{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,6]],"date-time":"2026-02-06T22:21:16Z","timestamp":1770416476003,"version":"3.49.0"},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"S1","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61373134"],"award-info":[{"award-number":["61373134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61402234"],"award-info":[{"award-number":["61402234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,1]]},"DOI":"10.1007\/s10586-017-1066-2","type":"journal-article","created":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T14:24:08Z","timestamp":1501597448000},"page":"1729-1738","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Anomaly detection model based on data stream clustering"],"prefix":"10.1007","volume":"22","author":[{"given":"Chunyong","family":"Yin","sequence":"first","affiliation":[]},{"given":"Sun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Zhichao","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,1]]},"reference":[{"key":"1066_CR1","unstructured":"Lee, W., Stolfo, S., Mok, K.: Mining audit data to build intrusion detection models. In: International Conference on Knowledge Discovery & Data Mining, pp. 66\u201372 (1998)"},{"issue":"1","key":"1066_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13673-016-0076-z","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan, N., Ji, S.Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.: A survey of cloud-based network intrusion detection analysis. Hum. Cent. Comput. Inf. Sci. 6(1), 19\u201335 (2016)","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"issue":"7","key":"1066_CR3","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2014","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2014)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"1066_CR4","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1016\/j.neunet.2015.03.013","volume":"67","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Wang, Z., Ho, D., Osman, S., Li, S.: Incremental learning for $$\\nu $$ \u03bd -support vector regression. Neural Netw. 67, 140\u2013150 (2015)","journal-title":"Neural Netw."},{"issue":"1","key":"1066_CR5","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13673-015-0041-2","volume":"5","author":"W Li","year":"2015","unstructured":"Li, W., Li, X., Yao, M., Jiang, J., Jin, Q.: Personalized fitting recommendation based on support vector regression. Hum. Cent. Comput. Inf. Sci. 5(1), 21\u201332 (2015)","journal-title":"Hum. Cent. Comput. Inf. Sci."},{"issue":"1","key":"1066_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-015-0050-1","volume":"5","author":"M Gaur","year":"2015","unstructured":"Gaur, M., Pant, B.: Trusted and secure clustering in mobile pervasive environment. Hum.-Cent. Comput. Inf. Sci. 5(1), 1\u201317 (2015)","journal-title":"Hum.-Cent. Comput. Inf. Sci."},{"issue":"3","key":"1066_CR7","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1007\/s10586-016-0589-2","volume":"19","author":"L Li","year":"2016","unstructured":"Li, L., Ye, J., Deng, F., Xiong, S., Zhong, L.: A comparison study of clustering algorithms for microblog posts. Clust. Comput. 19(3), 1333\u20131345 (2016)","journal-title":"Clust. Comput."},{"issue":"1","key":"1066_CR8","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1007\/s10586-016-0711-5","volume":"20","author":"C-C Chen","year":"2017","unstructured":"Chen, C.-C., Fu, X., Chang, C.-Y.: A terms mining and clustering technique for surveying network and content analysis of academic groups exploration. Clust. Comput. 20(1), 43\u201352 (2017)","journal-title":"Clust. Comput."},{"issue":"4","key":"1066_CR9","doi-asserted-by":"publisher","first-page":"2315","DOI":"10.1007\/s10586-016-0649-7","volume":"19","author":"J Jang","year":"2016","unstructured":"Jang, J., Lee, Y., Lee, S., Shin, D., Kim, D., Rim, H.: A novel density-based clustering method using word embedding features for dialogue intention recognition. Clust. Comput. 19(4), 2315\u20132326 (2016)","journal-title":"Clust. Comput."},{"key":"1066_CR10","first-page":"1","volume":"2016","author":"C Yin","year":"2016","unstructured":"Yin, C., Zhang, S.: Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimed. Tools Appl. 2016, 1\u201317 (2016)","journal-title":"Multimed. Tools Appl."},{"key":"1066_CR11","first-page":"1","volume":"2017","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S., Kim, K.: Mobile anomaly detection based on improved self-organizing maps. Mob. Inf. Syst. 2017, 1\u20139 (2017)","journal-title":"Mob. Inf. Syst."},{"key":"1066_CR12","unstructured":"Yin, C., Zhang, S., Xi, J., Wang, J.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput.-Pract. Exp. 29(7), 1\u201313 (2016)"},{"issue":"1","key":"1066_CR13","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/2522968.2522981","volume":"46","author":"J Silva","year":"2013","unstructured":"Silva, J., Faria, E., Barros, R., Hruschka, E.: Data stream clustering: a survey. ACM. Comput. Surv. 46(1), 125\u2013134 (2013)","journal-title":"ACM. Comput. Surv."},{"key":"1066_CR14","doi-asserted-by":"crossref","unstructured":"Oh, S., Kang, S., Byun, Y., Jeong, T., Lee, W.: Anomaly intrusion detection based on clustering a data stream. In: ACIS International Conference on Software Engineering Research, Management and Applications, vol. 4176, pp. 220\u2013227 (2005)","DOI":"10.1109\/SERA.2005.49"},{"issue":"3","key":"1066_CR15","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TKDE.2003.1198387","volume":"15","author":"S Guha","year":"2003","unstructured":"Guha, S., Meyerson, A., Mishra, N., Motwani, R.: Clustering data streams: theory and practice. IEEE Trans. Knowl. Data Eng. 15(3), 515\u2013528 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"1066_CR16","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P., Han, J., Wang, J.: A framework for clustering evolving data streams. In: International Conference on Very Large Data Bases, vol. 29, pp. 81\u201392 (2003)","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"1066_CR17","doi-asserted-by":"crossref","unstructured":"Cao, F., Ester, M., Qian, W., Zhou, A.: Density-based clustering over an evolving data stream with noise. In: SIAM International Conference on dData Mining, pp. 328\u2013339 (2006)","DOI":"10.1137\/1.9781611972764.29"},{"key":"1066_CR18","doi-asserted-by":"crossref","unstructured":"Udommanetanakit, K., Rakthanmanon, T., Waiyamai, K.: E-Stream: evolution-based technique for stream clustering. In: Third International Conference on Advanced Data Mining and Applications, pp. 605\u2013615 (2007)","DOI":"10.1007\/978-3-540-73871-8_58"},{"key":"1066_CR19","doi-asserted-by":"crossref","unstructured":"Chen, Y., Tu, L.: Density-based clustering for real-time stream data. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 133\u2013142 (2007)","DOI":"10.1145\/1281192.1281210"},{"issue":"3","key":"1066_CR20","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1145\/357830.357849","volume":"3","author":"S Axelsson","year":"2000","unstructured":"Axelsson, S.: The base-rate fallacy and the difficulty of intrusion detection. ACM Trans. Inf. Syst. Sec. 3(3), 186\u2013205 (2000)","journal-title":"ACM Trans. Inf. Syst. Sec."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1066-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-017-1066-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-017-1066-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T19:40:14Z","timestamp":1750794014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-017-1066-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,1]]},"references-count":20,"journal-issue":{"issue":"S1","published-print":{"date-parts":[[2019,1]]}},"alternative-id":["1066"],"URL":"https:\/\/doi.org\/10.1007\/s10586-017-1066-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,8,1]]},"assertion":[{"value":"17 March 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 May 2017","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"20 July 2017","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 August 2017","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Chunyong Yin, Sun Zhang, Zhichao Yin and Jin Wang declares that they have no conflict of interest.Ethical approvalThis article does not contain any studies with human participants or animals performed by any of the authors.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}