{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T21:54:05Z","timestamp":1771019645738,"version":"3.50.1"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2010,1,26]],"date-time":"2010-01-26T00:00:00Z","timestamp":1264464000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Data Min Knowl Disc"],"published-print":{"date-parts":[[2010,3]]},"DOI":"10.1007\/s10618-009-0159-9","type":"journal-article","created":{"date-parts":[[2010,1,25]],"date-time":"2010-01-25T11:07:08Z","timestamp":1264417628000},"page":"290-324","source":"Crossref","is-referenced-by-count":77,"title":["Distance-based outlier queries in data streams: the novel task and algorithms"],"prefix":"10.1007","volume":"20","author":[{"given":"Fabrizio","family":"Angiulli","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Fassetti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,1,26]]},"reference":[{"key":"159_CR1","doi-asserted-by":"crossref","unstructured":"Aggarwal CC, Yu PS (2001) Outlier detection for high dimensional data. In: Proceedings of international conference on managment of data (SIGMOD\u201901)","DOI":"10.1145\/375663.375668"},{"key":"159_CR2","doi-asserted-by":"crossref","unstructured":"Aggarwal CC (2005) On abnormality detection in spuriously populated data streams. In: SIAM data mining","DOI":"10.1137\/1.9781611972757.8"},{"issue":"2","key":"159_CR3","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1109\/TKDE.2006.29","volume":"18","author":"F Angiulli","year":"2006","unstructured":"Angiulli F, Basta S, Pizzuti C (2006) Distance-based detection and prediction of outliers. IEEE Trans Knowl Data Eng 18(2): 145\u2013160","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"159_CR4","doi-asserted-by":"crossref","unstructured":"Angiulli F, Pizzuti C (2002) Fast outlier detection in large high-dimensional data sets. In: Proceedings of international conference on principles of data mining and knowledge discovery (PKDD\u201902), pp 15\u201326","DOI":"10.1007\/3-540-45681-3_2"},{"issue":"2","key":"159_CR5","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1109\/TKDE.2005.31","volume":"17","author":"F Angiulli","year":"2005","unstructured":"Angiulli F, Pizzuti C (2005) Outlier mining in large high-dimensional data sets. IEEE Trans Knowl Data Eng 17(2): 203\u2013215","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"159_CR6","doi-asserted-by":"crossref","unstructured":"Angiulli F, Fassetti F (2007) Very efficient mining of distance-based outliers. In: CIKM, pp 791\u2013800","DOI":"10.1145\/1321440.1321550"},{"issue":"1","key":"159_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1497577.1497581","volume":"3","author":"F Angiulli","year":"2009","unstructured":"Angiulli F, Fassetti F (2009) Dolphin: an efficient algorithm for mining distance-based outliers in very large datasets. ACM Trans Knowl Discov Data (TKDD) 3(1): 1\u201357","journal-title":"ACM Trans Knowl Discov Data (TKDD)"},{"key":"159_CR8","unstructured":"Arning A, Aggarwal C, Raghavan P (1996) A linear method for deviation detection in large databases. In: Proceedings of international conference on knowledge discovery and data mining (KDD\u201996), pp 164\u2013169"},{"key":"159_CR9","doi-asserted-by":"crossref","unstructured":"Babcock B, Babu S, Datar M, Motwani R, Widom J (2002) Models and issues in data stream systems. In: PODS, pp 1\u201316","DOI":"10.1145\/543613.543615"},{"key":"159_CR10","volume-title":"Outliers in Statistical Data","author":"V Barnett","year":"1994","unstructured":"Barnett V, Lewis T (1994) Outliers in Statistical Data. John Wiley & Sons, Chichester"},{"key":"159_CR11","doi-asserted-by":"crossref","unstructured":"Bay SD, Schwabacher M (2003) Mining distance-based outliers in near linear time with randomization and a simple pruning rule. In: Proceedings of international conference on knowledge discovery and data mining (KDD\u201903)","DOI":"10.1145\/956750.956758"},{"key":"159_CR12","doi-asserted-by":"crossref","unstructured":"Breunig MM, Kriegel H, Ng RT, Sander J (2000) Lof: identifying density-based local outliers. In: Proceedings of international conference on managment of data (SIGMOD\u201900)","DOI":"10.1145\/342009.335388"},{"issue":"3","key":"159_CR13","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/502807.502808","volume":"33","author":"E Ch\u00e1vez","year":"2001","unstructured":"Ch\u00e1vez E, Navarro G, Baeza-Yates RA, Marroqu\u00edn JL (2001) Searching in metric spaces. ACM Comput Surv 33(3): 273\u2013321","journal-title":"ACM Comput Surv"},{"key":"159_CR14","unstructured":"DARPA Defense Advanced Research Projects Agency (1998) Intrusion detection evaluation. http:\/\/www.ll.mit.edu\/mission\/communications\/ist\/corpora\/ideval\/data\/index.html"},{"key":"159_CR15","doi-asserted-by":"crossref","unstructured":"Eskin E, Arnold A, Prerau M, Portnoy L, Stolfo S (2002) A geometric framework for unsupervised anomaly detection : detecting intrusions in unlabeled data. In: Applications of data mining in computer security, Kluwer, Dordrecht","DOI":"10.1007\/978-1-4615-0953-0_4"},{"key":"159_CR16","doi-asserted-by":"crossref","unstructured":"Ghoting A, Parthasarathy S, Otey ME (2006) Fast mining of distance-based outliers in high-dimensional datasets. In: Proceedings of the SIAM international conference on data mining (SDM\u201906), Bethesda, MD, USA","DOI":"10.1137\/1.9781611972764.70"},{"issue":"2","key":"159_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/776985.776986","volume":"32","author":"L Golab","year":"2003","unstructured":"Golab L, \u00d6zsu MT (2003) Issues in data stream management. SIGMOD Rec 32(2): 5\u201314","journal-title":"SIGMOD Rec"},{"key":"159_CR18","doi-asserted-by":"crossref","unstructured":"Jin W, Tung AKH, Han J (2001) Mining top-n local outliers in large databases. In: Proceedings of ACM SIGKDD international conference on knowledge discovery and data mining (KDD\u201901)","DOI":"10.1145\/502512.502554"},{"key":"159_CR19","unstructured":"Knorr E, Ng R (1998) Algorithms for mining distance-based outliers in large datasets. In: Proceedings of international conference on very large databases (VLDB98), pp 392\u2013403"},{"key":"159_CR20","unstructured":"Knorr E, Ng R (1999) Finding intensional knowledge of distance-based outliers. In: Proceeings of international conference on very large databases (VLDB99), pp 211\u2013222"},{"issue":"3\u20134","key":"159_CR21","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1007\/s007780050006","volume":"8","author":"E Knorr","year":"2000","unstructured":"Knorr E, Ng R, Tucakov V (2000) Distance-based outlier: algorithms and applications. VLDB J 8(3\u20134): 237\u2013253","journal-title":"VLDB J"},{"key":"159_CR22","volume-title":"The art of computer programming, Vol. 3: sorting and searching","author":"D Knuth","year":"1997","unstructured":"Knuth D (1997) The art of computer programming, Vol. 3: sorting and searching. Addison-Wesley, Reading"},{"key":"159_CR23","doi-asserted-by":"crossref","unstructured":"Lazarevic A, Ert\u00f6z L, Kumar V, Ozgur A, Srivastava J (2003) A comparative study of anomaly detection schemes in network intrusion detection. In: Proceedings of the SIAM international conference on data mining","DOI":"10.1137\/1.9781611972733.3"},{"key":"159_CR24","volume-title":"Introduction to the theory of statistics","author":"AM Mood","year":"1974","unstructured":"Mood AM, Graybill FA, Boes DC (1974) Introduction to the theory of statistics. McGraw-Hill, New York"},{"key":"159_CR25","doi-asserted-by":"crossref","unstructured":"Papadimitriou S, Kitagawa H, Gibbons PB, Faloutsos C (2003) Loci: fast outlier detection using the local correlation integral. In: Proceedings of international conference on data enginnering (ICDE), pp 315\u2013326","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"159_CR26","doi-asserted-by":"crossref","unstructured":"Papadimitriou S, Kitagawa H, Gibbons PB, Faloutsos C (2003) Loci: fast outlier detection using the local correlation integral. In: ICDE, pp 315\u2013326","DOI":"10.1109\/ICDE.2003.1260802"},{"key":"159_CR27","doi-asserted-by":"crossref","unstructured":"Ramaswamy S, Rastogi R, Shim K (2000) Efficient algorithms for mining outliers from large data sets. In: Proceedings of international conference on managment of data (SIGMOD\u201900), pp 427\u2013438","DOI":"10.1145\/342009.335437"},{"key":"159_CR28","unstructured":"Subramaniam S, Palpanas T, Papadopoulos D, Kalogeraki V, Gunopulos D (2006) Online outlier detection in sensor data using non-parametric models. In: International conference on very large data bases, Seoul, Korea, September 12\u201315"},{"key":"159_CR29","doi-asserted-by":"crossref","unstructured":"Tao Y, Xiao X, Zhou S (2006) Mining distance-based outliers from large databases in any metric space. In: Proceedings of the international conference on knowledge discovery and data mining (KDD\u201906), Philadelphia, PA, USA, pp 394\u2013403","DOI":"10.1145\/1150402.1150447"},{"key":"159_CR30","unstructured":"Watanabe O (2000) Simple sampling techniques for discovery science. TIEICE: IEICE Transactions on communications\/electronics\/information and systems"},{"key":"159_CR31","doi-asserted-by":"crossref","unstructured":"Yamanishi K, Takeuchi J, Williams GJ, Milne P (2000) On-line unsupervised outlier detection using finite mixtures with discounting learning algorithms. In: KDD, pp 320\u2013324","DOI":"10.1145\/347090.347160"}],"container-title":["Data Mining and Knowledge Discovery"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0159-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10618-009-0159-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10618-009-0159-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T19:29:41Z","timestamp":1559244581000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10618-009-0159-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,1,26]]},"references-count":31,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2010,3]]}},"alternative-id":["159"],"URL":"https:\/\/doi.org\/10.1007\/s10618-009-0159-9","relation":{},"ISSN":["1384-5810","1573-756X"],"issn-type":[{"value":"1384-5810","type":"print"},{"value":"1573-756X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,1,26]]}}}