{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T09:32:54Z","timestamp":1762507974441},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"11","license":[{"start":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T00:00:00Z","timestamp":1576454400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T00:00:00Z","timestamp":1576454400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1007\/s12652-019-01645-z","type":"journal-article","created":{"date-parts":[[2019,12,16]],"date-time":"2019-12-16T18:04:11Z","timestamp":1576519451000},"page":"15277-15286","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An anomaly prediction framework for financial IT systems using hybrid machine learning methods"],"prefix":"10.1007","volume":"14","author":[{"given":"Jingwen","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jingxin","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Juntao","family":"Pu","sequence":"additional","affiliation":[]},{"given":"Qinghong","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Zhongchen","family":"Miao","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Gao","sequence":"additional","affiliation":[]},{"given":"You","family":"Song","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,12,16]]},"reference":[{"key":"1645_CR1","doi-asserted-by":"crossref","unstructured":"Ban T, Zhang R, Pang S, Sarrafzadeh A, Inoue D (2013) Referential KNN regression for financial time series forecasting. In: International conference on neural information processing, Springer, pp 601\u2013608","DOI":"10.1007\/978-3-642-42054-2_75"},{"key":"1645_CR2","doi-asserted-by":"crossref","unstructured":"Bertero C, Roy M, Sauvanaud C, Tr\u00e9dan G (2017) Experience report: log mining using natural language processing and application to anomaly detection. In: 2017 IEEE 28th international symposium on software reliability engineering (ISSRE). IEEE, pp 351\u2013360","DOI":"10.1109\/ISSRE.2017.43"},{"issue":"1","key":"1645_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"1645_CR4","unstructured":"Du S, Cao J (2015) Behavioral anomaly detection approach based on log monitoring. In: 2015 International conference on behavioral, economic and socio-cultural computing (BESC). IEEE, pp 188\u2013194"},{"issue":"5","key":"1645_CR5","doi-asserted-by":"publisher","first-page":"1189","DOI":"10.1214\/aos\/1013203451","volume":"29","author":"JH Friedman","year":"2001","unstructured":"Friedman JH (2001) Greedy function approximation: a gradient boosting machine. Ann Stat 29(5):1189\u20131232","journal-title":"Ann Stat"},{"issue":"4","key":"1645_CR6","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1016\/S0167-9473(01)00065-2","volume":"38","author":"JH Friedman","year":"2002","unstructured":"Friedman JH (2002) Stochastic gradient boosting. Comput Stat Data Anal 38(4):367\u2013378","journal-title":"Comput Stat Data Anal"},{"key":"1645_CR7","first-page":"5","volume":"8","author":"EW Fulp","year":"2008","unstructured":"Fulp EW, Fink GA, Haack JN (2008) Predicting computer system failures using support vector machines. WASL 8:5\u20135","journal-title":"WASL"},{"issue":"9","key":"1645_CR8","doi-asserted-by":"publisher","first-page":"1263","DOI":"10.1109\/TKDE.2008.239","volume":"21","author":"H He","year":"2009","unstructured":"He H, Garcia EA (2009) Learning from imbalanced data. IEEE Trans Knowl Data Eng 21(9):1263\u20131284","journal-title":"IEEE Trans Knowl Data Eng"},{"key":"1645_CR9","doi-asserted-by":"publisher","DOI":"10.14569\/SpecialIssue.2014.040203","author":"B Hssina","year":"2014","unstructured":"Hssina B, Merbouha A, Ezzikouri H, Erritali M (2014) A comparative study of decision tree ID3 and C4.5. Int J Adv Comput Sci Appl. https:\/\/doi.org\/10.14569\/SpecialIssue.2014.040203","journal-title":"Int J Adv Comput Sci Appl."},{"key":"1645_CR10","doi-asserted-by":"crossref","unstructured":"Hu S, Xiao Z, Rao Q, Liao R (2018) An anomaly detection model of user behavior based on similarity clustering. In: 2018 IEEE 4th information technology and mechatronics engineering conference (ITOEC). IEEE, pp 835\u2013838","DOI":"10.1109\/ITOEC.2018.8740748"},{"key":"1645_CR11","doi-asserted-by":"crossref","unstructured":"Juvonen A, Hamalainen T (2014) An efficient network log anomaly detection system using random projection dimensionality reduction. In: 2014 6th international conference on new technologies, mobility and security (NTMS). IEEE, pp 1\u20135","DOI":"10.1109\/NTMS.2014.6814006"},{"key":"1645_CR12","doi-asserted-by":"crossref","unstructured":"Laptev N, Amizadeh S, Flint I (2015) Generic and scalable framework for automated time-series anomaly detection. In: Proceedings of the 21th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 1939\u20131947","DOI":"10.1145\/2783258.2788611"},{"key":"1645_CR13","doi-asserted-by":"crossref","unstructured":"Lee SB, Pei D, Hajiaghayi M, Pefkianakis I, Lu S, Yan H, Ge Z, Yates J, Kosseifi M (2012) Threshold compression for 3g scalable monitoring. In: INFOCOM, 2012 proceedings IEEE. IEEE, pp 1350\u20131358","DOI":"10.1109\/INFCOM.2012.6195498"},{"key":"1645_CR14","unstructured":"Lee TJ, Gottschlich J, Tatbul N, Metcalf E, Zdonik S (2018) Greenhouse: a zero-positive machine learning system for time-series anomaly detection. arXiv:1801.03168"},{"key":"1645_CR15","doi-asserted-by":"crossref","unstructured":"Liu D, Zhao Y, Xu H, Sun Y, Pei D, Luo J, Jing X, Feng M (2015) Opprentice: towards practical and automatic anomaly detection through machine learning. In: Proceedings of the 2015 internet measurement conference. ACM, pp 211\u2013224","DOI":"10.1145\/2815675.2815679"},{"key":"1645_CR16","first-page":"4","volume":"2009","author":"W Lu","year":"2009","unstructured":"Lu W, Ghorbani AA (2009) Network anomaly detection based on wavelet analysis. EURASIP J Adv Signal Process 2009:4","journal-title":"EURASIP J Adv Signal Process"},{"key":"1645_CR17","doi-asserted-by":"crossref","unstructured":"Naveiro R, Rodr\u00edguez S, Insua DR (2018) Large scale automated forecasting for monitoring network safety and security. arXiv:1802.06678","DOI":"10.1002\/asmb.2436"},{"key":"1645_CR18","doi-asserted-by":"crossref","unstructured":"Pellegrini A, Di\u00a0Sanzo P, Avresky DR (2015) A machine learning-based framework for building application failure prediction models. In: 2015 IEEE International Parallel and Distributed Processing Symposium Workshop (IPDPSW). IEEE, pp 1072\u20131081","DOI":"10.1109\/IPDPSW.2015.110"},{"key":"1645_CR19","doi-asserted-by":"crossref","unstructured":"Salfner F, Malek M (2007) Using hidden semi-markov models for effective online failure prediction. In: 2007 26th IEEE international symposium on reliable distributed systems (SRDS 2007). IEEE, pp 161\u2013174","DOI":"10.1109\/SRDS.2007.35"},{"key":"1645_CR20","unstructured":"Segal MR (2004) Machine learning benchmarks and random forest regression. UCSF: Center for Bioinformatics and Molecular Biostatistics. https:\/\/escholarship.org\/uc\/item\/35x3v9t4"},{"key":"1645_CR21","doi-asserted-by":"crossref","unstructured":"Sipos R, Fradkin D, Moerchen F, Wang Z (2014) Log-based predictive maintenance. In: Proceedings of the 20th ACM SIGKDD international conference on knowledge discovery and data mining. ACM, pp 1867\u20131876","DOI":"10.1145\/2623330.2623340"},{"key":"1645_CR22","doi-asserted-by":"crossref","unstructured":"Stearley J (2004) Towards informatic analysis of syslogs. In: Cluster. IEEE, pp 309\u2013318","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"1645_CR23","doi-asserted-by":"crossref","unstructured":"Stearley J, Oliner AJ (2008) Bad words: finding faults in spirit. In: 8th IEEE international symposium on cluster computing and the grid. IEEE, pp 765\u2013770","DOI":"10.1109\/CCGRID.2008.107"},{"key":"1645_CR24","doi-asserted-by":"crossref","unstructured":"Sulzmann JN, F\u00fcrnkranz J (2011) Rule stacking: an approach for compressing an ensemble of rule sets into a single classifier. In: International conference on discovery science. Springer, pp 323\u2013334","DOI":"10.1007\/978-3-642-24477-3_26"},{"issue":"1","key":"1645_CR25","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1080\/00031305.2017.1380080","volume":"72","author":"SJ Taylor","year":"2018","unstructured":"Taylor SJ, Letham B (2018) Forecasting at scale. Am Stat 72(1):37\u201345","journal-title":"Am Stat"},{"key":"1645_CR26","unstructured":"Witten IH, Frank E, Hall MA, Pal CJ (2016) Data mining: practical machine learning tools and techniques. Morgan Kaufmann"},{"issue":"2","key":"1645_CR27","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1016\/S0893-6080(05)80023-1","volume":"5","author":"DH Wolpert","year":"1992","unstructured":"Wolpert DH (1992) Stacked generalization. Neural Netw 5(2):241\u2013259","journal-title":"Neural Netw"},{"key":"1645_CR28","doi-asserted-by":"crossref","unstructured":"Zarei N, Ghayour MA, Hashemi S (2013) Road traffic prediction using context-aware random forest based on volatility nature of traffic flows. In: Asian conference on intelligent information and database systems. Springer, pp 196\u2013205","DOI":"10.1007\/978-3-642-36546-1_21"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01645-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s12652-019-01645-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01645-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T12:17:20Z","timestamp":1705321040000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s12652-019-01645-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,16]]},"references-count":28,"journal-issue":{"issue":"11","published-print":{"date-parts":[[2023,11]]}},"alternative-id":["1645"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01645-z","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,12,16]]},"assertion":[{"value":"8 August 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 December 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"16 December 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}