserted-by":"publisher","first-page":"426","DOI":"10.1007\/11430919_50","volume-title":"Advances in Knowledge Discovery and Data Mining","author":"L. Boudjeloud","year":"2005","unstructured":"Boudjeloud, L., Poulet, F.: Visual Interactive Evolutionary Algorithm for High Dimensional Data Clustering and Outlier Detection. In: Ho, T.-B., Cheung, D., Liu, H. (eds.) PAKDD 2005. LNCS (LNAI), vol.\u00a03518, pp. 426\u2013431. Springer, Heidelberg (2005)"},{"key":"65_CR6","doi-asserted-by":"crossref","unstructured":"Jiang, M., Tseng, S., Su, C.: Two-phase Clustering Process for Outliers Detection. In: Computational Statistics and Data Analysis, pp. 351\u2013382 (2001)","DOI":"10.1016\/S0167-8655(00)00131-8"},{"key":"65_CR7","unstructured":"Portnoy, L., Eskin, E., Stolfo, S.: Intrusion Detection with Unlabeled Data Using Clustering. In: ACM Workshop on Data Mining Applied to Security, Philadelphia, PA, pp. 5\u20138 (2001)"},{"key":"65_CR8","doi-asserted-by":"crossref","unstructured":"He, Z., Xu, X., Deng, S.: Discovering Cluster-based Local Outliers. Pattern Recognition Letters, 1651\u20131660 (2003)","DOI":"10.1016\/S0167-8655(03)00003-5"},{"key":"65_CR9","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: BIRCH: an Efficient Data Clustering Method for very Large Databases. In: ACM SIGMOD Int. Conf. on Management of Data, Montreal, pp. 103\u2013114 (1996)","DOI":"10.1145\/233269.233324"},{"key":"65_CR10","doi-asserted-by":"crossref","unstructured":"Jiang, S., Song, X.: A Clustering-based Method for Unsupervised Intrusion Detections. Pattern Recognition Letters, 802\u2013810 (2006)","DOI":"10.1016\/j.patrec.2005.11.007"},{"key":"65_CR11","doi-asserted-by":"crossref","unstructured":"Huang, Z.: Extensions to the K-means Algorithm for Clustering Large Data Sets with Categorical Values. In: Data Mining and Knowledge Discovery, pp. 283\u2013304 (1998)","DOI":"10.1023\/A:1009769707641"},{"key":"65_CR12","unstructured":"UCI Machine Learning Repository, http:\/\/www.ics.uci.edu\/~mlearn\/MLRepository.html"},{"key":"65_CR13","volume-title":"Applications of Data Mining in Computer Security. Advances In Information Security","author":"E. Eskin","year":"2002","unstructured":"Eskin, E., Arnold, A., Prerau, M.: A Geometric Framework for Unsupervised Anomaly Detection: Detecting Intrusions in Unlabeled Data. In: Applications of Data Mining in Computer Security. Advances In Information Security. Kluwer Academic Publishers, Boston (2002)"}],"container-title":["Lecture Notes in Computer Science","Advanced Data Mining and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-03348-3_65","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T22:41:51Z","timestamp":1558478511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-03348-3_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642033476","9783642033483"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-03348-3_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}