{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:24:53Z","timestamp":1745987093059,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642374005"},{"type":"electronic","value":"9783642374012"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-37401-2_54","type":"book-chapter","created":{"date-parts":[[2013,3,22]],"date-time":"2013-03-22T04:03:25Z","timestamp":1363925005000},"page":"550-562","source":"Crossref","is-referenced-by-count":3,"title":["Fractal Based Anomaly Detection over Data Streams"],"prefix":"10.1007","author":[{"given":"Xueqing","family":"Gong","sequence":"first","affiliation":[]},{"given":"Weining","family":"Qian","sequence":"additional","affiliation":[]},{"given":"Shouke","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Aoying","family":"Zhou","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"54_CR1","unstructured":"Internet traffic archive, http:\/\/ita.ee.lbl.gov\/"},{"issue":"1","key":"54_CR2","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1007\/BF01889596","volume":"5","author":"M. Barnsley","year":"1989","unstructured":"Barnsley, M., Elton, J., Hardin, D.: Recurrent iterated function systems. Constructive Approximation\u00a05(1), 3\u201331 (1989)","journal-title":"Constructive Approximation"},{"issue":"6","key":"54_CR3","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1109\/LSP.2002.800504","volume":"9","author":"P. Borgnat","year":"2002","unstructured":"Borgnat, P., Flandrin, P., Amblard, P.: Stochastic discrete scale invariance. IEEE Signal Processing Letters\u00a09(6), 181\u2013184 (2002)","journal-title":"IEEE Signal Processing Letters"},{"key":"54_CR4","doi-asserted-by":"crossref","unstructured":"Bulut, A., Singh, A.: A unified framework for monitoring data streams in real time. In: Proceedings of the 21st International Conference on Data Engineering, ICDE 2005, pp. 44\u201355. IEEE (2005)","DOI":"10.1109\/ICDE.2005.13"},{"issue":"3","key":"54_CR5","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V. Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: A survey. ACM Computing Surveys (CSUR)\u00a041(3), 15 (2009)","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"54_CR6","doi-asserted-by":"crossref","unstructured":"Chen, Y., Dong, G., Han, J., Wah, B., Wang, J.: Multi-dimensional regression analysis of time-series data streams. In: Proceedings of the 28th International Conference on Very Large Data Bases, pp. 323\u2013334. VLDB Endowment (2002)","DOI":"10.1016\/B978-155860869-6\/50036-6"},{"key":"54_CR7","doi-asserted-by":"crossref","unstructured":"Cormode, G., Muthukrishnan, S.: What\u2019s new: Finding significant differences in network data streams. In: Twenty-third Annual Joint Conference of the IEEE Computer and Communications Societies, INFOCOM 2004, vol.\u00a03, pp. 1534\u20131545. IEEE (2004)","DOI":"10.1109\/INFCOM.2004.1354567"},{"issue":"4","key":"54_CR8","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1109\/38.511849","volume":"16","author":"J. Hart","year":"1996","unstructured":"Hart, J.: Fractal image compression and recurrent iterated function systems. IEEE Computer Graphics and Applications\u00a016(4), 25\u201333 (1996)","journal-title":"IEEE Computer Graphics and Applications"},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Jain, A., Chang, E., Wang, Y.: Adaptive stream resource management using kalman filters. In: Proceedings of the 2004 ACM SIGMOD International Conference on Management of Data, pp. 11\u201322. ACM (2004)","DOI":"10.1145\/1007568.1007573"},{"key":"54_CR10","doi-asserted-by":"crossref","unstructured":"Kifer, D., Ben-David, S., Gehrke, J.: Detecting change in data streams. In: Proceedings of the Thirtieth International Conference on Very Large Data Bases, vol.\u00a030, pp. 180\u2013191. VLDB Endowment (2004)","DOI":"10.1016\/B978-012088469-8.50019-X"},{"key":"54_CR11","doi-asserted-by":"crossref","unstructured":"Krishnamurthy, B., Sen, S., Zhang, Y., Chen, Y.: Sketch-based change detection: methods, evaluation, and applications. In: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 234\u2013247. ACM (2003)","DOI":"10.1145\/948205.948236"},{"key":"54_CR12","unstructured":"Mandelbrot, B.: The fractal geometry of nature. Times Books (1982)"},{"issue":"7","key":"54_CR13","doi-asserted-by":"publisher","first-page":"1724","DOI":"10.1109\/78.143444","volume":"40","author":"D. Mazel","year":"1992","unstructured":"Mazel, D., Hayes, M.: Using iterated function systems to model discrete sequences. IEEE Transactions on Signal Processing\u00a040(7), 1724\u20131734 (1992)","journal-title":"IEEE Transactions on Signal Processing"},{"key":"54_CR14","volume-title":"Fractals everywhere","author":"F. Michael","year":"1988","unstructured":"Michael, F.: Fractals everywhere. Academic Press, San Diego (1988)"},{"issue":"12","key":"54_CR15","doi-asserted-by":"publisher","first-page":"3448","DOI":"10.1016\/j.comnet.2007.02.001","volume":"51","author":"A. Patcha","year":"2007","unstructured":"Patcha, A., Park, J.: An overview of anomaly detection techniques: Existing solutions and latest technological trends. Computer Networks\u00a051(12), 3448\u20133470 (2007)","journal-title":"Computer Networks"},{"key":"54_CR16","doi-asserted-by":"crossref","unstructured":"Qin, S., Qian, W., Zhou, A.: Approximately processing multi-granularity aggregate queries over data streams. In: Proceedings of the 22nd International Conference on Data Engineering, ICDE 2006, p. 67. IEEE (2006)","DOI":"10.1109\/ICDE.2006.22"},{"key":"54_CR17","doi-asserted-by":"crossref","unstructured":"Shahabi, C., Tian, X., Zhao, W.: Tsa-tree: A wavelet-based approach to improve the efficiency of multi-level surprise and trend queries on time-series data. In: Proceedings of the 12th International Conference on Scientific and Statistical Database Management, pp. 55\u201368. IEEE (2000)","DOI":"10.1109\/SSDM.2000.869778"},{"key":"54_CR18","unstructured":"Wu, X., Barbar\u00e1, D.: Using fractals to compress real data sets: Is it feasible. In: Proc. of SIGKDD (2003)"},{"key":"54_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"435","DOI":"10.1007\/11408079_39","volume-title":"Database Systems for Advanced Applications","author":"A. Zhou","year":"2005","unstructured":"Zhou, A., Qin, S., Qian, W.: Adaptively detecting aggregation bursts in data streams. In: Zhou, L., Ooi, B.-C., Meng, X. (eds.) DASFAA 2005. LNCS, vol.\u00a03453, pp. 435\u2013446. Springer, Heidelberg (2005)"},{"key":"54_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, Y., Shasha, D.: Efficient elastic burst detection in data streams. In: Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 336\u2013345. ACM (2003)","DOI":"10.1145\/956750.956789"}],"container-title":["Lecture Notes in Computer Science","Web Technologies and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-37401-2_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T01:26:57Z","timestamp":1745976417000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-37401-2_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642374005","9783642374012"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-37401-2_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}