{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:48:24Z","timestamp":1760597304593},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,9,27]],"date-time":"2007-09-27T00:00:00Z","timestamp":1190851200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Comput Math Organiz Theor"],"published-print":{"date-parts":[[2007,10,9]]},"DOI":"10.1007\/s10588-007-9018-7","type":"journal-article","created":{"date-parts":[[2007,9,26]],"date-time":"2007-09-26T13:57:49Z","timestamp":1190815069000},"page":"407-422","source":"Crossref","is-referenced-by-count":22,"title":["Anomaly detection in a mobile communication network"],"prefix":"10.1007","volume":"13","author":[{"given":"Alec","family":"Pawling","sequence":"first","affiliation":[]},{"given":"Nitesh V.","family":"Chawla","sequence":"additional","affiliation":[]},{"given":"Greg","family":"Madey","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,9,27]]},"reference":[{"key":"9018_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Han J, Wang J, Yu PS (2003) framework for clustering evolving data streams. In: Proceedings of the 29th VLDB conference","DOI":"10.1016\/B978-012722442-8\/50016-1"},{"key":"9018_CR2","unstructured":"Associated Press (2005) Tracking cell phones for real-time traffic data"},{"key":"9018_CR3","doi-asserted-by":"crossref","unstructured":"Babcock B, Babu S, Datar M, Motwanim R, Widom J (2002) Models and issues in data stream systems. In: Proceedings of the 21st ACM SIGMOD-SIGACT-SIGART symposium on principles of database systems, pp\u00a01\u201316","DOI":"10.1145\/543613.543615"},{"issue":"2","key":"9018_CR4","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1287\/inte.14.2.29","volume":"14","author":"S Belardo","year":"1984","unstructured":"Belardo S, Karwan KR, Wallace WA (1984) Managing the response to disasters using microcomputers. Interfaces 14(2):29\u201339","journal-title":"Interfaces"},{"issue":"9","key":"9018_CR5","doi-asserted-by":"crossref","first-page":"509","DOI":"10.1145\/361002.361007","volume":"18","author":"JL Bentley","year":"1975","unstructured":"Bentley JL (1975) Multidimensional binary search trees used for associative searching. Commun ACM 18(9):509\u2013517","journal-title":"Commun ACM"},{"key":"9018_CR6","volume-title":"Quality control handbook","author":"C Bicking","year":"1979","unstructured":"Bicking C, Gryna Jr\u00a0FM (1979) Quality control handbook. McGraw-Hill, New York"},{"key":"9018_CR7","unstructured":"Cheu EY, Keongg C, Zhou Z (2004) On the two-level hybrid clustering algorithm. In: International conference on artificial intelligence in science and technology, pp 138\u2013142"},{"issue":"2","key":"9018_CR8","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1093\/biostatistics\/kxj007","volume":"7","author":"H Chipman","year":"2006","unstructured":"Chipman H, Tibshirani R (2006) Hybrid hierarchical clustering with applications to microarray data. Biostatistics 7(2):286\u2013301","journal-title":"Biostatistics"},{"key":"9018_CR9","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TKDE.2003.1198387","volume":"3","author":"S Guha","year":"2003","unstructured":"Guha S, Meyerson A, Mishra N, Motwani R, O\u2019Callaghan L (2003) Clustering data streams: theory and practice. IEEE Trans Knowl Data Eng 3:515\u2013528","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"9018_CR10","series-title":"Wiley series in probability and mathematical statistics","volume-title":"Clustering algorithms","author":"JA Hartigan","year":"1975","unstructured":"Hartigan JA (1975) Clustering algorithms. Wiley series in probability and mathematical statistics. Wiley, New York"},{"key":"9018_CR11","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1023\/B:AIRE.0000045502.10941.a9","volume":"22","author":"VJ Hodge","year":"2004","unstructured":"Hodge VJ, Austin J (2004) A survey of outlier detection methodologies. Artif Intell Rev 22:85\u2013126","journal-title":"Artif Intell Rev"},{"key":"9018_CR12","volume-title":"Algorithms for clustering data","author":"AK Jain","year":"1998","unstructured":"Jain AK, Dubes RC (1998) Algorithms for clustering data. Prentice-Hall, Englewood Cliffs"},{"issue":"3","key":"9018_CR13","doi-asserted-by":"crossref","first-page":"264","DOI":"10.1145\/331499.331504","volume":"31","author":"AK Jain","year":"1999","unstructured":"Jain AK, Murty MN, Flynn PJ (1999) Data clustering: a review. ACM Comput Surveys 31(3):264\u2013323","journal-title":"ACM Comput Surveys"},{"key":"9018_CR14","doi-asserted-by":"crossref","unstructured":"Jennex ME (2007) Modeling emergency response systems. In: Proceedings of the 40th Hawaii international conference on system sciences","DOI":"10.1109\/HICSS.2007.386"},{"key":"9018_CR15","series-title":"Lecture notes in computer science","volume-title":"International conference on computational science","author":"GR Madey","year":"2007","unstructured":"Madey GR, Barab\u00e1si AL, Chawla NV, Gonzalez M, Hachen D, Lantz B, Pawling A, Schoenharl T, Szab\u00f3 G, Wang P, Yan P (2007) Enhanced situational awareness: application of DDDAS concepts to emergency and disaster management. In: Alexandrov VN, van\u00a0Albada GD, Sloot PMA, Dongarra J (eds) International conference on computational science. Lecture notes in computer science. Springer, Berlin"},{"issue":"12","key":"9018_CR16","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou M, Singh S (2003a) Novelty detection: a review. part 1: statistical approaches. Signal Process 83(12):2481\u20132497","journal-title":"Signal Process"},{"issue":"12","key":"9018_CR17","doi-asserted-by":"crossref","first-page":"2499","DOI":"10.1016\/j.sigpro.2003.07.019","volume":"83","author":"M Markou","year":"2003","unstructured":"Markou M, Singh S (2003b) Novelty detection: a review. part 2: neural network based approaches. Signal Process 83(12):2499\u20132521","journal-title":"Signal Process"},{"key":"9018_CR18","first-page":"543","volume-title":"Advances in neural information processing systems","author":"A Moore","year":"1999","unstructured":"Moore A (1999) Very fast EM-based mixture model clustering using multiresolution kd-trees. In: Kearns M, Cohn D (eds) Advances in neural information processing systems. Kaufman, Los Altos, pp 543\u2013549"},{"key":"9018_CR19","unstructured":"National Science Foundation (2006) Real-time traffic routing from the comfort of your car. Press release 06-124. http:\/\/www.nsf.gov\/news\/news_summ.jsp?cntn_id=107972"},{"key":"9018_CR20","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1145\/312129.312248","volume-title":"Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining","author":"D Pelleg","year":"1999","unstructured":"Pelleg D, Moore A (1999) Accelerating exact k-means algorithms with geometric reasoning. In: Proceedings of the fifth ACM SIGKDD international conference on knowledge discovery and data mining. ACM, New York, pp 277\u2013281"},{"key":"9018_CR21","unstructured":"Portnoy L, Eskin E, Stolfo S (2001) Intrusion detection with unlabeled data using clustering. In: ACM workshop on data mining applied to security"},{"issue":"4","key":"9018_CR22","first-page":"209","volume":"11","author":"T Schoenharl","year":"2006","unstructured":"Schoenharl T, Bravo R, Madey G (2006a) WIPER: leveraging the cell phone network for emergency response. Int J Intell Control Syst 11(4):209\u2013216","journal-title":"Int J Intell Control Syst"},{"key":"9018_CR23","unstructured":"Schoenharl T, Madey G, Szab\u00f3 G, Barab\u00e1si AL (2006b) WIPER: multi-agent system for emergency response. In: Proceedings of the 3rd international ISCRAM conference"},{"key":"9018_CR24","unstructured":"Sillem S, Wiersma E (2006) Comparing cell broadcast and text messaging for citizen warning. In: Proceedings of the 3rd international ISCRAM conference"},{"key":"9018_CR25","doi-asserted-by":"crossref","first-page":"640","DOI":"10.2307\/2392406","volume":"22","author":"C Smart","year":"1977","unstructured":"Smart C, Vertinsky I (1977) Designs for crisis decision units. Adm Sci Q 22:640\u2013657","journal-title":"Adm Sci Q"},{"key":"9018_CR26","doi-asserted-by":"crossref","unstructured":"Surdeanu M, Turmo J, Ageno A (2005) A hybrid unsupervised approach for document clustering. In: Proceedings of the 5th ACM SIGKDD international conference on knowledge discovery and data mining","DOI":"10.1145\/1081870.1081957"},{"key":"9018_CR27","unstructured":"Tsymbal A (2004) The problem of concept drift: definitions and related work. Technical report TCD-CS-2004-15, Trinity College, Dublin"},{"key":"9018_CR28","volume-title":"Data mining: practical machine learning tools and techniques","author":"IH Witten","year":"2005","unstructured":"Witten IH, Frank E (2005) Data mining: practical machine learning tools and techniques, 2nd edn. Kaufman, Los Altos","edition":"2"},{"key":"9018_CR29","unstructured":"Wood M (2005) Cell@lert, for government-to-citizen mass communications in emergencies; it\u2019s about time. In: Proceedings of the second international ISCRAM conference"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-007-9018-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-007-9018-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-007-9018-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,31]],"date-time":"2019-05-31T11:36:21Z","timestamp":1559302581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-007-9018-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,27]]},"references-count":29,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,10,9]]}},"alternative-id":["9018"],"URL":"https:\/\/doi.org\/10.1007\/s10588-007-9018-7","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,9,27]]}}}