{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:29Z","timestamp":1725558629363},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642143991"},{"type":"electronic","value":"9783642144004"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-14400-4_49","type":"book-chapter","created":{"date-parts":[[2010,6,26]],"date-time":"2010-06-26T05:18:09Z","timestamp":1277529489000},"page":"632-642","source":"Crossref","is-referenced-by-count":1,"title":["Event Prediction in Network Monitoring Systems: Performing Sequential Pattern Mining in Osmius Monitoring Tool"],"prefix":"10.1007","author":[{"given":"Rafael","family":"Garc\u00eda","sequence":"first","affiliation":[]},{"given":"Luis","family":"Llana","sequence":"additional","affiliation":[]},{"given":"Constantino","family":"Malag\u00f3n","sequence":"additional","affiliation":[]},{"given":"Jes\u00fas","family":"Pancorbo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"49_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/170036.170072","volume":"22","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. SIGMOD\u00a022(2), 207\u2013216 (1993)","journal-title":"SIGMOD"},{"key":"49_CR2","doi-asserted-by":"crossref","unstructured":"Cheng, H., Yan, X., Han, J.: Incspan: Incremental mining of sequential patterns in large database. In: Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining (2004)","DOI":"10.1145\/1014052.1014114"},{"key":"49_CR3","volume-title":"Sequence Data Mining","author":"G. Dong","year":"2007","unstructured":"Dong, G., Pei, J.: Sequence Data Mining. Springer, Heidelberg (2007)"},{"key":"49_CR4","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1007\/s10618-006-0059-1","volume":"5","author":"J. Han","year":"2007","unstructured":"Han, J., Cheng, H., Xin, D., Yan, X.: Frequent pattern mining: current status and future directions. Data Min. Knowl. Disc.\u00a05, 55\u201386 (2007)","journal-title":"Data Min. Knowl. Disc"},{"key":"49_CR5","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J. Han","year":"2004","unstructured":"Han, J., Pei, J., Yiwein, Y., Runying, M.: Mining frequent patterns without candidate generation: A frequent-pattern tree approach. Data Mining and Knowledge Discovery\u00a08, 53\u201387 (2004)","journal-title":"Data Mining and Knowledge Discovery"},{"key":"49_CR6","unstructured":"Hasan, M., Chaoji, V., Salem, S., Parimi, N., Zaki, M.: Dmtl: A generic data mining template library. In: Workshop on Library-Centric Software Design (LCSD 2005), with Object-Oriented Programming, Systems, Languages and Applications (OOPSLA 2005) conference, San Diego, California (2005)"},{"key":"49_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1007\/978-3-540-71703-4_19","volume-title":"Advances in Databases: Concepts, Systems and Applications","author":"S. Kim","year":"2007","unstructured":"Kim, S., Park, S., Won, J., Kim, S.-W.: Privacy preserving data mining of sequential patterns for network traffic data. In: Kotagiri, R., Radha Krishna, P., Mohania, M., Nantajeewarawat, E. (eds.) DASFAA 2007. LNCS, vol.\u00a04443, pp. 201\u2013212. Springer, Heidelberg (2007)"},{"key":"49_CR8","doi-asserted-by":"publisher","first-page":"287","DOI":"10.1007\/s10115-006-0032-8","volume":"11","author":"C.K.-S. Leung","year":"2007","unstructured":"Leung, C.K.-S., Khan, Q.I., Li, Z., Hoque, T.: Cantree: a canonical-order tree for incremental frequent-pattern mining. Knowl. Inf. Syst.\u00a011, 287\u2013311 (2007)","journal-title":"Knowl. Inf. Syst."},{"key":"49_CR9","volume-title":"Advanced Data Mining Techniques","author":"D. Olson","year":"2008","unstructured":"Olson, D., Delen, D.: Advanced Data Mining Techniques. Springer, Heidelberg (2008)"},{"key":"49_CR10","unstructured":"Srikant, R., Vu, Q., Agrawal, R.: Mining association rules with item constraints. In: Proc. 1997 Int. Conf. Knowledge Discovery and Data Mining, Newport Beach, CA, pp. 67\u201373 (1997)"},{"key":"49_CR11","volume-title":"The guide to IT service management.","author":"J. Bon Van","year":"2002","unstructured":"Van Bon, J.: The guide to IT service management. Addison-Wesley, Reading (2002)"},{"key":"49_CR12","doi-asserted-by":"publisher","first-page":"1699","DOI":"10.1016\/j.jss.2006.12.546","volume":"80","author":"L. Wu","year":"2007","unstructured":"Wu, L., Hunga, C., Chen, S.: Building intrusion pattern miner for snort network intrusion detection system. Journal of Systems and Software\u00a080, 1699\u20131715 (2007)","journal-title":"Journal of Systems and Software"},{"key":"49_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1007\/3-540-45432-2_4","volume-title":"Databases in Telecommunications II","author":"P. Wu","year":"2001","unstructured":"Wu, P., Peng, W., Chen, M.: Mining sequential alarm patterns in a telecommunication database. In: Jonker, W. (ed.) VLDB-WS 2001 and DBTel 2001. LNCS, vol.\u00a02209, p. 37. Springer, Heidelberg (2001)"},{"key":"49_CR14","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1109\/69.846291","volume":"12","author":"M. Zaki","year":"2000","unstructured":"Zaki, M.: Scalable algorithms for association minning. IEEE Trans. Knowledge and Data Engineering\u00a012, 372\u2013390 (2000)","journal-title":"IEEE Trans. Knowledge and Data Engineering"},{"issue":"1-2","key":"49_CR15","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1023\/A:1007652502315","volume":"42","author":"M. Zaki","year":"2001","unstructured":"Zaki, M.: Spade: An efficient algorithm for mining frequent sequences. Machine Learning\u00a042(1-2), 31\u201360 (2001)","journal-title":"Machine Learning"},{"key":"49_CR16","unstructured":"Zaki, M.: DMTL (December 2007), \n                    \n                      http:\/\/sourceforge.net\/projects\/dmtl"},{"key":"49_CR17","series-title":"Lecture Notes in Artificial Intelligence","first-page":"26","volume-title":"Advances in Artificial Intelligence","author":"Z. Zequn","year":"2001","unstructured":"Zequn, Z., Eseife, C.I.: A low-scan incremental association rule maintenance method based on the apriori property. In: Stroulia, E., Matwin, S. (eds.) Canadian AI 2001. LNCS (LNAI), vol.\u00a02056, pp. 26\u201335. Springer, Heidelberg (2001)"}],"container-title":["Lecture Notes in Computer Science","Advances in Data Mining. Applications and Theoretical Aspects"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-14400-4_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:26:25Z","timestamp":1619785585000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-14400-4_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642143991","9783642144004"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-14400-4_49","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}