{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:52:47Z","timestamp":1730213567054,"version":"3.28.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899398","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T23:18:43Z","timestamp":1574723923000},"page":"1-8","source":"Crossref","is-referenced-by-count":4,"title":["Online Anomaly Detection of Time Series at Scale"],"prefix":"10.1109","author":[{"given":"Andrew","family":"Mason","sequence":"first","affiliation":[]},{"given":"Yifan","family":"Zhao","sequence":"additional","affiliation":[]},{"given":"Hongmei","family":"He","sequence":"additional","affiliation":[]},{"given":"Raymon","family":"Gompelman","sequence":"additional","affiliation":[]},{"given":"Srikanth","family":"Mandava","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"An Internet traffic analysis method with MapReduce","author":"youngseok","year":"2010","journal-title":"2010 IEEE\/IFIP Network Operations and Management Svmnosium Workshons"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-2070(00)00057-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0194889"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"journal-title":"Spark Streaming vs Flink vs Storm vs Kafka Streams vs Samza Choose Your Stream Processing Framework","year":"2018","author":"prakash","key":"ref36"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-60438-1_50"},{"journal-title":"Blog A Comparison of the Top Four Machine Learning Platforms","year":"2017","author":"karthikeyan","key":"ref34"},{"key":"ref10","article-title":"Robust Anomaly Detection Algorithms for Real-Time Big Data","author":"hasani","year":"2017","journal-title":"Mediterranean Conference on Embedded Computing"},{"journal-title":"Introducing practical and robust anomaly detection in a time series 6 January 2015","year":"0","author":"kejariwal","key":"ref11"},{"year":"0","key":"ref12"},{"key":"ref13","article-title":"An investigation of techniques for detecting data anomalies in earned value management data","author":"mark","year":"2011","journal-title":"Software Engineering Institute Carnegie Mellon University"},{"year":"0","key":"ref14"},{"key":"ref15","first-page":"226","article-title":"A density-based algorithm for discovering clusters. A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"1996","journal-title":"Proc of the Second Int Conf on Knowledge Discovery and Data Mining"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2016.0168"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2017.7966038"},{"year":"0","key":"ref18"},{"key":"ref19","first-page":"3","article-title":"STL: A seasonal-trend decomposition procedure based on loess","volume":"6","author":"cleveland","year":"1990","journal-title":"Journal of Official Statistics"},{"key":"ref28","article-title":"Support Vector Machines as Probabilistic Models","author":"franc","year":"2011","journal-title":"Proceedings International Conference on Machine Learning"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.26599\/BDMA.2018.9020005"},{"journal-title":"Outliers in Statistical Data","year":"1994","author":"barnett","key":"ref27"},{"journal-title":"Understanding the costs of cybercrime &#x2014; A report of key findings from the Costs of Cyber Crime Working Group Research Report 96","year":"2018","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1186\/s41044-016-0014-0"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2017.09.037"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2013.01.010"},{"journal-title":"On the Runtime-Efficacy Trade-off of Anomaly Detection Techniques for Real-Time Streaming Data","year":"2017","author":"choudhary","key":"ref8"},{"key":"ref7","first-page":"56","article-title":"Real-time anomaly detection system for time series at scale. KDD 2017: Workshop on Anomaly detection in Finance","volume":"71","author":"toledano","year":"0","journal-title":"Machine Learning Research"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.5121\/ijcnc.2015.7101"},{"journal-title":"Computing extremely accurate quartiles using t-digests","year":"2015","author":"dunning","key":"ref9"},{"key":"ref1","article-title":"Analytical modeling and assessment of cyber resilience on the base of stochastic networks conversion","author":"kotenko","year":"0","journal-title":"the 10th International Workshop on Resilient Networks Design and Modeling (RNDM) Longyearbyen Norway"},{"journal-title":"The Statistical Analysis of Time Series","year":"1971","author":"anderson","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/COGINF.2010.5599808"},{"key":"ref21","first-page":"62","article-title":"Machine Learning Strategies for Time Series Forecasting","volume":"138","author":"bontempi","year":"2012","journal-title":"Business Intelligence eBISS 2012"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.2514\/6.2015-4321"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-013-9395-x"},{"key":"ref25","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1016\/j.sigpro.2003.07.018","article-title":"Novelty detection: a review Part 1: Statistical approaches","volume":"83","author":"markou","year":"2003","journal-title":"Signal Processing"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","start":{"date-parts":[[2019,6,3]]},"location":"Oxford, United Kingdom","end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899398.pdf?arnumber=8899398","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T21:55:34Z","timestamp":1658094934000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899398\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899398","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}