{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T22:36:03Z","timestamp":1775860563977,"version":"3.50.1"},"reference-count":56,"publisher":"Springer Science and Business Media LLC","issue":"2-3","license":[{"start":{"date-parts":[[2013,11,26]],"date-time":"2013-11-26T00:00:00Z","timestamp":1385424000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Prog Artif Intell"],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1007\/s13748-013-0040-3","type":"journal-article","created":{"date-parts":[[2013,11,25]],"date-time":"2013-11-25T06:20:26Z","timestamp":1385360426000},"page":"113-127","source":"Crossref","is-referenced-by-count":212,"title":["Event labeling combining ensemble detectors and background knowledge"],"prefix":"10.1007","volume":"2","author":[{"given":"Hadi","family":"Fanaee-T","sequence":"first","affiliation":[]},{"given":"Joao","family":"Gama","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,11,26]]},"reference":[{"issue":"4","key":"40_CR1","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi, H., Williams, L.J.: Principal component analysis. Wiley Interdiscip. Rev. Comput. Stat. 2(4), 433\u2013459 (2010)","journal-title":"Wiley Interdiscip. Rev. Comput. Stat."},{"key":"40_CR2","unstructured":"Aggarwal, C.C.: Outlier ensembles: position paper. SIGKDD Explor. Newsl. 14(2), 49\u201358 (2013)"},{"key":"40_CR3","doi-asserted-by":"crossref","unstructured":"Anantharam, P., Thirunarayan, K., Sheth, A.: Topical anomaly detection from twitter stream. In Proceedings of the 3rd Annual ACM Web Science Conference, WebSci \u201912, pp. 11\u201314, New York, ACM (2012)","DOI":"10.1145\/2380718.2380720"},{"key":"40_CR4","unstructured":"Ashfaq, A., Javed, M., Khayam, S., Radha, H.: An information-theoretic combining method for multi-classifier anomaly detection systems. In: Communications (ICC), 2010 IEEE international conference on, pp. 1\u20135 (2010)"},{"key":"40_CR5","doi-asserted-by":"crossref","unstructured":"Barford, P., Kline, J., Plonka, D., Ron, A.: A signal analysis of network traffic anomalies. In: Proceedings of the 2nd ACM SIGCOMM workshop on internet measurment, IMW \u201902, pp. 71\u201382, New York, ACM (2002)","DOI":"10.1145\/637209.637210"},{"issue":"03","key":"40_CR6","doi-asserted-by":"crossref","first-page":"415","DOI":"10.1142\/S0219525911002950","volume":"14","author":"P Borgnat","year":"2011","unstructured":"Borgnat, P., Abry, P., Flandrin, P., Robardet, C., Rouquier, J.-B., Fleury, E.: Shared bicycles in a city: a signal processing and data analysis perspective. Adv. Complex Syst. 14(03), 415\u2013438 (2011)","journal-title":"Adv. Complex Syst."},{"key":"40_CR7","doi-asserted-by":"crossref","unstructured":"Brauckhoff, D., Dimitropoulos, X., Wagner, A., Salamatian, K.: Anomaly extraction in backbone networks using association rules. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC \u201909, pp. 28\u201334, New York, ACM (2009)","DOI":"10.1145\/1644893.1644897"},{"key":"40_CR8","doi-asserted-by":"crossref","unstructured":"Buckeridge, D.L., Burkom, H., Campbell, M., Hogan, W.R., Moore, A.W.: Algorithms for rapid outbreak detection: a research synthesis. J. Biomed. Inform. 38(2), 99\u2013113 (2005)","DOI":"10.1016\/j.jbi.2004.11.007"},{"key":"40_CR9","unstructured":"Capital Bike Share System: Capital bike sharing trip history data. http:\/\/www.capitalbikeshare.com\/trip-history-data (2013)"},{"issue":"2","key":"40_CR10","first-page":"249","volume":"22","author":"J Carletta","year":"1996","unstructured":"Carletta, J.: Assessing agreement on classification tasks: the kappa statistic. Comput. Linguist. 22(2), 249\u2013254 (1996)","journal-title":"Comput. Linguist."},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM Comput. Surv. 41(3), 15:1\u201315:58 (2009)","DOI":"10.1145\/1541880.1541882"},{"issue":"24","key":"40_CR12","doi-asserted-by":"crossref","first-page":"2940","DOI":"10.1093\/bioinformatics\/btn534","volume":"24","author":"N Collier","year":"2008","unstructured":"Collier, N., Doan, S., Kawazoe, A., Goodwin, R.M., Conway, M., Tateno, Y., Ngo, Q.-H., Dien, D., Kawtrakul, A., Takeuchi, K., et al.: Biocaster: detecting public health rumors with a web-based text mining system. Bioinformatics 24(24), 2940\u20132941 (2008)","journal-title":"Bioinformatics"},{"key":"40_CR13","doi-asserted-by":"crossref","unstructured":"Dembski, W.A.: The Design Inference: Eliminating Chance Through Small Probabilities. Cambridge University Press (1998)","DOI":"10.1017\/CBO9780511570643"},{"key":"40_CR14","unstructured":"Department of Human Resources: District of Columbia. Washington D.C. holiday schedule. http:\/\/dchr.dc.gov\/page\/holiday-schedule (2013)"},{"key":"40_CR15","doi-asserted-by":"crossref","unstructured":"Dewaele, G., Fukuda, K., Borgnat, P., Abry, P., Cho K.: Extracting hidden anomalies using sketch and non gaussian multiresolution statistical detection procedures. In: Proceedings of the 2007 workshop on Large scale attack defense, LSAD \u201907, pp. 145\u2013152, New York, ACM (2007)","DOI":"10.1145\/1352664.1352675"},{"key":"40_CR16","doi-asserted-by":"crossref","unstructured":"Dietterich, T.G.: Ensemble methods in machine learning. In: Proceedings of the first international workshop on multiple classifier systems, MCS \u201900, pp. 1\u201315. Springer, London (2000)","DOI":"10.1007\/3-540-45014-9_1"},{"key":"40_CR17","unstructured":"Fanaee-T, H., Gama, J.: Bike sharing data set. http:\/\/fanaee.com\/research\/datasets\/bike\/ (2013)"},{"key":"40_CR18","unstructured":"Fleiss, J.L.: Measuring nominal scale agreement among many raters. Psychol. Bull. 76(5), 378\u2013382 (1971)"},{"issue":"4","key":"40_CR19","doi-asserted-by":"crossref","first-page":"392","DOI":"10.1109\/90.944338","volume":"9","author":"S Floyd","year":"2001","unstructured":"Floyd, S., Paxson, V.: Difficulties in simulating the internet. IEEE\/ACM Trans. Netw. 9(4), 392\u2013403 (2001)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"40_CR20","doi-asserted-by":"crossref","unstructured":"Fontugne, R., Borgnat, P., Abry, P., Fukuda, K.: Mawilab: combining diverse anomaly detectors for automated anomaly labeling and performance benchmarking. In: Proceedings of the 6th International COnference, Co-NEXT \u201910, pp. 8:1\u20138:12. New York, ACM (2010)","DOI":"10.1145\/1921168.1921179"},{"key":"40_CR21","unstructured":"Freemeteo: Washington D.C. weather history. http:\/\/www.freemeteo.com (2013)"},{"key":"40_CR22","unstructured":"Ghosh, A.K., Schwartzbard, A., Schatz, M.: Learning program behavior profiles for intrusion detection. In: Proceedings of the 1st conference on Workshop on Intrusion Detection and Network Monitoring. USENIX Association, vol. 1, pp. 6\u20136. ID\u201999, Berkeley (1999)."},{"issue":"1","key":"40_CR23","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/j.inffus.2006.10.002","volume":"9","author":"G Giacinto","year":"2008","unstructured":"Giacinto, G., Perdisci, R., Del Rio, M., Roli, F.: Intrusion detection in computer networks by a modular ensemble of one-class classifiers. Inf. Fusion 9(1), 69\u201382 (2008)","journal-title":"Inf. Fusion"},{"key":"40_CR24","doi-asserted-by":"crossref","unstructured":"Guralnik, V., Srivastava, J.: Event detection from time series data. In: Proceedings of the fifth ACM SIGKDD international conference on Knowledge discovery and data mining. pp. 33\u201342. ACM (1999)","DOI":"10.1145\/312129.312190"},{"key":"40_CR25","doi-asserted-by":"crossref","unstructured":"Hastie, T., Tibshirani, R., Friedman, J.J.H.: The elements of statistical learning. vol. 1, Springer, New York (2001)","DOI":"10.1007\/978-0-387-21606-5"},{"key":"40_CR26","doi-asserted-by":"crossref","unstructured":"Witten, I.H., Eibe Frank, M.A.H.: Data mining: practical machine learning tools and technique. In: Kaufmann, M. 3rd edn (2011)","DOI":"10.1016\/B978-0-12-374856-0.00001-8"},{"issue":"1","key":"40_CR27","doi-asserted-by":"crossref","first-page":"128","DOI":"10.1007\/s10618-010-0201-y","volume":"23","author":"E Ikonomovska","year":"2011","unstructured":"Ikonomovska, E., Gama, J., Dzeroski, S.: Learning model trees from evolving data streams. Data Min. Knowl. Discov. 23(1), 128\u2013168 (2011)","journal-title":"Data Min. Knowl. Discov."},{"key":"40_CR28","doi-asserted-by":"crossref","unstructured":"Jackson, M.L., Baer, A., Painter, I., Duchin, J.: A simulation study comparing aberration detection algorithms for syndromic surveillance. BMC Med. Inform. Decis. Mak. 7(1), 6 (2007)","DOI":"10.1186\/1472-6947-7-6"},{"key":"40_CR29","doi-asserted-by":"crossref","unstructured":"Kerman, M., Jiang, W., Blumberg, A., Buttrey, S.: Event detection challenges, methods, and applications in natural and artificial systems. In: Proceedings of 14th international command and control research and technology symposium, ICCRTS, Lockheed Martin MS2, pp. 1\u201319 (2009)","DOI":"10.1080\/1755876X.2009.11020108"},{"key":"40_CR30","doi-asserted-by":"crossref","unstructured":"Kuncheva, L.I.: Combining pattern classifiers: methods and algorithms. Wiley-Interscience (2004)","DOI":"10.1002\/0471660264"},{"issue":"4","key":"40_CR31","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1030194.1015492","volume":"34","author":"A Lakhina","year":"2004","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Diagnosing network-wide traffic anomalies. SIGCOMM Comput. Commun. Rev. 34(4), 219\u2013230 (2004)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"40_CR32","doi-asserted-by":"crossref","unstructured":"Lakhina, A., Crovella, M., Diot, C.: Mining anomalies using traffic feature distributions. In: Proceedings of the 2005 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM \u201905, pp. 217\u2013228. New York, ACM (2005)","DOI":"10.1145\/1080091.1080118"},{"issue":"1","key":"40_CR33","doi-asserted-by":"crossref","first-page":"159","DOI":"10.2307\/2529310","volume":"33","author":"JR Landis","year":"1977","unstructured":"Landis, J.R., Koch, G.G.: The measurement of observer agreement for categorical data. Biometrics 33(1), 159\u2013174 (1977)","journal-title":"Biometrics"},{"key":"40_CR34","doi-asserted-by":"crossref","unstructured":"Li, X., Bian, F., Crovella, M., Diot, C., Govindan, R., Iannaccone, G., Lakhina, A.: Detection and identification of network anomalies using sketch subspaces. In: Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, IMC \u201906, pp. 147\u2013152. New York, ACM (2006)","DOI":"10.1145\/1177080.1177099"},{"key":"40_CR35","unstructured":"Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: The: darpa off-line intrusion detection evaluation. Comput. Netw. 34(4), 579\u2013595 (1999)"},{"key":"40_CR36","unstructured":"Marins, A., Casanova, M.A., Furtado, A., Breitman, K.: Modeling provenance for semantic desktop applications. In: SEMISH-Anais do Seminario Integrado de Software e Hardware XXXIV, pp. 2101\u20132112 (2007)"},{"issue":"4","key":"40_CR37","doi-asserted-by":"crossref","first-page":"262","DOI":"10.1145\/382912.382923","volume":"3","author":"J McHugh","year":"2000","unstructured":"McHugh, J.: Testing intrusion detection systems: a critique of the 1998 and 1999 darpa intrusion detection system evaluations as performed by lincoln laboratory. ACM Trans. Inform. Syst. Secur. 3(4), 262\u2013294 (2000)","journal-title":"ACM Trans. Inform. Syst. Secur."},{"key":"40_CR38","doi-asserted-by":"crossref","unstructured":"Nychis, G., Sekar, V., Andersen, D.G., Kim, H., Zhang, H.: An empirical evaluation of entropy-based traffic anomaly detection. In: Proceedings of the 8th ACM SIGCOMM conference on Internet measurement, IMC \u201908, pp. 151\u2013156. New York, ACM (2008)","DOI":"10.1145\/1452520.1452539"},{"issue":"10","key":"40_CR39","doi-asserted-by":"crossref","first-page":"2183","DOI":"10.1080\/02664763.2010.545371","volume":"38","author":"K Patterson","year":"2011","unstructured":"Patterson, K., Hassani, H., Heravi, S., Zhigljavsky, A.: Multivariate singular spectrum analysis for forecasting revisions to real-time data. J. Appl. Stat. 38(10), 2183\u20132211 (2011)","journal-title":"J. Appl. Stat."},{"key":"40_CR40","unstructured":"Policy Institute: Bike-sharing programs hit the streets in over 500 cities worldwide. http:\/\/www.earth-policy.org\/plan_b_updates\/2013\/update112 (2013)"},{"issue":"1","key":"40_CR41","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/1341431.1341437","volume":"38","author":"H Ringberg","year":"2008","unstructured":"Ringberg, H., Soule, A., Rexford, J.: Webclass: adding rigor to manual labeling of traffic anomalies. SIGCOMM Comput. Commun. Rev. 38(1), 35\u201338 (2008)","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"40_CR42","doi-asserted-by":"crossref","unstructured":"Rubinstein, B.I., Nelson, B., Huang, L., Joseph, A.D., Lau, S.-H., Rao, S., Taft, N., Tygar, J.D.: Antidote: understanding and defending against poisoning of anomaly detectors. In: Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference, IMC \u201909, pp. 1\u201314. New York, ACM (2009)","DOI":"10.1145\/1644893.1644895"},{"key":"40_CR43","doi-asserted-by":"crossref","unstructured":"SanMiguel, J.C., Martinez, J.M., Garcia, A.: An ontology for event detection and its application in surveillance video. In: Proceedings of the 2009 sixth IEEE international conference on advanced video and signal based surveillance, AVSS \u201909, IEEE Computer Society, pp. 220\u2013225. Washington, DC (2009)","DOI":"10.1109\/AVSS.2009.28"},{"key":"40_CR44","unstructured":"Scherrer, A., Larrieu, N., Owezarski, P., Borgnat, P., Abry, P.: Non-gaussian and long memory statistical characterizations for internet traffic with anomalies. IEEE Trans. Dependable Secur. Comput. 4(1), 56\u201370 (2007)"},{"issue":"1","key":"40_CR45","doi-asserted-by":"crossref","first-page":"69","DOI":"10.1016\/S0167-9473(03)00177-4","volume":"45","author":"SL Scott","year":"2004","unstructured":"Scott, S.L.: A bayesian paradigm for designing intrusion detection systems. Comput. Stat. Data Anal. 45(1), 69\u201383 (2004)","journal-title":"Comput. Stat. Data Anal."},{"key":"40_CR46","unstructured":"Senin, P.: Dynamic time warping algorithm review. In: University of Hawaii at Manoa, Technical report series (2008)"},{"key":"40_CR47","unstructured":"Shanbhag, S., Wolf, T.: Accurate anomaly detection through parallelism. Netw. Mag. Glob. Internetwkg. 23(1), 22\u201328 (2009)"},{"key":"40_CR48","doi-asserted-by":"crossref","unstructured":"Tan, K., Maxion, R.: The effects of algorithmic diversity on anomaly detector performance. Dependable systems and networks, 2005. DSN 2005. In: Proceedings of international conference on, pp. 216\u2013225 (2005)","DOI":"10.1109\/DSN.2005.91"},{"key":"40_CR49","unstructured":"Tan, K.M.C., Maxion, R.A.: Performance evaluation of anomaly-based detection mechanisms. In: Technical report series CS-TR-870, University of Newcastle upon Tyne, Newcastle upon Tyne, NE1 7RU, UK (2004)"},{"key":"40_CR50","doi-asserted-by":"crossref","unstructured":"Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the kdd cup 99 data set. In: Proceedings of the second IEEE international conference on Computational intelligence for security and defense applications, CISDA\u201909, Piscataway, NJ, pp. 53\u201358. IEEE Press (2009)","DOI":"10.1109\/CISDA.2009.5356528"},{"key":"40_CR51","doi-asserted-by":"crossref","first-page":"514","DOI":"10.1016\/j.sbspro.2011.08.058","volume":"20","author":"P Vogel","year":"2011","unstructured":"Vogel, P., Greiser, T., Mattfeld, D.C.: Understanding bike-sharing systems using data mining: exploring activity patterns. Procedia Soc. Behav. Sci. 20, 514\u2013523 (2011)","journal-title":"Procedia Soc. Behav. Sci."},{"key":"40_CR52","doi-asserted-by":"crossref","unstructured":"Warrender, C., Forrest, S., Pearlmutter, B.: Detecting intrusions using system calls: alternative data models. In security and privacy, 1999. In: Proceedings of the 1999 IEEE symposium on, pp. 133\u2013145 (1999)","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"40_CR53","doi-asserted-by":"crossref","unstructured":"Wong, C., Bielski, S., Studer, A., Wang, C.: Empirical analysis of rate limiting mechanisms. In: Proceedings of the 8th international conference on Recent Advances in Intrusion Detection, RAID\u2019 05, pp. 22\u201342. Springer, Heidelberg (2006)","DOI":"10.1007\/11663812_2"},{"key":"40_CR54","unstructured":"Wong, W.-K., Moore, A., Cooper, G., Wagner, M.: What\u2019s strange about recent events (wsare): an algorithm for the early detection of disease outbreaks. J. Mach. Learn. Res. 6, 1961\u20131998 (2005)"},{"key":"40_CR55","doi-asserted-by":"crossref","unstructured":"Xu, C., Zhang, Y.-F., Zhu, G., Rui, Y., Lu, H., Huang, Q.: Using webcast text for semantic event detection in broadcast sports video. Multimedia IEEE Trans. 10(7), 1342\u20131355 (2008)","DOI":"10.1109\/TMM.2008.2004912"},{"key":"40_CR56","doi-asserted-by":"crossref","unstructured":"Zheng, V.W., Zheng, Y., Xie, X., Yang, Q.: Collaborative location and activity recommendations with gps history data. In: Proceedings of the 19th international conference on World wide web, WWW\u201910, pp. 1029\u20131038. New York, ACM (2010)","DOI":"10.1145\/1772690.1772795"}],"container-title":["Progress in Artificial Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-013-0040-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13748-013-0040-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13748-013-0040-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T22:58:43Z","timestamp":1746053923000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13748-013-0040-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,26]]},"references-count":56,"journal-issue":{"issue":"2-3","published-print":{"date-parts":[[2014,6]]}},"alternative-id":["40"],"URL":"https:\/\/doi.org\/10.1007\/s13748-013-0040-3","relation":{},"ISSN":["2192-6352","2192-6360"],"issn-type":[{"value":"2192-6352","type":"print"},{"value":"2192-6360","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,11,26]]}}}