{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T04:09:33Z","timestamp":1748750973419,"version":"3.41.0"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T00:00:00Z","timestamp":1446508800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1007\/s10922-015-9356-6","type":"journal-article","created":{"date-parts":[[2015,11,3]],"date-time":"2015-11-03T17:46:55Z","timestamp":1446572815000},"page":"974-1003","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["A Closed-Loop Automatic Data-Mining Approach for Preventive Network Monitoring"],"prefix":"10.1007","volume":"24","author":[{"given":"Ivan","family":"Caravela","sequence":"first","affiliation":[]},{"given":"Artur","family":"Arsenio","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Borges","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,11,3]]},"reference":[{"key":"9356_CR1","doi-asserted-by":"crossref","unstructured":"H\u00e4t\u00f6nen, K., Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H.: Knowledge Discovery from Telecommunication Network Alarm Databases. In: ICDE, pp. 115\u2013122 (1996)","DOI":"10.1109\/ICDE.1996.492095"},{"key":"9356_CR2","volume-title":"But the wise perceive things about to happen","author":"CP Cavafy","year":"1992","unstructured":"Cavafy, C.P.: But the wise perceive things about to happen. Princeton University Press, Collected Poems (1992)"},{"key":"9356_CR3","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1670679.1670680","volume":"42","author":"F Salfner","year":"2010","unstructured":"Salfner, F., Lenk, M., Malek, M.: A survey of online failure prediction methods. ACM Comput. Surv. 42, 1\u201342 (2010)","journal-title":"ACM Comput. Surv."},{"key":"9356_CR4","doi-asserted-by":"crossref","unstructured":"Dietterich, T.: Machine learning for sequential data: a review. In: Caelli, T., Amin, A., Duin, R.P.W., de Ridder, D., Kamel, M. (eds.) Structural, Syntactic, and Statistical Pattern Recognition. Springer, Heidelberg (2002)","DOI":"10.1007\/3-540-70659-3_2"},{"key":"9356_CR5","unstructured":"Vehvil\u00e4inen, P., H\u00e4t\u00f6nen, K., Kumpulainen, P.: Data mining in quality analysis of digital mobile telecommunications network. In: XVII IMEKO World Congress Metrology in the 3rd Millennium. Dubrovnik, Croatia (2003)"},{"key":"9356_CR6","doi-asserted-by":"crossref","unstructured":"Gangopadhyay, B., Ars\u00e9nio, A., Antunes, C.: Comparative study of pattern mining techniques for network management system logs for convergent network. In: Data Engineering and Management. Springer Lecture Notes in Computer Science, vol. 6411, pp. 101\u2013108 (2012)","DOI":"10.1007\/978-3-642-27872-3_16"},{"key":"9356_CR7","unstructured":"Weiss, G., Davison, B.: Data mining (2010). In: Bidgoli, H. (ed.) Handbook of Technology Management, pp. 542\u2013555. John Wiley and Sons (2010)"},{"issue":"3","key":"9356_CR8","first-page":"37","volume":"17","author":"U Fayyad","year":"1996","unstructured":"Fayyad, U., Piatetsky-Shapiro, G., Smyth, P.: From data mining to knowledge discovery in databases. AI Mag. 17(3), 37\u201354 (1996)","journal-title":"AI Mag."},{"key":"9356_CR9","doi-asserted-by":"crossref","unstructured":"Vilalta, R. Ma, S. Predicting rare events in temporal domains. In: Data Mining, pp. 474\u2013481 (2003)","DOI":"10.1109\/ICDM.2002.1183991"},{"key":"9356_CR10","unstructured":"H\u00e4t\u00f6nen, K., Klemettinen, M., Mannila, H., Ronkainen, P., Toivonen, H.: Rule Discovery in Alarm Databases. Report C-1996-7, Department of Computer Science, University of Helsinki (1996). http:\/\/www.cs.helsinki.fi\/TR\/C-1996\/7"},{"key":"9356_CR11","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1147\/sj.413.0461","volume":"41","author":"R Vilalta","year":"2002","unstructured":"Vilalta, R., Apte, C.V., Hellerstein, J.L., Ma, S., Weiss, S.M.: Predictive algorithms in the management of computer systems. IBM Syst. J. 41, 461\u2013474 (2002)","journal-title":"IBM Syst. J."},{"key":"9356_CR12","doi-asserted-by":"crossref","unstructured":"Sahoo, R.K., Oliner, A.J., Rish, I., Gupta, M., Moreira, J.E., Ma, S., Vilalta, R., Sivasubramaniam, A.: Critical event prediction for proactive management in large-scale computer clusters. In: Knowledge Discovery in Databases (KDD),\u00a0Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM, New York, NY, USA, pp. 426\u2013435 (2003)","DOI":"10.1145\/956750.956799"},{"key":"9356_CR13","unstructured":"Weiss, G.: Timeweaver: a genetic algorithm for identifying predictive patterns in sequences of events. In: Proceedings of the Genetic and Evolutionary Computation Conference. Morgan Kaufmann (1999)"},{"key":"9356_CR14","doi-asserted-by":"crossref","unstructured":"Mohamed, A., Ahmed, M., Chau, S.: A new adaptive evidential reasoning approach for network alarm correlation. In: 2012 IEEE 10th International Symposium on Applied Machine Intelligence and Informatics (SAMI), pp. 241\u2013246 (2012)","DOI":"10.1109\/SAMI.2012.6208966"},{"key":"9356_CR15","doi-asserted-by":"crossref","unstructured":"Sridevi, S., Rajaram, S., Swadhikar, C.: An intelligent prediction system for time series data using periodic pattern mining in temporal databases. In: Proceedings of the First International Conference on Intelligent Interactive Technologies and Multimedia. IITM\u201910, ACM, New York, NY, USA, pp. 163\u2013171 (2010)","DOI":"10.1145\/1963564.1963592"},{"key":"9356_CR16","doi-asserted-by":"crossref","unstructured":"Abdullah, Z., Deris, M.: Association rules mining with relative weighted support. In: Proceedings of the 11th International Conference on Information Integration and Web-based Applications and Services, iiWAS\u201909, ACM, New York, NY, USA, pp. 507\u2013511 (2009)","DOI":"10.1145\/1806338.1806433"},{"key":"9356_CR17","unstructured":"Graf, S., Prinz, A.: Time in state machines. In: Proceedings of the 12th International Workshop on Abstract State Machines, Abstract State Machines (ASM), Paris, France, 8\u201311 March 2005, pp. 217\u2013232 (2005). http:\/\/www.univ-paris12.fr\/lacl\/dima\/asm05\/GrafPrinzASM2005-pgnb.pdf"},{"key":"9356_CR18","doi-asserted-by":"crossref","unstructured":"Hitike, K. Khalifa, O.: Comparison of supervised and unsupervised learning classifiers for human posture recognition. In: Computer and Communication Engineering (ICCCE), pp. 1\u20136 (2010)","DOI":"10.1109\/ICCCE.2010.5556749"},{"key":"9356_CR19","doi-asserted-by":"crossref","first-page":"1423","DOI":"10.1109\/5.784219","volume":"87","author":"X Yao","year":"1999","unstructured":"Yao, X.: Evolving artificial neural networks. Proc. IEEE 87, 1423\u20131447 (1999)","journal-title":"Proc. IEEE"},{"key":"9356_CR20","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1109\/5.18626","volume":"77","author":"L Rabiner","year":"1989","unstructured":"Rabiner, L.: A tutorial on hidden Markov models and selected applications in speech recognition. Proc. IEEE 77, 257\u2013286 (1989)","journal-title":"Proc. IEEE"},{"key":"9356_CR21","doi-asserted-by":"crossref","unstructured":"Ariu, D., Giacinto, G., Perdisci, R.: Sensing attacks in computers networks with hidden markov models. In: Machine Learning and Data Mining in Pattern Recognition. Springer Lecture Notes in Computer Science, vol. 4571, pp. 449\u2013463 (2007)","DOI":"10.1007\/978-3-540-73499-4_34"},{"issue":"2","key":"9356_CR22","doi-asserted-by":"crossref","first-page":"125","DOI":"10.7763\/JACN.2013.V1.26","volume":"1","author":"D Teixeira","year":"2013","unstructured":"Teixeira, D., Ars\u00e9nio, A.: Intelligent network client profiler. J. Adv. Comput. Netw. 1(2), 125\u2013131 (2013)","journal-title":"J. Adv. Comput. Netw."},{"key":"9356_CR23","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: Proceedings of the Eleventh International Conference on Data Engineering, pp. 3\u201314 (1995)","DOI":"10.1109\/ICDE.1995.380415"},{"key":"9356_CR24","doi-asserted-by":"crossref","unstructured":"Sumithra, R. Paul, S. Using distributed apriori association rule and classical apriori mining algorithms for grid based knowledge discovery. In: 2010 International Conference on Computing Communication and Networking Technologies (ICCCNT), pp. 1\u20135 (2010)","DOI":"10.1109\/ICCCNT.2010.5591577"},{"key":"9356_CR25","doi-asserted-by":"crossref","unstructured":"Domingos, P.: Markov logic: a unifying language for knowledge and information management. In: Proceedings of the 17th ACM conference on Information and knowledge management, CIKM\u201908, ACM, New York, NY, USA, pp. 519\u2013519 (2008)","DOI":"10.1145\/1458082.1458084"},{"key":"9356_CR26","doi-asserted-by":"crossref","unstructured":"Popescul, A., Ungar, L., Lawrence, S., Pennock, D.: Statistical relational learning for document mining. In: Third IEEE International Conference on Data Mining. ICDM 2003, pp. 275\u2013282 (2003)","DOI":"10.1109\/ICDM.2003.1250930"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-015-9356-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-015-9356-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-015-9356-6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,31]],"date-time":"2025-05-31T08:45:09Z","timestamp":1748681109000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-015-9356-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,11,3]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,10]]}},"alternative-id":["9356"],"URL":"https:\/\/doi.org\/10.1007\/s10922-015-9356-6","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2015,11,3]]}}}