{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T14:36:45Z","timestamp":1759675005125},"reference-count":15,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2010,8,18]],"date-time":"2010-08-18T00:00:00Z","timestamp":1282089600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Inf Syst Front"],"published-print":{"date-parts":[[2013,3]]},"DOI":"10.1007\/s10796-010-9266-9","type":"journal-article","created":{"date-parts":[[2010,8,17]],"date-time":"2010-08-17T06:01:18Z","timestamp":1282024878000},"page":"55-65","source":"Crossref","is-referenced-by-count":24,"title":["Application of density-based outlier detection to database activity monitoring"],"prefix":"10.1007","volume":"15","author":[{"given":"Seung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Nam Wook","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Young Joo","family":"Lee","sequence":"additional","affiliation":[]},{"given":"Suk-Ho","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Taewan","family":"Kim","sequence":"additional","affiliation":[]},{"given":"Hyeseon","family":"Hwang","sequence":"additional","affiliation":[]},{"given":"Dongseop","family":"Mun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2010,8,18]]},"reference":[{"key":"9266_CR1","unstructured":"Agyemang, M., & Ezeife, C. I. (2004). LSC-Mine: algorithm for mining local outliers. Proceedings of the 15th Information Resource Management Association (IRMA) International Conference, New Orleans, vol. 1 (pp. 5\u20138). Hershey: IRM Press."},{"issue":"6","key":"9266_CR2","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1145\/293347.293348","volume":"45","author":"S Arya","year":"1998","unstructured":"Arya, S., Mount, D. M., Netanyahu, N. S., Silverman, R., & Wu, A. (1998). An optimal algorithm for approximate nearest neighbor searching. Journal of the ACM, 45(6), 891\u2013923.","journal-title":"Journal of the ACM"},{"key":"9266_CR3","unstructured":"Barnett, V., & Lewis, T. (1994). Outliers in statistical data. John Wiley."},{"key":"9266_CR4","unstructured":"Bentley, J. L. (1990). K-d trees for semidynamic point sets. Proceedings of 6th Annual ACM Symposium Computational Geometry (pp. 187\u2013197). New York: ACM Press."},{"key":"9266_CR5","unstructured":"Breunig, M. M., Kriegel, H. P., Ng, R. T., & Sander, J. (2000). LOF: identifying density based local outliers. Proceedings of the ACM SIGMOD Conference, Dallas, Texas (pp. 93\u2013104). New York: ACM."},{"key":"9266_CR6","unstructured":"Chaudhary, A., Szalay, A. S., Szalay, E. S., & Moore, A. W. (2002). Very fast outlier detection in large multidimensional data sets. The ACM SIGMOD Workshop on Research Issues on Data Mining and Knowledge Discovery Madison, Wisconsin. New York: ACM Press."},{"issue":"3","key":"9266_CR7","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/355744.355745","volume":"3","author":"JH Friedman","year":"1977","unstructured":"Friedman, J. H., Bentley, J. L., & Finkel, R. A. (1977). An algorithm for finding best matches in logarithmic expected time. ACM Transactions on Mathematical Software, 3(3), 209\u2013226.","journal-title":"ACM Transactions on Mathematical Software"},{"key":"9266_CR8","unstructured":"Gartner (2007). Hype cycle for regulations and related standards, ID: G00141115. http:\/\/www.gartner.com\/DisplayDocument?id=500178 ."},{"key":"9266_CR9","unstructured":"Gartner (2009). Hype cycle for governance, risk and compliance technologies, ID: G00168610. http:\/\/www.gartner.com\/DisplayDocument?id=1080715 ."},{"key":"9266_CR10","doi-asserted-by":"crossref","unstructured":"Hawkins, D. (1980). Identification of outliers. Chapman and Hall.","DOI":"10.1007\/978-94-015-3994-4"},{"key":"9266_CR11","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A comparative study of anomaly detection schemes in network intrusion detection. Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA.","DOI":"10.1137\/1.9781611972733.3"},{"key":"9266_CR12","unstructured":"Pokrajac, D., Lazarevic, A., & Latecki, L. J. (2007). Incremental local outlier detection for data streams. IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Honolulu, Hawaii (pp. 504\u2013515). New York: IEEE Press."},{"key":"9266_CR13","unstructured":"Richardson, R. (2008). CSI\/FBI Computer crime and security survey, available at http:\/\/www.goscsi.com ."},{"key":"9266_CR14","unstructured":"Somansa (2009). Electronics data and management solution. http:\/\/www.somansatech.com ."},{"key":"9266_CR15","unstructured":"Yuhanna, N., Heffner, R., & Schwaber, C. (2005). Comprehensive Database Security Requires Native DBMS Features and Third-Party Tools, Forrester. http:\/\/www.forrester.com\/Research\/Document\/Excerpt\/0,7211,36301,00.html ."}],"container-title":["Information Systems Frontiers"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-010-9266-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10796-010-9266-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10796-010-9266-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,2]],"date-time":"2019-06-02T01:01:58Z","timestamp":1559437318000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10796-010-9266-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,8,18]]},"references-count":15,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,3]]}},"alternative-id":["9266"],"URL":"https:\/\/doi.org\/10.1007\/s10796-010-9266-9","relation":{},"ISSN":["1387-3326","1572-9419"],"issn-type":[{"value":"1387-3326","type":"print"},{"value":"1572-9419","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010,8,18]]}}}