{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,30]],"date-time":"2024-08-30T14:37:36Z","timestamp":1725028656674},"reference-count":30,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2011,8,1]],"date-time":"2011-08-01T00:00:00Z","timestamp":1312156800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Expert Systems with Applications"],"published-print":{"date-parts":[[2011,8]]},"DOI":"10.1016\/j.eswa.2011.01.162","type":"journal-article","created":{"date-parts":[[2011,2,4]],"date-time":"2011-02-04T04:17:05Z","timestamp":1296793025000},"page":"9587-9596","source":"Crossref","is-referenced-by-count":28,"title":["Fast outlier detection for very large log data"],"prefix":"10.1016","volume":"38","author":[{"given":"Seung","family":"Kim","sequence":"first","affiliation":[]},{"given":"Nam Wook","family":"Cho","sequence":"additional","affiliation":[]},{"given":"Bokyoung","family":"Kang","sequence":"additional","affiliation":[]},{"given":"Suk-Ho","family":"Kang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.eswa.2011.01.162_b0005","series-title":"Proceedings of the 2001 ACM SIGMOD International Conference on Management of Data","first-page":"37","article-title":"Outlier detection for high dimensional data","author":"Aggarwal","year":"2001"},{"key":"10.1016\/j.eswa.2011.01.162_b0010","unstructured":"Agrawal, R., Gehrke, J., Gunopulos, D., & Raghavan P. (1998). Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications Automatic Subspace Clustering of High Dimensional Data for Data Mining Applications, In Proceeding of the ACM SIGMOD International Conference on Management of Data, Seattle, Washington, pp. 94-105."},{"key":"10.1016\/j.eswa.2011.01.162_b0015","series-title":"Proceedings of the 15th Information Resource Management Association (IRMA) International Conference, New Orleans","first-page":"5","article-title":"LSC-Mine: Algorithm for Mining Local Outliers","author":"Agyemang","year":"2004"},{"issue":"6","key":"10.1016\/j.eswa.2011.01.162_b0020","doi-asserted-by":"crossref","first-page":"891","DOI":"10.1145\/293347.293348","article-title":"An optimal algorithm for approximate nearest neighbor searching","volume":"45","author":"Arya","year":"1998","journal-title":"Journal of the ACM"},{"key":"10.1016\/j.eswa.2011.01.162_b0025","unstructured":"Asuncion, A., & Newman, D.J. (2007). UCI Machine Learning Repository, available at http:\/\/www.ics.uci.edu\/\u223cmlearn\/MLRepository.html, Irvine, CA: University of California, School of Information and Computer Science."},{"key":"10.1016\/j.eswa.2011.01.162_b0030","series-title":"Outliers in Statistical Data","author":"Barnett","year":"1994"},{"key":"10.1016\/j.eswa.2011.01.162_b0035","series-title":"Data Mining and Knowledge Discovery Handbook: A Complete Guide for Practitioners and Researchers","article-title":"Outlier detection","author":"Ben-Gal","year":"2005"},{"key":"10.1016\/j.eswa.2011.01.162_b0040","series-title":"Proceedings of 6th Annual ACM Symposium Computational Geometry","first-page":"187","article-title":"K-d trees for semidynamic point sets","author":"Bentley","year":"1990"},{"key":"10.1016\/j.eswa.2011.01.162_b0045","series-title":"Proceedings of the ACM SIGMOD Conference, Dallas, Texas","first-page":"93","article-title":"LOF: Identifying Density Based Local Outliers","author":"Breunig","year":"2000"},{"key":"10.1016\/j.eswa.2011.01.162_b0050","series-title":"Proceeding for 2nd International Conference on Knowledge Discovery and Data Mining(KDD \u201896), Portland, Oregon","first-page":"226","article-title":"A Density-Based Algorithm for Discovering Clusters in Large Spatial Databases with Noise","author":"Ester","year":"1996"},{"issue":"5","key":"10.1016\/j.eswa.2011.01.162_b0055","first-page":"45","article-title":"Constructing Bayesian Networks to predict Uncollectible Telecommunications Accounts","volume":"11","author":"Ezawa","year":"1996","journal-title":"IEEEExpert"},{"key":"10.1016\/j.eswa.2011.01.162_b0060","series-title":"Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, San Jose, California","first-page":"163","article-title":"FastMap: A fast algorithm for indexing, data-mining and visualization of traditional and multimedia datasets","author":"Faloutsos","year":"1995"},{"issue":"3","key":"10.1016\/j.eswa.2011.01.162_b0065","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1145\/355744.355745","article-title":"An algorithm for finding best matches in logarithmic expected time","volume":"3","author":"Friedman","year":"1977","journal-title":"ACM Transaction on Mathematical Software"},{"key":"10.1016\/j.eswa.2011.01.162_b0070","series-title":"Introduction to Statistical Pattern Recognition","author":"Fukunaga","year":"1990"},{"key":"10.1016\/j.eswa.2011.01.162_b0075","series-title":"Proceeding of the ACM SIGMOD International Conference on Management of Data, Seattle, Washington","first-page":"73","article-title":"Cure: An Efficient Clustering Algorithm for Large Databases","author":"Guha","year":"1998"},{"key":"10.1016\/j.eswa.2011.01.162_b0080","series-title":"Identification of Outliers","author":"Hawkins","year":"1980"},{"issue":"3","key":"10.1016\/j.eswa.2011.01.162_b0085","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1093\/biomet\/56.3.635","article-title":"On the Ratio of Two Correlated Normal Random Variables","volume":"56","author":"Hinkley","year":"1969","journal-title":"Biometrika"},{"key":"10.1016\/j.eswa.2011.01.162_b0090","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.cose.2008.10.002","article-title":"Keystroke dynamics-based authentication for mobile devices","volume":"28","author":"Hwang","year":"2009","journal-title":"Computers & Security"},{"key":"10.1016\/j.eswa.2011.01.162_b0095","doi-asserted-by":"crossref","unstructured":"Lazarevic, A., Ertoz, L., Kumar, V., Ozgur, A., & Srivastava, J. (2003). A comparative study of anomaly detection schemes in network intrusion detection, In Proceedings of the Third SIAM International Conference on Data Mining, San Francisco, CA.","DOI":"10.1137\/1.9781611972733.3"},{"key":"10.1016\/j.eswa.2011.01.162_b0100","series-title":"Proceedings of the 5th Berkeley Symposium on Mathematical Statistics and Probability, University of California, Berkeley","first-page":"291","article-title":"Some Methods for Classification and Analysis of Multivariate Observations","author":"MacQueen","year":"1967"},{"key":"10.1016\/j.eswa.2011.01.162_b0105","series-title":"Machine Learning and Data Mining for Computer Security: Methods and Applications","author":"Maloof","year":"2005"},{"issue":"23","key":"10.1016\/j.eswa.2011.01.162_b0110","doi-asserted-by":"crossref","first-page":"873","DOI":"10.1109\/34.946990","article-title":"Event Detection and Analysis from Video Streams","volume":"8","author":"Medioni","year":"2001","journal-title":"IEEE Transactions on Pattern Analysis and Machine Intelligence"},{"key":"10.1016\/j.eswa.2011.01.162_b0120","unstructured":"Mount, D.M., & Arya, S. (2006). ANN: A Library for Approximate Nearest Neighbor Searching available at http:\/\/www.cs.umd.edu\/\u223cmount\/ANN\/."},{"key":"10.1016\/j.eswa.2011.01.162_b0125","series-title":"IEEE Symposium on Computational Intelligence and Data Mining (CIDM), Honolulu, Hawaii","first-page":"504","article-title":"Incremental Local Outlier Detection for Data Streams","author":"Pokrajac","year":"2007"},{"key":"10.1016\/j.eswa.2011.01.162_b0130","series-title":"Numerical Recipes in C","author":"Press","year":"1988"},{"key":"10.1016\/j.eswa.2011.01.162_b0135","series-title":"Proceedings of the International Conference on Management of Data, Dallas, Texas","first-page":"427","article-title":"Efficient algorithms for mining outliers from large data sets","author":"Ramaswamy","year":"2000"},{"key":"10.1016\/j.eswa.2011.01.162_b0140","series-title":"Linear Algebra and its Applications","author":"Strang","year":"1980"},{"key":"10.1016\/j.eswa.2011.01.162_b0145","unstructured":"Yue, D., Wu, X., Wang, Y., Li, Y., & Chu, C.H. (2007). A Review of Data Mining-Based Financial Fraud Detection Research, In Proceedings of 2007 International Conference on Wireless Communications, Networking and Mobile Computing, Shanghai, P.R. China. Sponsored by IEEE, pp. 5514-5517."},{"key":"10.1016\/j.eswa.2011.01.162_b0150","series-title":"Proceedings for the ACM SIGMOD Conference on Management of Data, Montreal, Canada","first-page":"103","article-title":"Birch: An Efficient data clustering method for very large databases","author":"Zhang","year":"1996"},{"key":"10.1016\/j.eswa.2011.01.162_b0155","series-title":"Proceedings of 2006 IEEE International Conference on Communications, Istanbul, Turkey","first-page":"2388","article-title":"Anomaly Based Network Intrusion Detection with Unsupervised Outlier Detection","author":"Zhang","year":"2006"}],"container-title":["Expert Systems with Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417411001953?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0957417411001953?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2018,12,4]],"date-time":"2018-12-04T21:29:34Z","timestamp":1543958974000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0957417411001953"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,8]]},"references-count":30,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2011,8]]}},"alternative-id":["S0957417411001953"],"URL":"https:\/\/doi.org\/10.1016\/j.eswa.2011.01.162","relation":{},"ISSN":["0957-4174"],"issn-type":[{"value":"0957-4174","type":"print"}],"subject":[],"published":{"date-parts":[[2011,8]]}}}