{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T15:49:22Z","timestamp":1771688962945,"version":"3.50.1"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2006,10,3]],"date-time":"2006-10-03T00:00:00Z","timestamp":1159833600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Knowl Inf Syst"],"published-print":{"date-parts":[[2007,8,3]]},"DOI":"10.1007\/s10115-006-0039-1","type":"journal-article","created":{"date-parts":[[2006,10,2]],"date-time":"2006-10-02T08:37:19Z","timestamp":1159778239000},"page":"355-378","source":"Crossref","is-referenced-by-count":60,"title":["Summarization \u2013 compressing data into an informative representation"],"prefix":"10.1007","volume":"12","author":[{"given":"Varun","family":"Chandola","sequence":"first","affiliation":[]},{"given":"Vipin","family":"Kumar","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2006,10,3]]},"reference":[{"key":"39_CR1","unstructured":"Skaion Corporation (2003) Skaion intrusion detection system evaluation data."},{"key":"39_CR2","doi-asserted-by":"crossref","first-page":"12","DOI":"10.1145\/1014052.1014057","volume-title":"Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining","author":"F Afrati","year":"2004","unstructured":"Afrati F, Gionis A, Mannila H (2004) Approximating a collection of frequent sets. In: Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, NY, USA, pp 12\u201319"},{"key":"39_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal R, Imieliski T, Swami A (1993) Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD international conference on management of data. ACM Press, pp 207\u2013216","DOI":"10.1145\/170035.170072"},{"issue":"4","key":"39_CR4","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/604264.604268","volume":"30","author":"D Barbara","year":"2001","unstructured":"Barbara D, Couto J, Jajodia S, Wu N (2001) ADAM: a testbed for exploring the use of data mining in intrusion detection. SIGMOD Rec 30(4):15\u201324","journal-title":"SIGMOD Rec"},{"issue":"1","key":"39_CR5","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1021571501451","volume":"7","author":"J-F Boulicaut","year":"2003","unstructured":"Boulicaut J-F, Bykowski A, Rigotti C (2003) Free-sets: a condensed representation of boolean data for the approximation of frequency queries. Data Min Knowl Discov 7(1):5\u201322","journal-title":"Data Min Knowl Discov"},{"key":"39_CR6","doi-asserted-by":"crossref","first-page":"93","DOI":"10.1145\/342009.335388","volume-title":"Proceedings of the 2000 ACM SIGMOD international conference on management of data","author":"MM Breunig","year":"2000","unstructured":"Breunig MM, Kriegel H-P, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of the 2000 ACM SIGMOD international conference on management of data. ACM Press, New York, NY, USA, pp 93\u2013104"},{"key":"39_CR7","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1007\/3-540-45681-3_7","volume-title":"Proceedings of the 6th European conference on principles of datamining andknowledge discovery","author":"T Calders","year":"2002","unstructured":"Calders T, Goethals B (2002) Mining all non-derivable frequent itemsets. In: Proceedings of the 6th European conference on principles of data mining and knowledge discovery. Springer-Verlag, London, UK, pp 74\u201385"},{"key":"39_CR8","volume-title":"Summarization\u2014compressing data into an informative representation","author":"V Chandola","year":"2005","unstructured":"Chandola V, Kumar V (2005) Summarization\u2014compressing data into an informative representation. Technical report TR 05-024, Department of Computer Science, University of Minnesota, Minneapolis, MN, USA"},{"key":"39_CR9","unstructured":"Ert\u00f6z L, Eilertson E, Lazarevic A, Tan P-N, Kumar V, Srivastava J, Dokas P (2004) MINDS\u2014Minnesota intrusion detection system. In: Data mining\u2014next generation challenges and future directions. MIT Press"},{"key":"39_CR10","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2000","unstructured":"Han J, Kamber M (2000) Data mining: concepts and techniques. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA"},{"key":"39_CR11","unstructured":"Han J, Wang J, Lu Y, Tzvetkov P (2002) Mining top-k frequent closed patterns without minimum support. In: Proceedings of the 2002 IEEE international conference on data mining (ICDM'02). IEEE Computer Society, Washington, DC, USA, p 211"},{"key":"39_CR12","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/1014052.1014073","volume-title":"Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining","author":"M Hu","year":"2004","unstructured":"Hu M, Liu B (2004) Mining and summarizing customer reviews. In: Proceedings of the 2004 ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, NY, USA, pp 168\u2013177."},{"key":"39_CR13","unstructured":"Jain AK, Dubes RC (1988) Algorithms for clustering data. Prentice-Hall Inc."},{"key":"39_CR14","unstructured":"Karypis G (XXXX) Cluto 2.1.1 software for clustering high-dimensional datasets"},{"key":"39_CR15","first-page":"12","volume":"2","author":"RP Lippmann","year":"2000","unstructured":"Lippmann RP et al (2000) Evaluating intrusion detection systems\u2014the 1998 DARPA off-line intrusion detection evaluation. In: DISCEX'00, vol 2, pp 12\u201326","journal-title":"DISCEX '00"},{"key":"39_CR16","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1145\/347090.347128","volume-title":"Proceedings of the sixth ACM SIGKDD international conference on knowledge discovery and data mining","author":"B Liu","year":"2000","unstructured":"Liu B, Hu M, Hsu W (2000) Multi-level organization and summarization of the discovered rules. In: Proceedings of the sixth ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, NY, USA, pp 208\u2013217"},{"key":"39_CR17","first-page":"376","volume-title":"Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining","author":"MV Mahoney","year":"2002","unstructured":"Mahoney MV, Chan PK (2002) Learning non-stationary models of normal network traffic for detecting novel attacks. In: Proceedings of the 8th ACM SIGKDD international conference on knowledge discovery and data mining. ACM Press, New York, NY, USA, pp 376\u2013385"},{"key":"39_CR18","volume-title":"Advances in automatic text summarization","author":"I Mani","year":"1999","unstructured":"Mani I (1999) Advances in automatic text summarization. MIT Press, Cambridge, MA, USA"},{"key":"39_CR19","first-page":"398","volume-title":"Proceedings of the 7th international conference on database theor","author":"N Pasquier","year":"1999","unstructured":"Pasquier N, Bastide Y, Taouil R, Lakhal L (1999) Discovering frequent closed itemsets for association rules. In: Proceedings of the 7th international conference on database theor. London, UK, Springer-Verlag, pp 398\u2013416"},{"issue":"5","key":"39_CR20","doi-asserted-by":"crossref","first-page":"570","DOI":"10.1007\/s10115-003-0133-6","volume":"6","author":"J Pei","year":"2004","unstructured":"Pei J, Dong G, Zou W, Han J (2004) Mining condensed frequent-pattern bases. Knowl Inf Syst 6(5):570\u2013594","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"39_CR21","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/PL00011675","volume":"3","author":"M Sayal","year":"2001","unstructured":"Sayal M, Scheuermann P (2001) Distributed web log mining using maximal large item sets. Knowl Inf Syst 3(4):389\u2013404","journal-title":"Knowl Inf Syst"},{"issue":"4","key":"39_CR22","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/604264.604267","volume":"30","author":"SJ Stolfo","year":"2001","unstructured":"Stolfo SJ, Lee W, Chan PK, Fan W, Eskin E (2001) Data mining-based intrusion detectors: an overview of the columbia ids project. SIGMOD Rec 30(4):5\u201314","journal-title":"SIGMOD Rec"},{"key":"39_CR23","unstructured":"Tan P-N, Steinbach M, Kumar V (2005) Introduction to data mining, chapter 8. Addison-Wesley"},{"issue":"1","key":"39_CR24","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/s10115-005-0216-7","volume":"9","author":"J Wang","year":"2006","unstructured":"Wang J, Karypis G (2006) On efficiently summarizing categorical databases. Knowl Inf Syst 9(1):19\u201337","journal-title":"Knowl Inf Syst"}],"container-title":["Knowledge and Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-006-0039-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10115-006-0039-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10115-006-0039-1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T10:10:15Z","timestamp":1559124615000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10115-006-0039-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,10,3]]},"references-count":24,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2007,8,3]]}},"alternative-id":["39"],"URL":"https:\/\/doi.org\/10.1007\/s10115-006-0039-1","relation":{},"ISSN":["0219-1377","0219-3116"],"issn-type":[{"value":"0219-1377","type":"print"},{"value":"0219-3116","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006,10,3]]}}}