{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,27]],"date-time":"2025-12-27T14:57:34Z","timestamp":1766847454211},"publisher-location":"Berlin, Heidelberg","reference-count":8,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412776"},{"type":"electronic","value":"9783642412783"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41278-3_17","type":"book-chapter","created":{"date-parts":[[2013,10,16]],"date-time":"2013-10-16T09:41:50Z","timestamp":1381916510000},"page":"134-141","source":"Crossref","is-referenced-by-count":8,"title":["Anomaly Monitoring Framework Based on Intelligent Data Analysis"],"prefix":"10.1007","author":[{"given":"Prapa","family":"Rattadilok","sequence":"first","affiliation":[]},{"given":"Andrei","family":"Petrovski","sequence":"additional","affiliation":[]},{"given":"Sergei","family":"Petrovski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Jacobs, A.: The Pathologies of Big Data. ACMQueue (2009)","DOI":"10.1145\/1563821.1563874"},{"key":"17_CR2","unstructured":"Rattadilok, P., Petrovski, A.: Inferential Measurements for Situation Awareness: Enhancing traffic Surveillance by Machine Learning. In: CIVEMSA 2013 (to appear, 2013)"},{"issue":"3","key":"17_CR3","doi-asserted-by":"publisher","first-page":"7270","DOI":"10.1016\/j.eswa.2008.09.024","volume":"36","author":"M. Correa","year":"2009","unstructured":"Correa, M., Bielza, C., Pamies-Teixeira, J.: Comparison of Bayesian networks and artificial neural networks for quality detection in a machining process. Expert Systems with Applications\u00a036(3), 7270\u20137279 (2009)","journal-title":"Expert Systems with Applications"},{"key":"17_CR4","unstructured":"http:\/\/www.heatonresearch.com\/encog"},{"key":"17_CR5","unstructured":"http:\/\/courses.media.mit.edu\/2004fall\/mas622j\/04.projects\/home\/"},{"issue":"2","key":"17_CR6","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"V. Hodge","year":"2004","unstructured":"Hodge, V., Austin, J.: A survey of outlier detection methodologies. Artificial Intelligence Review\u00a022(2), 85\u2013126 (2004)","journal-title":"Artificial Intelligence Review"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/3-540-44503-X_26","volume-title":"Database Theory - ICDT 2001","author":"A.K.H. Tung","year":"2000","unstructured":"Tung, A.K.H., Han, J., Lakshmanan, L.V.S., Ng, R.T.: Constraint-Based Clustering in Large Databases. In: Van den Bussche, J., Vianu, V. (eds.) ICDT 2001. LNCS, vol.\u00a01973, pp. 405\u2013419. Springer, Heidelberg (2000)"},{"key":"17_CR8","unstructured":"Dereszynski, E.W., Dietterich, T.G.: Probabilistic models for anomaly detection in remote sensor data streams. In: Proceedings of the 23rd Conference on Uncertainty in Artificial Intelligence (2012), arXiv:1206.5250"}],"container-title":["Lecture Notes in Computer Science","Intelligent Data Engineering and Automated Learning \u2013 IDEAL 2013"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41278-3_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T13:19:21Z","timestamp":1558617561000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41278-3_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412776","9783642412783"],"references-count":8,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41278-3_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}