{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T04:56:55Z","timestamp":1729659415067,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,10]]},"DOI":"10.1109\/cisim.2010.5643699","type":"proceedings-article","created":{"date-parts":[[2010,11,30]],"date-time":"2010-11-30T16:34:10Z","timestamp":1291134850000},"page":"1-6","source":"Crossref","is-referenced-by-count":10,"title":["Anomaly, novelty, one-class classification: A short introduction"],"prefix":"10.1109","author":[{"given":"Anna M.","family":"Bartkowiak","sequence":"first","affiliation":[]}],"member":"263","reference":[{"year":"2001","author":"ypma","article-title":"Learning methods for machine vibration analysis and health monitoring","key":"ref33"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1016\/j.eswa.2008.08.030"},{"key":"ref31","article-title":"Artificial Immunological Systems","author":"wierzchon","year":"2001","journal-title":"Akademicka Oficyna Wydawnicza EXIT Warsaw"},{"key":"ref30","article-title":"Data description toolbox dd_tools 1.6.3. A Matlab toolbox for data description, outlier and novelty detection","author":"tax","year":"2008","journal-title":"EWI Delft UT"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1007\/3-540-45105-6_24"},{"key":"ref11","first-page":"257","article-title":"Artificial immune systems in industrial applications","author":"dasgupta","year":"1999","journal-title":"Proc of IPMM97"},{"key":"ref12","article-title":"PRTools4, A Matlab Toolbox for Pattern Recognition","author":"duin","year":"2007","journal-title":"Delft Pattern Recognition Research Faculty EWI &#x2013; ICT Delft University of Technology Delft The Netherlands"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/RISP.1994.296580"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1198\/TECH.2009.09115"},{"doi-asserted-by":"publisher","key":"ref15","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1016\/j.sigpro.2003.07.018"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1016\/j.robot.2004.10.006"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1007\/s10618-005-0014-6"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.comnet.2007.02.001"},{"doi-asserted-by":"publisher","key":"ref28","DOI":"10.1016\/j.ymssp.2009.09.009"},{"key":"ref4","article-title":"Outliers: a continuing problem","author":"bartkowiak","year":"2003","journal-title":"Bulletin of the International Statistical Institute 54th Session Proceedings Berlin"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1198\/TECH.2010.06134"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1504\/IJBM.2010.033392"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1198\/TECH.2009.08136"},{"year":"2001","author":"tax","article-title":"One-class classification","key":"ref29"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1007\/s001800050031"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1002\/sim.2835"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1049\/ip-vis:19941330"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1504\/IJBM.2010.030413"},{"key":"ref9","first-page":"36","article-title":"Algorithm for statistical detection of peaks - syndromic surveillance system for the Athens 2004 Olympic Games","author":"daphne","year":"2004","journal-title":"MMWR"},{"year":"1994","author":"barnett","journal-title":"Outliers in Statistical Data","key":"ref1"},{"year":"2004","author":"pelleg","article-title":"Scalable and Practical Probability Density Estimators for Scientific Anomaly Detection","key":"ref20"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1007\/978-3-540-25966-4_12"},{"key":"ref21","article-title":"The Dissimilarity Representation for Pattern Recognition","author":"pekalska","year":"2005","journal-title":"Foundations and Applications"},{"year":"0","author":"schonlau","journal-title":"Masquerading used data","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1016\/S1353-4858(10)70024-6"},{"doi-asserted-by":"publisher","key":"ref26","DOI":"10.1198\/TECH.2010.07032"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/ss\/998929472","article-title":"Computer intrusion: Detecting Masquerades","volume":"16","author":"schonlau","year":"2001","journal-title":"Statistical Science"}],"event":{"name":"2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)","start":{"date-parts":[[2010,10,8]]},"location":"Krackow, Poland","end":{"date-parts":[[2010,10,10]]}},"container-title":["2010 International Conference on Computer Information Systems and Industrial Management Applications (CISIM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5637902\/5643452\/05643699.pdf?arnumber=5643699","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T12:42:32Z","timestamp":1497876152000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5643699\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/cisim.2010.5643699","relation":{},"subject":[],"published":{"date-parts":[[2010,10]]}}}