{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:10:10Z","timestamp":1750180210662,"version":"3.41.0"},"reference-count":33,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:00:00Z","timestamp":1490227200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10844-017-0456-5","type":"journal-article","created":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T04:55:43Z","timestamp":1490331343000},"page":"435-459","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["An expressive event-based language for representing user behavior patterns"],"prefix":"10.1007","volume":"49","author":[{"given":"Hassan","family":"Sharghi","sequence":"first","affiliation":[]},{"given":"Kamran","family":"Sartipi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,3,23]]},"reference":[{"key":"456_CR1","unstructured":"Alvarez, M. (2015). Battling security threats from within your organization. In: Research Report, IBM Security."},{"key":"456_CR2","first-page":"35","volume-title":"Modelling and analysis of user behaviour in online communities","author":"S Angeletou","year":"2011","unstructured":"Angeletou, S., Rowe, M., & Alani, H. (2011). Modelling and analysis of user behaviour in online communities, (pp. 35\u201350). Berlin Heidelberg: Springer."},{"key":"456_CR3","doi-asserted-by":"crossref","unstructured":"Anicic, D., Fodor, P., Rudolph, S., Stuhmer, R., Stojanovic, N., & Studer, R. (2010). A rule-based language for complex event processing and reasoning. In Web reasoning and rule systems: Fourth International Conference (pp. 42\u201357). Berlin Heidelberg: Springer.","DOI":"10.1007\/978-3-642-15918-3_5"},{"issue":"2","key":"456_CR4","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s00778-004-0147-z","volume":"15","author":"A Arasu","year":"2006","unstructured":"Arasu, A., Babu, S., & Widom, J. (2006). The cql continuous query language: semantic foundations and query execution. The International Journal on Very Large Data Bases, 15(2), 121\u2013142.","journal-title":"The International Journal on Very Large Data Bases"},{"issue":"6","key":"456_CR5","first-page":"1265","volume":"43","author":"A Aztiria","year":"2013","unstructured":"Aztiria, A., Augusto, J.C., Basagoiti, R., Izaguirre, A., & Cook, D.J. (2013). Learning frequent behaviors of the users in intelligent environments. IEEE Transactions on Systems. Man and Cybernetics, 43(6), 1265\u20131278.","journal-title":"Man and Cybernetics"},{"key":"456_CR6","unstructured":"Barga, R.S., Goldstein, J., Ali, M., & Hong, M. (2007). Consistent streaming through time: A vision for event stream processing. In: 3rd Biennial Conference on Innovative Data Systems Research (CIDR), California."},{"key":"456_CR7","doi-asserted-by":"crossref","unstructured":"Brenna, L., Demers, A., Gehrke, J., Hong, M., Ossher, J., Panda, B., Riedewald, M., Thatte, M., & White, W. (2007). Cayuga: a high-performance event processing engine. In ACM SIGMOD international conference on Management of data (pp. 1100\u20131102): ACM.","DOI":"10.1145\/1247480.1247620"},{"key":"456_CR8","doi-asserted-by":"crossref","unstructured":"Bry, F., & Eckert, M. (2006). A high-level query language for events. In: IEEE Services Computing Workshops(SCW\u201906), IEEE.","DOI":"10.1109\/SCW.2006.2"},{"key":"456_CR9","unstructured":"Bui, H.-L. (2009). Survey and comparison of event query languages using practical examples: Ludwig Maximilian University of Munich."},{"issue":"17","key":"456_CR10","doi-asserted-by":"crossref","first-page":"3067","DOI":"10.1016\/j.ins.2010.03.025","volume":"180","author":"L Cao","year":"2010","unstructured":"Cao, L. (2010). In-depth behavior understanding and use: the behavior informatics approach. Journal of Information Sciences, 180(17), 3067\u20133085.","journal-title":"Journal of Information Sciences"},{"key":"456_CR11","doi-asserted-by":"crossref","unstructured":"Cao, L. (2014). Behavior informatics: a new perspective. IEEE Intelligent Systems pp. 62\u201380.","DOI":"10.1109\/MIS.2014.60"},{"issue":"3","key":"456_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/2187671.2187677","volume":"44","author":"G Cugola","year":"2012","unstructured":"Cugola, G., & Margara, A. (2012). Processing flows of information: From data stream to complex event processing. ACM Computing Surveys (CSUR), 44(3), 1\u201362.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"456_CR13","doi-asserted-by":"crossref","unstructured":"Anicic, D., Rudolph, S., Fodor, P., & Stojanovic, N. (2011). Ep-sparql: A unified language for event processing and stream reasoning. In: in Conference on World Wide Web, Hyderabad.","DOI":"10.1145\/1963405.1963495"},{"key":"456_CR14","doi-asserted-by":"crossref","unstructured":"Fern\u00e1ndez, M. (2014). Programming Languages and Operational Semantics, A Concise Overview: Springer-Verlag London.","DOI":"10.1007\/978-1-4471-6368-8_8"},{"key":"456_CR15","volume-title":"Engineering software as a service: an agile approach using cloud computing","author":"A Fox","year":"2013","unstructured":"Fox, A., & Patterson, D. (2013). Engineering software as a service: an agile approach using cloud computing. Strawberry Canyon: LLC."},{"key":"456_CR16","doi-asserted-by":"crossref","unstructured":"Grieskamp, W., & Kicillof, N. (2006). A schema language for coordinating construction and composition of partial behavior descriptions. In: SCESM\u201906, Shanghai.","DOI":"10.1145\/1138953.1138966"},{"key":"456_CR17","first-page":"33","volume-title":"Computational modeling of collective human behavior: The example of financial markets","author":"A Kirou","year":"2008","unstructured":"Kirou, A., Ruszczycki, B., Walser, M., & Johnson, N. (2008). Computational modeling of collective human behavior: The example of financial markets, (pp. 33\u201341). Berlin Heidelberg: Springer."},{"key":"456_CR18","unstructured":"Li, G., & Jacobsen, A. (2005). Composite subscriptions incontent-based publish\/subscribe systems. In Middleware 2005: The series Lecture Notes in Computer Science (pp. 249\u2013269). New York: Springer."},{"key":"456_CR19","doi-asserted-by":"crossref","DOI":"10.1002\/9781119198697","volume-title":"Event processing for business: Organizing the Real-Time enterprise","author":"D Luckham","year":"2012","unstructured":"Luckham, D. (2012). Event processing for business: Organizing the Real-Time enterprise. New Jersey: Wiley."},{"issue":"1","key":"456_CR20","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1109\/MNET.2004.1265833","volume":"18","author":"PR Pietzuch","year":"2004","unstructured":"Pietzuch, P.R., Shand, B., & Bacon, J. (2004). Composite event detection as a generic middleware extension. IEEE Network Journal, 18(1), 44\u201355.","journal-title":"IEEE Network Journal"},{"key":"456_CR21","volume-title":"A structural approach to operational semantics Technical Report","author":"G Plotkin","year":"1981","unstructured":"Plotkin, G. (1981). A structural approach to operational semantics Technical Report. Denmark: Aarhus University."},{"issue":"2","key":"456_CR22","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4018\/jdwm.2012040101","volume":"8","author":"RV Priya","year":"2012","unstructured":"Priya, R.V., & Vadivel, A. (2012). User behaviour pattern mining from weblog. International Journal of Data Warehousing and Mining, 8(2), 1\u201322.","journal-title":"International Journal of Data Warehousing and Mining"},{"key":"456_CR23","unstructured":"Python (2015). The python programming language website https:\/\/www.python.org\/ ."},{"key":"456_CR24","doi-asserted-by":"crossref","unstructured":"Rieke, R., Zhdanova, M., Repp, J., Giot, R., & Gaber, C. (2013). Fraud detection in mobile payments utilizing process behavior analysis. In IEEE International Conference on Availability, Reliability and Security (pp. 946\u2013953): IEEE.","DOI":"10.1109\/ARES.2013.87"},{"key":"456_CR25","doi-asserted-by":"crossref","unstructured":"Rozsnyai, S., Schiefer, J., & Roth, H. (2009). Sari-sql: Event query language for event analysis. In: IEEE Conference on Commerce and Enterprise Computing, IEEE.","DOI":"10.1109\/CEC.2009.14"},{"key":"456_CR26","doi-asserted-by":"crossref","unstructured":"Sandell, N.F., Savell, R., Twardowski, D., & Cybenko, G. (2009). Hbml: A language for quantitative behavioral modeling in the human terrain. In Social Computing and Behavioral Modeling (pp. 180\u2013189): Springer.","DOI":"10.1007\/978-1-4419-0056-2_23"},{"key":"456_CR27","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-387-77322-3","volume-title":"Insider attack and cybersecurity: Beyond the hacker","author":"S Stolfo","year":"2008","unstructured":"Stolfo, S., Bellovin, S., Hershkop, S., Keromytis, A., Sinclair, S., & Smith, S. (2008). Insider attack and cybersecurity: Beyond the hacker. New York: Springer."},{"key":"456_CR28","unstructured":"Thomas, D., Fowler, C., & Hunt, A. (2013). Programming Ruby 1.9 and 2.0, The Pragmatic Programmers: LLC."},{"key":"456_CR29","first-page":"21","volume-title":"Modeling and analysis of social activity process. Behavior computing: modeling, analysis, mining and decision","author":"C Wang","year":"2012","unstructured":"Wang, C., & Cao, L. (2012). Modeling and analysis of social activity process. Behavior computing: modeling, analysis, mining and decision, (pp. 21\u201335). New York: Springer."},{"key":"456_CR30","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5804.001.0001","volume-title":"Reasoning about rational agents","author":"M Wooldridge","year":"2000","unstructured":"Wooldridge, M. (2000). Reasoning about rational agents. Cambridge: MIT Press."},{"key":"456_CR31","doi-asserted-by":"crossref","unstructured":"Yarmand, M., Sartipi, K., & Down, D. (2013). Behavior-based access control for distributed healthcare systems. Journal of Computer Security pp 1\u201339.","DOI":"10.3233\/JCS-2012-0454"},{"key":"456_CR32","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1007\/978-1-4471-2969-1_3","volume-title":"Behavior Computing","author":"GP Zarri","year":"2012","unstructured":"Zarri, G.P. (2012). Behaviour representation and management making use of the narrative knowledge representation language, Behavior Computing (pp. 37\u201356). London: Springer."},{"key":"456_CR33","doi-asserted-by":"crossref","unstructured":"Zerkouk, M., Mhamed, A., & Messabih, B. (2013). User behavior and capability based access control model and architecture. In: Springer Science and Business Media, Springer Science and Business Media, pp. 291\u2013299.","DOI":"10.1007\/978-1-4614-6154-8_29"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-017-0456-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0456-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-017-0456-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:50:15Z","timestamp":1750179015000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-017-0456-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,23]]},"references-count":33,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["456"],"URL":"https:\/\/doi.org\/10.1007\/s10844-017-0456-5","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[2017,3,23]]}}}