{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T11:07:03Z","timestamp":1772104023735,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T00:00:00Z","timestamp":1535155200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772282"],"award-info":[{"award-number":["61772282"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772454"],"award-info":[{"award-number":["61772454"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61373134"],"award-info":[{"award-number":["61373134"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61402234"],"award-info":[{"award-number":["61402234"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Priority Academic Program Development of Jiangsu Higher Education Institutions","award":["PAPD"],"award-info":[{"award-number":["PAPD"]}]},{"name":"Postgraduate Research & Practice Innovation Program of Jiangsu Province","award":["KYCX17_ 0901"],"award-info":[{"award-number":["KYCX17_ 0901"]}]},{"name":"Jiangsu Collaborative Innovation Center on Atmospheric Environment and Equipment Technology","award":["CICAEET"],"award-info":[{"award-number":["CICAEET"]}]},{"name":"Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications), Ministry of Education.","award":["open research fund"],"award-info":[{"award-number":["open research fund"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1007\/s10586-018-2835-2","type":"journal-article","created":{"date-parts":[[2018,8,25]],"date-time":"2018-08-25T12:10:56Z","timestamp":1535199056000},"page":"399-408","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Strategies for data stream mining method applied in anomaly detection"],"prefix":"10.1007","volume":"22","author":[{"given":"Ruxia","family":"Sun","sequence":"first","affiliation":[]},{"given":"Sun","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Chunyong","family":"Yin","sequence":"additional","affiliation":[]},{"given":"Jin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Seungwook","family":"Min","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,25]]},"reference":[{"key":"2835_CR1","unstructured":"Lee, W., Stolfo, S., Mok, K.: Mining audit data to build intrusion detection models. In: International conference on knowledge discovery & data mining, pp. 66\u201372 (1998)"},{"issue":"1","key":"2835_CR2","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1186\/s13673-016-0076-z","volume":"6","author":"N Keegan","year":"2016","unstructured":"Keegan, N., Ji, S.Y., Chaudhary, A., Concolato, C., Yu, B., Jeong, D.H.: A survey of cloud-based network intrusion detection analysis. Hum. Centric Comput. Inf. Sci. 6(1), 19\u201335 (2016)","journal-title":"Hum. Centric Comput. Inf. Sci."},{"issue":"7","key":"2835_CR3","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1002\/cpe.3902","volume":"29","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S., Xi, J., Wang, J.: An improved anonymity model for big data security based on clustering algorithm. Concurr. Comput. 29(7), 1\u201313 (2017)","journal-title":"Concurr. Comput."},{"key":"2835_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s11042-015-3011-9","volume":"76","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S.: Parallel implementing improved k-means applied for image retrieval and anomaly detection. Multimed Tools Appl. 76, 1\u201317 (2017)","journal-title":"Multimed Tools Appl."},{"issue":"9","key":"2835_CR5","doi-asserted-by":"publisher","first-page":"6225","DOI":"10.1016\/j.eswa.2010.02.102","volume":"37","author":"G Wang","year":"2010","unstructured":"Wang, G., Hao, J., Ma, J., Huang, L.: A new approach to intrusion detection using Artificial Neural Networks and fuzzy clustering. Expert Syst. Appl. 37(9), 6225\u20136232 (2010)","journal-title":"Expert Syst. Appl."},{"issue":"3","key":"2835_CR6","doi-asserted-by":"publisher","first-page":"1333","DOI":"10.1007\/s10586-016-0589-2","volume":"19","author":"L Li","year":"2016","unstructured":"Li, L., Ye, J., Deng, F., Xiong, S., Zhong, L.: A comparison study of clustering algorithms for microblog posts. Clust. Comput. 19(3), 1333\u20131345 (2016)","journal-title":"Clust. Comput."},{"issue":"1","key":"2835_CR7","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1186\/s13673-015-0041-2","volume":"5","author":"W Li","year":"2015","unstructured":"Li, W., Li, X., Yao, M., Jiang, J., Jin, Q.: Personalized fitting recommendation based on support vector regression. Hum. Centric Comput. Inf. Sci. 5(1), 21\u201332 (2015)","journal-title":"Hum. Centric Comput. Inf. Sci."},{"issue":"7","key":"2835_CR8","doi-asserted-by":"publisher","first-page":"1646","DOI":"10.1109\/TNNLS.2016.2544779","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu, B., Sun, X., Sheng, V.S.: Structural minimax probability machine. IEEE Trans. Neural Netw. Learn. Syst. 28(7), 1646\u20131656 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"5","key":"2835_CR9","doi-asserted-by":"publisher","first-page":"1241","DOI":"10.1109\/TNNLS.2016.2527796","volume":"28","author":"B Gu","year":"2017","unstructured":"Gu, B., Victor, S.S.: A robust regularization path algorithm for \u03bd-support vector classification. IEEE Trans. Neural Netw. Learn. Syst. 28(5), 1241\u20131248 (2017)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"issue":"7","key":"2835_CR10","doi-asserted-by":"publisher","first-page":"1403","DOI":"10.1109\/TNNLS.2014.2342533","volume":"26","author":"B Gu","year":"2015","unstructured":"Gu, B., Sheng, V.S., Tay, K.Y., Romano, W., Li, S.: Incremental support vector learning for ordinal regression. IEEE Trans. Neural Netw. Learn. Syst. 26(7), 1403\u20131416 (2015)","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"2835_CR11","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1016\/j.knosys.2014.08.013","volume":"71","author":"E Hoz De la","year":"2014","unstructured":"De la Hoz, E., de la Hoz, E., Ortiz, A., Ortega, J., Mart\u00ednez-\u00c1lvarez, A.: Feature selection by multi-objective optimisation: application to network anomaly detection by hierarchical self-organising maps. Knowl Based Syst. 71, 322\u2013338 (2014)","journal-title":"Knowl Based Syst."},{"key":"2835_CR12","first-page":"1","volume":"2017","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S., Kim, K.J.: Mobile anomaly detection based on improved self-organizing maps. Mob Inf Syst. 2017, 1\u20139 (2017)","journal-title":"Mob Inf Syst."},{"issue":"12","key":"2835_CR13","doi-asserted-by":"publisher","first-page":"1165","DOI":"10.1007\/s00607-015-0453-x","volume":"97","author":"T Ma","year":"2015","unstructured":"Ma, T., Zhang, Y., Cao, J., Shen, J., Tang, M., Tian, Y., Al-Dhelaan, A., Al-Rodhaan, M.: KDVEM: a k-degree anonymity with vertex and edge modification algorithm. Computing 97(12), 1165\u20131184 (2015)","journal-title":"Computing"},{"issue":"9","key":"2835_CR14","doi-asserted-by":"publisher","first-page":"2546","DOI":"10.1109\/TPDS.2015.2506573","volume":"27","author":"Z Fu","year":"2016","unstructured":"Fu, Z., Ren, K., Shu, J., Sun, X., Huang, F.: Enabling personalized search over encrypted outsourced data with efficiency improvement. IEEE Trans. Parallel Distr. 27(9), 2546\u20132559 (2016)","journal-title":"IEEE Trans. Parallel Distr."},{"issue":"1","key":"2835_CR15","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TCE.2014.6780921","volume":"60","author":"J Wang","year":"2014","unstructured":"Wang, J., Zhang, Z., Li, B., Lee, S., Sherratt, R.: An enhanced fall detection system for elderly person monitoring using consumer home networks. IEEE Trans. Consum. Electr. 60(1), 23\u201329 (2014)","journal-title":"IEEE Trans. Consum. Electr."},{"issue":"1","key":"2835_CR16","doi-asserted-by":"publisher","first-page":"79","DOI":"10.3745\/JIPS.2010.6.1.079","volume":"6","author":"K Younghee","year":"2010","unstructured":"Younghee, K., Wonyoung, K., Ungmo, K.: Mining frequent itemsets with normalized weight in continuous data streams. J. Inform. Process. Syst. 6(1), 79\u201390 (2010)","journal-title":"J. Inform. Process. Syst."},{"issue":"4","key":"2835_CR17","doi-asserted-by":"publisher","first-page":"717","DOI":"10.3745\/JIPS.2011.7.4.717","volume":"7","author":"S Fong","year":"2011","unstructured":"Fong, S., Hang, Y., Mohammed, S., Fiaidhi, J.: Stream-based biomedical classification algorithms for analyzing biosignals. J. Inform. Process. Syst. 7(4), 717 (2011)","journal-title":"J. Inform. Process. Syst."},{"issue":"4","key":"2835_CR18","doi-asserted-by":"publisher","first-page":"481","DOI":"10.3745\/JIPS.2010.6.4.481","volume":"6","author":"AM El-Semary","year":"2010","unstructured":"El-Semary, A.M., Mostafa, G.H.M.: Distributed and scalable intrusion detection system based on agents and intelligent techniques. J. Inform. Process. Syst. 6(4), 481\u2013500 (2010)","journal-title":"J. Inform. Process. Syst."},{"key":"2835_CR19","doi-asserted-by":"publisher","first-page":"132","DOI":"10.1016\/j.inffus.2017.02.004","volume":"37","author":"B Krawczyk","year":"2017","unstructured":"Krawczyk, B., Minku, L.L., Gama, J., Stefanowski, J., Wo\u017aniak, M.: Ensemble learning for data stream analysis: a survey. Inform. Fusion. 37, 132\u2013156 (2017)","journal-title":"Inform. Fusion."},{"key":"2835_CR20","doi-asserted-by":"crossref","unstructured":"Domingos, P., Hulten, G.: Mining high-speed data streams. In: ACM SIGKDD international conference on knowledge discovery and data mining, pp. 71\u201380 (2000)","DOI":"10.1145\/347090.347107"},{"issue":"2","key":"2835_CR21","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/335191.335372","volume":"29","author":"J Han","year":"2000","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. ACM Sigmod. Rec. 29(2), 1\u201312 (2000)","journal-title":"ACM Sigmod. Rec."},{"issue":"1\u20132","key":"2835_CR22","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1080\/01969722.2015.1007736","volume":"46","author":"I Czarnowski","year":"2015","unstructured":"Czarnowski, I., J\u0119drzejowicz, P.: Ensemble online classifier based on the one-class base classifiers for mining data streams. Cybern. Syst. 46(1\u20132), 51\u201368 (2015)","journal-title":"Cybern. Syst."},{"issue":"1","key":"2835_CR23","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13673-015-0050-1","volume":"5","author":"MS Gaur","year":"2015","unstructured":"Gaur, M.S., Pant, B.: Trusted and secure clustering in mobile pervasive environment. Hum. Centric Comput. Inf. Sci. 5(1), 1\u201317 (2015)","journal-title":"Hum. Centric Comput. Inf. Sci."},{"issue":"3","key":"2835_CR24","doi-asserted-by":"publisher","first-page":"515","DOI":"10.1109\/TKDE.2003.1198387","volume":"15","author":"S Guha","year":"2003","unstructured":"Guha, S., Meyerson, A., Mishra, N., Motwani, R.: Clustering data streams: theory and practice. IEEE Trans. Knowl. Data Eng. 15(3), 515\u2013528 (2003)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"2835_CR25","doi-asserted-by":"crossref","unstructured":"Aggarwal, C., Yu, P., Han, J., Wang, J.: A framework for clustering evolving data streams. In: International conference on very large data bases, pp. 81\u201392 (2003)","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"2835_CR26","doi-asserted-by":"crossref","unstructured":"Chen, Y., Tu, L.: Density-based clustering for real-time stream data. In: ACM SigkDD international conference on knowledge discovery & data mining, pp. 133\u2013142 (2007)","DOI":"10.1145\/1281192.1281210"},{"issue":"C","key":"2835_CR27","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.neucom.2017.01.078","volume":"239","author":"S Ram\u00edrez-Gallego","year":"2017","unstructured":"Ram\u00edrez-Gallego, S., Krawczyk, B., Garc\u00eda, S., Wo\u017aniak, M., Herrera, F.: A survey on data preprocessing for data stream mining: current status and future directions. Neurocomputing 239(C), 39\u201357 (2017)","journal-title":"Neurocomputing"},{"key":"2835_CR28","doi-asserted-by":"crossref","unstructured":"Oh, S., Kang, S., Byun, Y., Jeong, T., Lee, W.: Anomaly intrusion detection based on clustering a data stream. In: ACIS international conference on software engineering research, management and applications, pp. 220\u2013227 (2005)","DOI":"10.1109\/SERA.2005.49"},{"key":"2835_CR29","doi-asserted-by":"crossref","unstructured":"Guerrieri, A., Montresor, A.: DS-means: distributed data stream clustering. In: International conference on parallel processing, pp. 260\u2013271 (2012)","DOI":"10.1007\/978-3-642-32820-6_27"},{"key":"2835_CR30","first-page":"1","volume":"2017","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S., Yin, Z., Wang, J.: Anomaly detection model based on data stream clustering. Clust. Comput. 2017, 1\u201310 (2017)","journal-title":"Clust. Comput."},{"key":"2835_CR31","doi-asserted-by":"publisher","first-page":"620","DOI":"10.1007\/978-981-10-5041-1_98","volume":"448","author":"C Yin","year":"2017","unstructured":"Yin, C., Zhang, S., Wang, J.: Improved data stream clustering algorithm for anomaly detection. Adv. Multimed. Ubiquitous Eng. 448, 620\u2013625 (2017)","journal-title":"Adv. Multimed. Ubiquitous Eng."},{"key":"2835_CR32","doi-asserted-by":"crossref","unstructured":"Hulten, G., Spencer, L., Domingos, P.: Mining time-changing data streams. In: ACM SigkDD international conference on knowledge discovery & data mining, pp. 97\u2013106 (2001)","DOI":"10.1145\/502512.502529"},{"key":"2835_CR33","doi-asserted-by":"crossref","unstructured":"Rocha, R., Medas, P.: Accurate decision trees for mining high-speed data streams. In: ACM SigkDD international conference on knowledge discovery & data mining, pp. 523\u2013528 (2003)","DOI":"10.1145\/956750.956813"},{"issue":"9\u201310","key":"2835_CR34","doi-asserted-by":"publisher","first-page":"1469","DOI":"10.1007\/s10994-017-5642-8","volume":"106","author":"HM Gomes","year":"2017","unstructured":"Gomes, H.M., Bifet, A., Read, J., Barddal, J.P., Enembreck, F., Pfharinger, B., Holmes, G., Abdessalem, T.: Adaptive random forests for evolving data stream classification. Mach Learn. 106(9\u201310), 1469\u20131495 (2017)","journal-title":"Mach Learn."},{"key":"2835_CR35","doi-asserted-by":"publisher","first-page":"46","DOI":"10.1016\/j.ins.2016.10.028","volume":"381","author":"L Pietruczuk","year":"2017","unstructured":"Pietruczuk, L., Rutkowski, L., Jaworski, M., Duda, P.: How to adjust an ensemble size in stream data mining? Inform. Sci. 381, 46\u201354 (2017)","journal-title":"Inform. Sci."},{"issue":"1","key":"2835_CR36","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/2522968.2522981","volume":"46","author":"J Silva","year":"2013","unstructured":"Silva, J., Faria, E., Barros, R., Hruschka, E.: Data stream clustering: a survey. ACM Comput. Surv. 46(1), 125\u2013134 (2013)","journal-title":"ACM Comput. Surv."},{"key":"2835_CR37","doi-asserted-by":"crossref","unstructured":"Cao, F., Ester, M., Qian, W., Zhou, A.: Density-based clustering over an evolving data stream with noise. In: SIAM international conference on data mining, pp. 328\u2013339 (2006)","DOI":"10.1137\/1.9781611972764.29"},{"key":"2835_CR38","doi-asserted-by":"crossref","unstructured":"Udommanetanakit, K., Rakthanmanon, T., Waiyamai, K.: E-stream: evolution-based technique for stream clustering. In: International conference on advanced data mining and applications, pp. 605\u2013615 (2007)","DOI":"10.1007\/978-3-540-73871-8_58"},{"issue":"4","key":"2835_CR39","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1145\/2523813","volume":"46","author":"J Gama","year":"2014","unstructured":"Gama, J., \u017dliobait\u0117, I., Bifet, A., Pechenizkiy, M., Bouchachia, A.: A survey on concept drift adaptation. ACM Comput. Surv. 46(4), 44 (2014)","journal-title":"ACM Comput. Surv."},{"key":"2835_CR40","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1016\/j.ins.2016.11.018","volume":"381","author":"S Laohakiat","year":"2017","unstructured":"Laohakiat, S., Phimoltares, S., Lursinsap, C.: A clustering algorithm for stream data with LDA-based unsupervised localized dimension reduction. Inform. Sci. 381, 104\u2013123 (2017)","journal-title":"Inform. Sci."}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2835-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-018-2835-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-018-2835-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T15:19:29Z","timestamp":1751815169000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-018-2835-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,25]]},"references-count":40,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,6]]}},"alternative-id":["2835"],"URL":"https:\/\/doi.org\/10.1007\/s10586-018-2835-2","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"value":"1386-7857","type":"print"},{"value":"1573-7543","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,25]]},"assertion":[{"value":"5 September 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 May 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"10 August 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"25 August 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Compliance with ethical standards"}},{"value":"Ruxia Sun declares that she has no conflict of interest. Sun Zhang declares that he has no conflict of interest. Chunyong Yin declares that he has no conflict of interest. Jin Wang declares that he has no conflict of interest. Seungwook Min declares that he has no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"This article does not contain any studies with human participants or animals performed by any of the authors.","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Ethical approval"}}]}}