{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T17:28:27Z","timestamp":1747243707948,"version":"3.28.0"},"reference-count":21,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T00:00:00Z","timestamp":1575158400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1109\/bigdata47090.2019.9006420","type":"proceedings-article","created":{"date-parts":[[2020,2,25]],"date-time":"2020-02-25T06:05:34Z","timestamp":1582610734000},"page":"5888-5896","source":"Crossref","is-referenced-by-count":4,"title":["An Apriori-based Data Analysis on Suspicious Network Event Recognition"],"prefix":"10.1109","author":[{"given":"Zhiwen","family":"Jian","sequence":"first","affiliation":[]},{"given":"Hiroshi","family":"Sakai","sequence":"additional","affiliation":[]},{"given":"Junzo","family":"Watada","sequence":"additional","affiliation":[]},{"given":"Arunava","family":"Roy","sequence":"additional","affiliation":[]},{"given":"M Hilmi B","family":"Hassan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(84)90010-0"},{"journal-title":"Systemy Informacyjne Podstawy Teoretyczne (in Polish) WNT","year":"1983","author":"pawlak","key":"ref11"},{"journal-title":"Rough Sets Theoretical Aspects of Reasoning about Data","year":"1991","author":"pawlak","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2014.07.029"},{"journal-title":"Software Tools for RNIA (Rough Non-deterministic Information Analysis)","year":"2016","author":"sakai","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1049\/trit.2019.0001"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2018.09.008"},{"key":"ref17","first-page":"331","author":"skowron","year":"1992","journal-title":"The discernibility matrices and functions in information systems in Intelligent Decision Support Handbook of Advances and Applications of the Rough Set Theory"},{"key":"ref18","first-page":"151","article-title":"Automatic extraction of decision rules from nondeterministic data systems: Theoretical foundations and SQL-based implementation","volume":"64","author":"?l?zak","year":"2009","journal-title":"DTA2009 Springer CCIS"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(02)00142-2"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/BigData47090.2019.9005668"},{"journal-title":"UCI Machine Learning Repository","year":"2010","author":"frank","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/320083.320088"},{"key":"ref5","first-page":"44","article-title":"Classification rule learning with APRIORIC","volume":"lncs 2258","author":"jovanoski","year":"2001","journal-title":"Proc EPIA 2001"},{"key":"ref8","first-page":"80","article-title":"Integrating classification and association rule mining","author":"liu","year":"1998","journal-title":"Proc KDD 1998"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/322234.322239"},{"key":"ref2","first-page":"307","article-title":"Fast discovery of association rules","author":"agrawal","year":"1996","journal-title":"Advances in Knowledge Discovery and Data Mining AAAI\/MIT Press"},{"key":"ref1","first-page":"487","article-title":"Fast algorithms for mining association rules in large databases","author":"agrawal","year":"1994","journal-title":"Proc of VLDB&#x2019;97"},{"key":"ref9","first-page":"1","article-title":"Association rules: An overview. Post-Mining of Association Rules: Techniques for Effective Knowledge Extraction","author":"mcnicholas","year":"2009","journal-title":"IDI-Global"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.09.021"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(93)90048-2"}],"event":{"name":"2019 IEEE International Conference on Big Data (Big Data)","start":{"date-parts":[[2019,12,9]]},"location":"Los Angeles, CA, USA","end":{"date-parts":[[2019,12,12]]}},"container-title":["2019 IEEE International Conference on Big Data (Big Data)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8986695\/9005444\/09006420.pdf?arnumber=9006420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:47:56Z","timestamp":1658094476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9006420\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/bigdata47090.2019.9006420","relation":{},"subject":[],"published":{"date-parts":[[2019,12]]}}}