{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,26]],"date-time":"2024-07-26T04:37:15Z","timestamp":1721968635151},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T00:00:00Z","timestamp":1428019200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Comput Math Organ Theory"],"published-print":{"date-parts":[[2015,6]]},"DOI":"10.1007\/s10588-015-9182-0","type":"journal-article","created":{"date-parts":[[2015,4,3]],"date-time":"2015-04-03T15:44:00Z","timestamp":1428075840000},"page":"210-241","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Learning and prediction of relational time series"],"prefix":"10.1007","volume":"21","author":[{"given":"Terence K.","family":"Tan","sequence":"first","affiliation":[]},{"given":"Christian J.","family":"Darken","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,4,3]]},"reference":[{"key":"9182_CR1","unstructured":"Ames M, Chan C, Chng K, Cole A, Johnson D, Kwai K, Koh K, Lim H, Lim T, Liu Y, Marsh A, McRoberts C, Ng C, Ng C, Ng M, Nguyen H, Okruhlik L, Oh P, Ong K, Peh L, Soh W, Tan C, Toh L, Torian J, Wong Y (2007) Port security strategy 2012. M.S. thesis, Naval Postgraduate School, Monterey, California"},{"issue":"2","key":"9182_CR2","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1214\/aos\/1018031204","volume":"27","author":"P Buhlmann","year":"1999","unstructured":"Buhlmann P, Wyner AJ (1999) Variable length Marov chains. Ann Stat 27(2):480\u2013513","journal-title":"Ann Stat"},{"key":"9182_CR3","doi-asserted-by":"crossref","unstructured":"Buss A (2002) Component-based simulation modeling with Simkit. Proceedings of the 2002 Winter Simulation Conference. doi:10.1.1.1.5324","DOI":"10.1109\/WSC.2002.1172891"},{"key":"9182_CR4","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1006\/csla.1999.0128","volume":"13","author":"SF Chen","year":"1999","unstructured":"Chen SF, Goodman J (1999) An empirical study of smoothing techniques for language modeling. Comput Speech Lang 13:359\u2013393","journal-title":"Comput Speech Lang"},{"issue":"2","key":"9182_CR5","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1017\/S0269888910000251","volume":"26","author":"R Daly","year":"2011","unstructured":"Daly R, Shen Q, Aitken S (2011) Learning Bayesian networks: approaches and issues. Knowl Eng Rev 26(2):99\u2013157","journal-title":"Knowl Eng Rev"},{"key":"9182_CR6","unstructured":"Darken C (2005) Towards learned anticipation in complex stochastic environmentss. Proceedings of the Artificial Intelligence for Interactive Digital Entertainment, pp 27\u201332"},{"key":"9182_CR7","unstructured":"Debar H (2000) An introduction to intrusion-detection systems> Proceedings of Connect. doi 10.1.1.101.7433"},{"key":"9182_CR8","unstructured":"Frederick E, Rowe N, Wong A (2012) Testing deception tactics in response to cyberattacks. Proceedings of the National Symposium on Moving Target Research, Annapolis. Available at http:\/\/cps-vo.org\/node\/3711"},{"key":"9182_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7432.001.0001","volume-title":"Introduction to statistical relational learning","author":"L Getoor","year":"2007","unstructured":"Getoor L, Taskar B (2007) Introduction to statistical relational learning. The MIT Press, Cambridge"},{"issue":"3","key":"9182_CR10","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s10588-011-9091-9","volume":"17","author":"P Jungkunz","year":"2011","unstructured":"Jungkunz P, Darken CJ (2011) A computational model for human eye-movements in military simulations. Comput Math Organ Theory 17(3):229\u2013250","journal-title":"Comput Math Organ Theory"},{"key":"9182_CR11","doi-asserted-by":"crossref","unstructured":"Khosravi H, Bina B (2010) A survey on statistical relational learning. Proceedings of the Canadian Conference on Artificial Intelligence, pp 256\u2013268","DOI":"10.1007\/978-3-642-13059-5_25"},{"key":"9182_CR12","doi-asserted-by":"crossref","DOI":"10.1201\/9781420011012","volume-title":"Adversarial reasoning: computational approaches to reading the opponent\u2019s mind","author":"A Kott","year":"2006","unstructured":"Kott A, McEneaney W (2006) Adversarial reasoning: computational approaches to reading the opponent\u2019s mind. Chapman and Hall\/CRC, Boca Raton"},{"key":"9182_CR13","unstructured":"Kunde D, Darken C (2006) A mental simulation-based decision-making architecture applied to ground combat. Proceedings of the behavior representation in modeling & simulation. doi:10.1.1.64.713"},{"issue":"2","key":"9182_CR14","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1016\/j.tics.2007.11.004","volume":"12","author":"CA Kurby","year":"2007","unstructured":"Kurby CA, Zacks JM (2007) Segmentation in the perception and memory of events. Trends Cognit Sci 12(2):72\u201379. doi: 10.1016\/j.tics.2007.11.004","journal-title":"Trends Cognit Sci"},{"key":"9182_CR15","unstructured":"L\u00e1szl\u00f3 B, Paolo C (2008) Isomorphism of hypergraphs of low rank in moderately exponential time. FOCS \u201808: Proceedings of the 2008 49th Annual IEEE Symposium on Foundations of Computer Science, IEEE Computer Society, pp 667\u2013676, ISBN 978-0-7695-3436-7"},{"key":"9182_CR16","doi-asserted-by":"crossref","unstructured":"Li Z, Zhang A, Lei J, Wang L (2007) Real-time correlation of network security alerts. Proceedings of IEEE International Conference on e-Business Engineering, pp 73\u201380","DOI":"10.1109\/ICEBE.2007.69"},{"key":"9182_CR17","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1002\/spe.4380120103","volume":"12","author":"JJ McGregor","year":"1982","unstructured":"McGregor JJ (1982) Backtrack search algorithms and the maximal common subgraph problem. Softw Pract Exp 12:23\u201334","journal-title":"Softw Pract Exp"},{"key":"9182_CR23","unstructured":"Qin X (2005) A probabilistic-based framework for INFOSEC alert correlation. Ph.D. dissertation, Georgia Institute of Technology, Atlanta, Georgia"},{"key":"9182_CR18","unstructured":"Roesch M (1999) Snort\u2014lightweight intrusion-detection for networks. Proceedings of LISA\u201999: 13th Systems Administration Conference, pp 229\u2013238"},{"key":"9182_CR19","volume-title":"Artificial intelligence: a modern approach","author":"S Russell","year":"2010","unstructured":"Russell S, Norvig P (2010) Artificial intelligence: a modern approach. Prentice Hall, Upper Saddle River"},{"issue":"2","key":"9182_CR20","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1109\/MCI.2009.932254","volume":"4","author":"N Sapankevych","year":"2009","unstructured":"Sapankevych N, Sankar R (2009) Time-series prediction using support vector machine: a survey. Proc IEEE Comput Intell Mag 4(2):24\u201338","journal-title":"Proc IEEE Comput Intell Mag"},{"issue":"4","key":"9182_CR21","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1109\/MIS.2001.1463065","volume":"16","author":"R Sun","year":"2001","unstructured":"Sun R, Giles CL (2001) Sequence learning: from recognition and prediction to sequential decision making. IEEE Intell Syst 16(4):67\u201370","journal-title":"IEEE Intell Syst"},{"key":"9182_CR22","unstructured":"Tan T (2007) Tactical plan generation software for maritime interdiction using conceptual blending theory. M.S. thesis, Naval Postgraduate School, Monterey, California"}],"container-title":["Computational and Mathematical Organization Theory"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-015-9182-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10588-015-9182-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10588-015-9182-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,22]],"date-time":"2019-08-22T21:53:25Z","timestamp":1566510805000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10588-015-9182-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2015,6]]}},"alternative-id":["9182"],"URL":"https:\/\/doi.org\/10.1007\/s10588-015-9182-0","relation":{},"ISSN":["1381-298X","1572-9346"],"issn-type":[{"value":"1381-298X","type":"print"},{"value":"1572-9346","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,4,3]]}}}