{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T08:34:06Z","timestamp":1729672446094,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,12]]},"DOI":"10.1109\/cisda.2014.7035633","type":"proceedings-article","created":{"date-parts":[[2015,2,11]],"date-time":"2015-02-11T22:27:28Z","timestamp":1423693648000},"page":"1-8","source":"Crossref","is-referenced-by-count":2,"title":["Smoothing gamma ray spectra to improve outlier detection"],"prefix":"10.1109","author":[{"given":"Vincent","family":"Barnabe-Lortie","sequence":"first","affiliation":[]},{"given":"Colin","family":"Bellinger","sequence":"additional","affiliation":[]},{"given":"Nathalie","family":"Japkowicz","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-6333-3","volume":"27","author":"de boor","year":"1978","journal-title":"A practical Guide to Splines"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1023\/B:MACH.0000008084.60811.49"},{"key":"17","first-page":"359","article-title":"Smooth regression analysis","author":"watson","year":"1964","journal-title":"Sankhya The Indian Journal of Statistics"},{"key":"23","article-title":"Statistical power analysis for the behavioral sciences","author":"cohen","year":"1977","journal-title":"Rev"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/NSSMIC.2005.1596258"},{"key":"15","doi-asserted-by":"crossref","DOI":"10.1201\/b14876","volume":"60","author":"wand","year":"1994","journal-title":"Kernel Smoothing"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1137\/1109020"},{"key":"13","first-page":"518","article-title":"A novelty detection approach to classification","author":"japkowicz","year":"1995","journal-title":"IJCAI"},{"key":"14","first-page":"220","article-title":"Overlap versus imbalance","author":"denil","year":"2010","journal-title":"Advances in Artificial Intelligence"},{"key":"11","first-page":"574","article-title":"The problem with noise and small disjuncts","author":"weiss","year":"1998","journal-title":"ICML"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"},{"key":"3","first-page":"49","article-title":"On the generalized distance in statistics","volume":"2","author":"mahalanobis","year":"1936","journal-title":"Proceedings of the National Institute of Sciences (Calcutta)"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511921803"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/TNS.2010.2054110"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/CISDA.2012.6291535"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1007730.1007734"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335388"},{"key":"6","first-page":"11","article-title":"A unified approach for mining outliers","author":"knorr","year":"1997","journal-title":"Proceedings of the 1997 conference of the Centre for Advanced Studies on Collaborative research"},{"journal-title":"Exploratory Data Analysis","year":"1977","author":"tukey","key":"5"},{"key":"4","first-page":"164","article-title":"A linear method for deviation detection in large databases","author":"arning","year":"1996","journal-title":"KDD"},{"journal-title":"An Introduction to Kolmogorov Complexity and Its Applications","year":"2009","author":"li","key":"9"},{"key":"8","first-page":"579","article-title":"Clustering approaches for anomaly based intrusion detection","author":"smith","year":"2002","journal-title":"Proceedings of Intelligent Engineering Systems Through Artificial Neural Networks"}],"event":{"name":"2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)","start":{"date-parts":[[2014,12,14]]},"location":"Cau Giay, Vietnam","end":{"date-parts":[[2014,12,17]]}},"container-title":["the 2014 Seventh IEEE Symposium on Computational Intelligence for Security and Defense Applications (CISDA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7010459\/7035614\/07035633.pdf?arnumber=7035633","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,20]],"date-time":"2019-08-20T21:30:02Z","timestamp":1566336602000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7035633\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,12]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/cisda.2014.7035633","relation":{},"subject":[],"published":{"date-parts":[[2014,12]]}}}