{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:43:58Z","timestamp":1772120638591,"version":"3.50.1"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1109\/bigdata.2017.8258192","type":"proceedings-article","created":{"date-parts":[[2018,1,15]],"date-time":"2018-01-15T17:47:28Z","timestamp":1516038448000},"page":"2370-2379","source":"Crossref","is-referenced-by-count":4,"title":["Online mining for association rules and collective anomalies in data streams"],"prefix":"10.1109","author":[{"given":"Shaaban","family":"Abbady","sequence":"first","affiliation":[]},{"given":"Cheng-Yuan","family":"Ke","sequence":"additional","affiliation":[]},{"given":"Jennifer","family":"Lavergne","sequence":"additional","affiliation":[]},{"given":"Jian","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Vijay","family":"Raghavan","sequence":"additional","affiliation":[]},{"given":"Ryan","family":"Benton","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"206","article-title":"Markov Chains, Classifiers, and Intrusion Detection","volume":"1","author":"somesh","year":"2001","journal-title":"Proceedings of the 14th IEEE Computer Security Foundation Workshop CSFW"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2009.4938669"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1245290"},{"key":"ref13","first-page":"51","article-title":"Min-Max Itemset Trees for Dense and Categorical Datasets","author":"lavergne","year":"2013","journal-title":"International Symposium on Methodologies for Intelligent Systems ISMIS 2012 Foundations of Intelligent Systems"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2013.43"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454027"},{"key":"ref16","doi-asserted-by":"crossref","first-page":"105","DOI":"10.3233\/IDA-2006-10202","article-title":"Searching for high-support itemsets in itemset trees","volume":"10","author":"li","year":"2006","journal-title":"Intelligent Data Analysis"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/882085.882086"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312274"},{"key":"ref19","article-title":"nathanmarz\/storm","author":"marz","year":"2014","journal-title":"Github"},{"key":"ref4","author":"varun","year":"2009","journal-title":"Anomaly Detection for Symbolic Sequences and Time Series Data"},{"key":"ref3","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"20th International Conference on Very Large Data Bases VLDB"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-17616-6_15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.235"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"1424","DOI":"10.1109\/TKDE.2004.77","article-title":"Mining sequential patterns by pattern-growth: the PrefixSpan approach","volume":"16","author":"pei","year":"2004","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"ref2","article-title":"UCI Machine Learning Repository","year":"2013","journal-title":"Archive ics uci edu"},{"key":"ref1","first-page":"1","author":"aggarwal","year":"2015","journal-title":"Data Mining"},{"key":"ref9","first-page":"49-2107","article-title":"Data mining: concepts, models and techniques","volume":"49","author":"jiawei","year":"2011","journal-title":"Choice Reviews Online"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(97)00019-8"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(02)00128-0"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/233269.233311"},{"key":"ref23","first-page":"2","article-title":"Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing","author":"zaharia","year":"2012","journal-title":"Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation NSDI '13"}],"event":{"name":"2017 IEEE International Conference on Big Data (Big Data)","location":"Boston, MA","start":{"date-parts":[[2017,12,11]]},"end":{"date-parts":[[2017,12,14]]}},"container-title":["2017 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8241556\/8257893\/08258192.pdf?arnumber=8258192","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T07:04:11Z","timestamp":1570604651000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8258192\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/bigdata.2017.8258192","relation":{},"subject":[],"published":{"date-parts":[[2017,12]]}}}