{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:09Z","timestamp":1749928209873,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":23,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_8","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:48Z","timestamp":1749927048000},"page":"95-107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Streaming Isolation Forest"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6315-3854","authenticated-orcid":false,"given":"Justin Jia","family":"Liu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4029-2047","authenticated-orcid":false,"given":"Guilherme Weigert","family":"Cassales","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9028-2774","authenticated-orcid":false,"given":"Fei Tony","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3732-5787","authenticated-orcid":false,"given":"Bernhard","family":"Pfahringer","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8339-7773","authenticated-orcid":false,"given":"Albert","family":"Bifet","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Bifet, A., Gavald\u00e0, R., Holmes, G., Pfahringer, B.: Machine Learning for Data Streams with Practical Examples in MOA. MIT Press (2018). https:\/\/moa.cms.waikato.ac.nz\/book\/","DOI":"10.7551\/mitpress\/10654.001.0001"},{"issue":"3","key":"8_CR2","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1016\/S0168-1699(99)00046-0","volume":"24","author":"JA Blackard","year":"1999","unstructured":"Blackard, J.A., Dean, D.J.: Comparative accuracies of artificial neural networks and discriminant analysis in predicting forest cover types from cartographic variables. Comput. Electron. Agric. 24(3), 131\u2013151 (1999)","journal-title":"Comput. Electron. Agric."},{"issue":"3","key":"8_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM Comput. Surv. (CSUR)"},{"issue":"20","key":"8_CR4","first-page":"12","volume":"46","author":"Z Ding","year":"2013","unstructured":"Ding, Z., Fei, M.: An anomaly detection approach based on isolation forest algorithm for streaming data using sliding window. IFAC 46(20), 12\u201317 (2013)","journal-title":"IFAC"},{"key":"8_CR5","unstructured":"Emmott, A., Das, S., Dietterich, T., Fern, A., Wong, W.K.: A meta-analysis of the anomaly detection problem. arXiv preprint arXiv:1503.01158 (2015)"},{"key":"8_CR6","unstructured":"Gomes, H.M., et al.: CapyMOA: efficient machine learning for data streams in python. arXiv:2502.07432 (2025)"},{"key":"8_CR7","unstructured":"Guha, S., Mishra, N., Roy, G., Schrijvers, O.: Robust random cut forest based anomaly detection on streams. In: ICML, pp. 2712\u20132721. PMLR (2016)"},{"key":"8_CR8","unstructured":"Hartl, A., Iglesias, F., Zseby, T.: Sdostream: low-density models for streaming outlier detection. In: ESANN, pp. 661\u2013666 (2020)"},{"key":"8_CR9","unstructured":"Leveni, F., Weigert\u00a0Cassales, G., Pfahringer, B., Bifet, A., Boracchi, G.: Online isolation forest. In: ICML. PMLR (2024)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation forest. In: 2008 Eighth IEEE International Conference on Data Mining, pp. 413\u2013422. IEEE (2008)","DOI":"10.1109\/ICDM.2008.17"},{"issue":"1","key":"8_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2133360.2133363","volume":"6","author":"FT Liu","year":"2012","unstructured":"Liu, F.T., Ting, K.M., Zhou, Z.H.: Isolation-based anomaly detection. ACM Trans. Knowl. Discov. Data (TKDD) 6(1), 1\u201339 (2012)","journal-title":"ACM Trans. Knowl. Discov. Data (TKDD)"},{"key":"8_CR12","doi-asserted-by":"crossref","unstructured":"Manzoor, E., Lamba, H., Akoglu, L.: xStream: outlier detection in feature-evolving data streams. In: 24th ACM SIGKDD, pp. 1963\u20131972 (2018)","DOI":"10.1145\/3219819.3220107"},{"key":"8_CR13","doi-asserted-by":"crossref","unstructured":"Moustafa, N., Slay, J.: UNSW-NB15: a comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set). In: 2015 MilCIS. IEEE (2015)","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Pang, G., Shen, C., Van Den\u00a0Hengel, A.: Deep anomaly detection with deviation networks. In: 25th ACM SIGKDD, pp. 353\u2013362 (2019)","DOI":"10.1145\/3292500.3330871"},{"key":"8_CR15","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1007\/s10994-015-5521-0","volume":"102","author":"T Pevn\u1ef3","year":"2016","unstructured":"Pevn\u1ef3, T.: Loda: lightweight on-line detector of anomalies. Mach. Learn. 102, 275\u2013304 (2016)","journal-title":"Mach. Learn."},{"key":"8_CR16","unstructured":"Rayana, S.: Odds library (2016). https:\/\/odds.cs.stonybrook.edu"},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Sathe, S., Aggarwal, C.C.: Subspace outlier detection in linear time with randomized hashing. In: 16th ICDM, pp. 459\u2013468. IEEE (2016)","DOI":"10.1109\/ICDM.2016.0057"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Sharafaldin, I., Lashkari, A.H., Ghorbani, A.A.: Toward generating a new intrusion detection dataset and intrusion traffic characterization. ICISSp 1 (2018)","DOI":"10.5220\/0006639801080116"},{"key":"8_CR19","unstructured":"Tan, S.C., Ting, K.M., Liu, T.F.: Fast anomaly detection for streaming data. In: 22nd International Joint Conference on Artificial Intelligence. Citeseer (2011)"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"V\u00e1zquez, F.I., Zseby, T., Zimek, A.: Outlier detection based on low density models. In: 2018 ICDMW, pp. 970\u2013979. IEEE (2018)","DOI":"10.1109\/ICDMW.2018.00140"},{"issue":"1","key":"8_CR21","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3147.3165","volume":"11","author":"JS Vitter","year":"1985","unstructured":"Vitter, J.S.: Random sampling with a reservoir. ACM Trans. Math. Softw. (TOMS) 11(1), 37\u201357 (1985)","journal-title":"ACM Trans. Math. Softw. (TOMS)"},{"issue":"06","key":"8_CR22","first-page":"1417","volume":"7","author":"KS Woods","year":"1993","unstructured":"Woods, K.S., Doss, C.C., Bowyer, K.W., Solka, J.L., Priebe, C.E., Kegelmeyer, W.P., Jr.: Comparative evaluation of pattern recognition techniques for detection of microcalcifications in mammography. IJPRAI 7(06), 1417\u20131436 (1993)","journal-title":"IJPRAI"},{"key":"8_CR23","unstructured":"Yilmaz, S.F., Kozat, S.S.: PySad: a streaming anomaly detection framework in python. arXiv preprint arXiv:2009.02572 (2020)"}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:54Z","timestamp":1749927054000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}